🔥 Trending CVEs - Last 90 Days
4,671 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
Wedding Slideshow Studio 1.36 contains a buffer overflow vulnerability in the registration name field that allows attackers to execute arbitrary code....
📅 28 days ago • Feb 7, 20263DP-MANAGER versions 2.0.1 and earlier automatically create an administrative account with default credentials (admin/admin) on first initialization. ...
📅 28 days ago • Feb 6, 2026This is a critical SQL injection vulnerability in Payload CMS versions before 3.73.0 that allows unauthenticated attackers to extract sensitive data a...
📅 28 days ago • Feb 6, 2026BeyondTrust Remote Support and older Privileged Remote Access versions contain a critical pre-authentication remote code execution vulnerability. Unau...
📅 28 days ago • Feb 6, 2026PlaciPy placement management system version 1.0.0 uses a hard-coded default password for all newly created student accounts, enabling attackers to log...
📅 28 days ago • Feb 6, 2026This vulnerability allows attackers to modify files in the .git directory of Gogs installations, potentially leading to remote command execution. It a...
📅 29 days ago • Feb 6, 2026A critical stack-based buffer overflow vulnerability in IP-COM W30AP access points allows remote attackers to execute arbitrary code or crash the devi...
📅 29 days ago • Feb 6, 2026An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS allows attackers to execute arbitrary SQL commands via crafted HTTP requests...
📅 29 days ago • Feb 6, 2026The WP Duplicate plugin for WordPress has a critical vulnerability that allows authenticated attackers with subscriber-level access to upload arbitrar...
📅 29 days ago • Feb 6, 2026This critical vulnerability in Azure Front Door allows attackers to bypass authentication and authorization controls, potentially gaining unauthorized...
📅 29 days ago • Feb 5, 2026CVE-2020-37125 is a critical remote code execution vulnerability in Edimax EW-7438RPn-v3 Mini range extenders that allows unauthenticated attackers to...
📅 30 days ago • Feb 5, 2026Quick.Cart e-commerce software has a session fixation vulnerability where an attacker can set a victim's session ID before authentication, then hijack...
📅 30 days ago • Feb 5, 2026This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in AutoGPT's RSSFeedBlock component. Attackers can exploit unfiltered URL inputs...
📅 30 days ago • Feb 4, 2026This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in AutoGPT's SendDiscordFileBlock component. Attackers can exploit unfiltered UR...
📅 30 days ago • Feb 4, 2026CVE-2026-25526 is a critical vulnerability in JinJava template engine that allows attackers to bypass sandbox restrictions and execute arbitrary Java ...
📅 30 days ago • Feb 4, 2026CVE-2025-13375 is a critical vulnerability in IBM Common Cryptographic Architecture (CCA) that allows unauthenticated attackers to execute arbitrary c...
📅 30 days ago • Feb 4, 2026Bambuddy versions before 0.1.7 have two critical authentication flaws: a hardcoded JWT secret key in source code and missing authentication checks on ...
📅 30 days ago • Feb 4, 2026A path traversal vulnerability in the unstructured library's partition_msg function allows attackers to write or overwrite arbitrary files on the file...
📅 31 days ago • Feb 4, 2026This SQL injection vulnerability in Martcode Software's Delta Course Automation allows attackers to execute arbitrary SQL commands on the database. Al...
📅 31 days ago • Feb 4, 2026EspoCRM 5.8.5 contains an authentication bypass vulnerability that allows attackers to access other user accounts by manipulating authorization header...
📅 31 days ago • Feb 3, 2026CVE-2020-37082 is an unauthenticated file access vulnerability in webERP 4.15.1 that allows remote attackers to download database backup files without...
📅 31 days ago • Feb 3, 2026CVE-2020-37068 is a critical buffer overflow vulnerability in Konica Minolta FTP Utility 1.0 that allows attackers to crash the FTP server and potenti...
📅 31 days ago • Feb 3, 2026A heap buffer overflow vulnerability in Fast DDS allows unauthenticated attackers to send a single malformed RTPS DATA_FRAG packet, causing immediate ...
📅 31 days ago • Feb 3, 2026This SQL injection vulnerability in PEAR's user::maintains() function allows attackers to execute arbitrary SQL commands when role filters are provide...
📅 31 days ago • Feb 3, 2026This CVE describes an unauthenticated SQL injection vulnerability in PEAR's package retrieval endpoint. Attackers can execute arbitrary SQL commands b...
📅 31 days ago • Feb 3, 2026A SQL injection vulnerability in PEAR's bug subscription deletion feature allows attackers to execute arbitrary SQL commands by manipulating email val...
📅 31 days ago • Feb 3, 2026This CVE describes a SQL injection vulnerability in PEAR, a PHP component framework, where unsafe literal substitution in karma queries allows attacke...
📅 31 days ago • Feb 3, 2026This vulnerability in PEAR (PHP Extension and Application Repository) allows remote code execution when attacker-controlled content reaches the preg_r...
📅 31 days ago • Feb 3, 2026This SQL injection vulnerability in PEAR's category deletion function allows attackers with category manager access to execute arbitrary SQL commands....
📅 31 days ago • Feb 3, 2026FUXA v1.2.7 contains a hard-coded JWT secret key that allows attackers to forge valid authentication tokens. This enables complete authentication bypa...
📅 32 days ago • Feb 3, 2026FUXA v1.2.7 has an unauthenticated file upload vulnerability in the /api/upload endpoint that allows remote attackers to upload arbitrary files. This ...
📅 32 days ago • Feb 3, 2026CVE-2025-69983 is a critical remote code execution vulnerability in FUXA v1.2.7 that allows attackers to execute arbitrary system commands through mal...
📅 32 days ago • Feb 3, 2026This critical buffer overflow vulnerability in TOTOLINK A950RG routers allows remote attackers to execute arbitrary code or cause denial of service by...
📅 32 days ago • Feb 3, 2026A stack-based buffer overflow vulnerability in TOTOLINK A950RG routers allows remote attackers to execute arbitrary code by sending specially crafted ...
📅 32 days ago • Feb 3, 2026This buffer overflow vulnerability in TOTOLINK A950RG routers allows remote attackers to execute arbitrary code by sending specially crafted requests ...
📅 32 days ago • Feb 3, 2026This SQL injection vulnerability in Shandong Kede Electronics' IoT smart water meter monitoring platform allows remote attackers to execute arbitrary ...
📅 32 days ago • Feb 3, 2026MediaCrush versions through 1.0.1 contain an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files of...
📅 32 days ago • Feb 3, 2026CVE-2025-57529 is a critical SQL injection vulnerability in YouDataSum CPAS Audit Management System that allows remote unauthenticated attackers to ex...
📅 32 days ago • Feb 3, 2026This SQL injection vulnerability in DIGITA Efficiency Management System allows attackers to execute arbitrary SQL commands on the database. All system...
📅 32 days ago • Feb 3, 2026A stack-based buffer overflow vulnerability in ELECOM wireless LAN access point devices allows remote attackers to execute arbitrary code by sending s...
📅 32 days ago • Feb 3, 2026An unauthenticated remote attacker can write arbitrary data to any file on Asustor ADM systems when a specific function is enabled during AD Domain jo...
📅 32 days ago • Feb 3, 2026This vulnerability in vLLM allows attackers to leak heap memory addresses by sending invalid images to the multimodal endpoint, which reduces ASLR ent...
📅 32 days ago • Feb 2, 2026This CVE describes a critical path traversal vulnerability in Wildfire IM's file upload functionality that allows attackers to write arbitrary files a...
📅 32 days ago • Feb 2, 2026CVE-2022-50981 allows unauthenticated remote attackers to gain full administrative access to affected devices because they ship without a default pass...
📅 33 days ago • Feb 2, 2026CVE-2026-20418 is a critical out-of-bounds write vulnerability in Thread protocol implementations that allows remote attackers to execute arbitrary co...
📅 33 days ago • Feb 2, 2026The User Profile Builder WordPress plugin before version 3.15.2 has an improper password reset mechanism that allows unauthenticated attackers to rese...
📅 33 days ago • Feb 2, 2026MagicINFO 9 Server versions below 21.1090.1 contain hardcoded database credentials, allowing attackers to authenticate and manipulate the database. Th...
📅 33 days ago • Feb 2, 2026A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without proper authentication, leading to stored cross-site scriptin...
📅 33 days ago • Feb 2, 2026This CVE describes a code injection vulnerability in Orval, a tool that generates TypeScript clients from OpenAPI/Swagger specifications. The incomple...
📅 35 days ago • Jan 30, 2026CVE-2025-51958 is a critical remote code execution vulnerability in the aelsantex runcommand plugin for DokuWiki. Unauthenticated attackers can execut...
📅 35 days ago • Jan 30, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats