🔥 Trending CVEs - Last 90 Days
4,459 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
The DVP-12SE programmable logic controller transmits sensitive information in cleartext over Modbus/TCP, allowing attackers on the same network to int...
📅 79 days ago • Dec 26, 2025Pexip Infinity installations before version 39.0 have an internal API vulnerability where critical functions lack authentication. This allows an attac...
📅 80 days ago • Dec 25, 2025CVE-2025-66379 is an improper input validation vulnerability in Pexip Infinity's media implementation that allows remote attackers to trigger a softwa...
📅 80 days ago • Dec 25, 2025Pexip Infinity versions 35.0 through 38.1 have an improper input validation vulnerability in WebRTC signaling when using non-default Direct Media conf...
📅 80 days ago • Dec 25, 2025Pexip Infinity versions 33.0 through 37.0 have improper input validation in signaling that allows attackers to trigger a software abort, causing denia...
📅 80 days ago • Dec 25, 2025Pexip Infinity versions 35.0 through 37.2 have an improper input validation vulnerability in signalling that allows attackers to trigger a software ab...
📅 80 days ago • Dec 25, 2025CVE-2025-32095 is an improper input validation vulnerability in Pexip Infinity's signaling component that allows remote attackers to trigger a softwar...
📅 80 days ago • Dec 25, 2025CVE-2025-3232 is an authentication bypass vulnerability in Mitsubishi Electric products that allows remote unauthenticated attackers to execute arbitr...
📅 80 days ago • Dec 24, 2025This vulnerability in the PostX WordPress plugin allows unauthorized users to retrieve embedded sensitive data from affected websites. It affects all ...
📅 80 days ago • Dec 24, 2025The Virusdie WordPress plugin versions up to and including 1.1.6 expose sensitive system information to unauthorized users. This vulnerability allows ...
📅 80 days ago • Dec 24, 2025This CVE describes a Missing Authorization vulnerability in the claspo Popup Builder WordPress plugin that allows attackers to bypass access controls....
📅 80 days ago • Dec 24, 2025This vulnerability in the Tablesome WordPress plugin allows attackers to retrieve embedded sensitive data from tables. It affects all WordPress sites ...
📅 80 days ago • Dec 24, 2025This vulnerability in Premium Addons for Elementor WordPress plugin allows unauthorized users to retrieve embedded sensitive data from affected websit...
📅 80 days ago • Dec 24, 2025This vulnerability in the Eight Day Week Print Workflow WordPress plugin allows unauthorized users to retrieve embedded sensitive data. It affects all...
📅 80 days ago • Dec 24, 2025This vulnerability allows remote attackers to crash Sante PACS Server by sending specially crafted HTTP requests with malformed Content-Length headers...
📅 81 days ago • Dec 23, 2025This vulnerability allows unauthenticated remote attackers to retrieve sensitive information from Senstar Symphony installations via the FetchStoredLi...
📅 81 days ago • Dec 23, 2025This vulnerability allows remote attackers to include arbitrary PHP files via a filename parameter in TheGem Theme Elements for Elementor WordPress pl...
📅 82 days ago • Dec 23, 2025This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 82 days ago • Dec 23, 2025This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 82 days ago • Dec 23, 2025CVE-2024-24844 is a missing authorization vulnerability in PowerPack Pro for Elementor WordPress plugin that allows unauthenticated attackers to reset...
📅 82 days ago • Dec 23, 2025This CVE describes a Regular Expression Denial of Service (ReDoS) vulnerability in Fedify's document loader. Attackers can cause catastrophic backtrac...
📅 82 days ago • Dec 22, 2025This vulnerability in Xiongmai XM530 IP cameras exposes RTSP video streams through hardcoded credentials in the GetStreamUri function. Attackers can d...
📅 82 days ago • Dec 22, 2025CVE-2023-53972 is an unauthenticated SQL injection vulnerability in WebTareas 2.4 that allows attackers to manipulate database queries via the webTare...
📅 82 days ago • Dec 22, 2025D-Link DSL-124 routers running ME_1.00 firmware contain an unauthenticated configuration file disclosure vulnerability. Attackers can retrieve complet...
📅 82 days ago • Dec 22, 2025Atom CMS 2.0 contains an unauthenticated SQL injection vulnerability that allows remote attackers to execute arbitrary SQL commands without authentica...
📅 82 days ago • Dec 22, 2025This authentication bypass vulnerability in Screen SFT DAB 600/C devices allows attackers to reset device configurations without valid credentials by ...
📅 82 days ago • Dec 22, 2025This authentication bypass vulnerability in Screen SFT DAB 600/C firmware allows attackers to change the admin password without providing current cred...
📅 82 days ago • Dec 22, 2025This authentication bypass vulnerability in Screen SFT DAB 600/C firmware allows attackers to change user passwords without proper authentication by e...
📅 82 days ago • Dec 22, 2025CVE-2023-53962 is an unauthenticated directory traversal vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco v2.x that allows remote attackers to write arb...
📅 82 days ago • Dec 22, 2025CVE-2021-47713 is a denial of service vulnerability in Hasura GraphQL Engine where attackers can craft malicious GraphQL queries with excessive nested...
📅 82 days ago • Dec 22, 2025CVE-2025-66735 is an access control vulnerability in youlai-boot V2.21.1 where the getRoleForm function lacks proper permission checks. This allows no...
📅 82 days ago • Dec 22, 2025This vulnerability allows unauthorized attackers to access sensitive information through insecure permissions in the GT Edge AI Platform's /api/v1/age...
📅 82 days ago • Dec 22, 2025This vulnerability allows unauthorized attackers to access other users' uploaded files through the /api/v1/conversations/*/files API in GT Edge AI Pla...
📅 82 days ago • Dec 22, 2025This vulnerability allows unauthorized attackers to access other users' message history with AI agents through an incorrect access control flaw in the...
📅 82 days ago • Dec 22, 2025A path traversal vulnerability in Sharp Display Solutions projectors allows attackers to read arbitrary files on the device's filesystem. This affects...
📅 83 days ago • Dec 22, 2025CVE-2025-15015 is an arbitrary file read vulnerability in Ragic's Enterprise Cloud Database that allows unauthenticated remote attackers to download a...
📅 83 days ago • Dec 22, 2025The Live Composer WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input in the dslc_module_posts_output shortc...
📅 84 days ago • Dec 21, 2025This vulnerability allows unauthenticated attackers to access sensitive user metadata including password hashes via a REST API endpoint in the PostX W...
📅 84 days ago • Dec 21, 2025In Delphix Continuous Compliance 2025.3.0+, incorrect End-of-Record (EOR) configuration for delimited files can cause parsing errors that leave person...
📅 85 days ago • Dec 20, 2025CVE-2025-66905 is a path traversal vulnerability in the Takes web framework that allows remote attackers to read arbitrary files from the host system ...
📅 85 days ago • Dec 19, 2025This vulnerability allows unauthenticated attackers to cause denial of service by uploading specially crafted image files that trigger memory exhausti...
📅 85 days ago • Dec 19, 2025CVE-2025-50681 is a remote denial-of-service vulnerability in igmpproxy versions before commit 2b30c36. Attackers can crash the application by sending...
📅 85 days ago • Dec 19, 2025This vulnerability allows unauthenticated clients to read uninitialized heap memory from MongoDB servers by exploiting mismatched length fields in Zli...
📅 86 days ago • Dec 19, 2025This CVE describes an insecure deserialization vulnerability in the MiczFlor RPi-Jukebox-RFID project's rss-mp3.php script. Remote unauthenticated att...
📅 86 days ago • Dec 18, 2025BullWall Server Intrusion Protection has a timing vulnerability where MFA checks for RDP connections have a configuration-dependent delay. Remote auth...
📅 86 days ago • Dec 18, 2025A local, authenticated attacker can log into BullWall Server Intrusion Protection systems during the brief window after boot when login services are r...
📅 86 days ago • Dec 18, 2025An insecure deserialization vulnerability in Twittodon's download.php script allows remote, unauthenticated attackers to inject arbitrary PHP objects ...
📅 86 days ago • Dec 18, 2025This CVE describes a container escape vulnerability in Foundry Container Service where misconfigured deployments allow pods within the same namespace ...
📅 86 days ago • Dec 18, 2025A denial-of-service vulnerability in the omec-project UPF's pfcpiface component allows attackers to crash the UPF process by sending malformed PFCP Se...
📅 86 days ago • Dec 18, 2025This CVE describes a denial-of-service vulnerability in Kentico Xperience's GetResource handler where improper input validation allows attackers to se...
📅 86 days ago • Dec 18, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats