🔥 Trending CVEs - Last 30 Days
1,256 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This CVE describes an OS command injection vulnerability in TOTOLINK X6000R routers. Authenticated attackers can execute arbitrary shell commands by e...
📅 11 days ago • Feb 23, 2026This CVE describes a buffer overflow vulnerability in UTT HiPER 810G routers through manipulation of the GroupName parameter. Attackers can remotely e...
📅 12 days ago • Feb 23, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 12 days ago • Feb 23, 2026A remote stack-based buffer overflow vulnerability exists in D-Link DWR-M960 routers through the Scheduled Reboot Configuration endpoint. Attackers ca...
📅 12 days ago • Feb 23, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the save_appl...
📅 12 days ago • Feb 23, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 13 days ago • Feb 22, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 13 days ago • Feb 22, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 13 days ago • Feb 22, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 13 days ago • Feb 22, 2026A remote stack-based buffer overflow vulnerability in Tenda HG9 routers allows attackers to execute arbitrary code by manipulating the pingAddr parame...
📅 13 days ago • Feb 22, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda HG9 routers via a stack-based buffer overflow in the Diagnostic Ping End...
📅 13 days ago • Feb 22, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda HG9 routers via a stack-based buffer overflow in the GPON configuration ...
📅 13 days ago • Feb 22, 2026A stack-based buffer overflow vulnerability in Tenda HG9 routers allows remote attackers to execute arbitrary code by manipulating the ssid parameter ...
📅 13 days ago • Feb 22, 2026A buffer overflow vulnerability in the UTT HiPER 810G router's web interface allows remote attackers to execute arbitrary code by exploiting the strcp...
📅 13 days ago • Feb 22, 2026A remote stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows attackers to execute arbitrary code by manipulating the submit-ur...
📅 13 days ago • Feb 21, 2026A remote stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows attackers to execute arbitrary code by manipulating the submit-ur...
📅 14 days ago • Feb 21, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 14 days ago • Feb 21, 2026A stack-based buffer overflow vulnerability in Tenda A18 routers allows remote attackers to execute arbitrary code by exploiting the strcpy function i...
📅 14 days ago • Feb 21, 2026A stack-based buffer overflow vulnerability in Tenda A21 routers allows remote attackers to execute arbitrary code by manipulating the SSID parameter....
📅 14 days ago • Feb 21, 2026A stack-based buffer overflow vulnerability in Tenda A21 routers allows remote attackers to execute arbitrary code by manipulating time parameters in ...
📅 14 days ago • Feb 21, 2026CVE-2026-2871 is a remote stack-based buffer overflow vulnerability in Tenda A21 routers. Attackers can exploit this to execute arbitrary code or cras...
📅 14 days ago • Feb 21, 2026A stack-based buffer overflow vulnerability in Tenda A21 routers allows remote attackers to execute arbitrary code by manipulating the QoS configurati...
📅 14 days ago • Feb 21, 2026ZoneMinder versions 1.36.37 and below and 1.37.61 through 1.38.0 contain a second-order SQL injection vulnerability in the web/ajax/status.php file. A...
📅 14 days ago • Feb 21, 2026This vulnerability allows authenticated users with editor roles in Formwork CMS to create new accounts with administrative privileges. It affects all ...
📅 14 days ago • Feb 21, 2026CVE-2026-27168 is a heap-based buffer overflow vulnerability in SAIL's XWD image parser that allows attackers to execute arbitrary code or cause denia...
📅 14 days ago • Feb 21, 2026This vulnerability allows authenticated remote attackers to execute arbitrary commands on Nagios Host installations through command injection in the m...
📅 14 days ago • Feb 20, 2026This vulnerability allows remote authenticated attackers to bypass authentication and execute arbitrary code with SYSTEM privileges on GFI Archiver in...
📅 14 days ago • Feb 20, 2026phpMoAdmin 1.1.5 contains a CSRF vulnerability that allows attackers to trick authenticated administrators into performing unauthorized database opera...
📅 14 days ago • Feb 20, 2026CVE-2018-25158 is an arbitrary file upload vulnerability in Chamilo LMS that allows authenticated users to upload PHP files disguised as images, then ...
📅 14 days ago • Feb 20, 2026A stack-based buffer overflow vulnerability in the D-Link DWR-M960 router's port forwarding configuration endpoint allows remote attackers to execute ...
📅 14 days ago • Feb 20, 2026A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...
📅 15 days ago • Feb 20, 2026This vulnerability allows remote attackers to execute arbitrary code on D-Link DWR-M960 routers through a stack-based buffer overflow in the DDNS sett...
📅 15 days ago • Feb 20, 2026OpenSourcePOS 3.4.1 contains a Local File Inclusion vulnerability that allows attackers to read arbitrary files on the web server by manipulating invo...
📅 15 days ago • Feb 20, 2026This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Dotstore Woocommerce Category Banner ...
📅 15 days ago • Feb 20, 2026This CVE describes a PHP object injection vulnerability in the WordPress Slider Responsive Slideshow plugin, allowing attackers to execute arbitrary c...
📅 15 days ago • Feb 20, 2026This CVE describes a PHP object injection vulnerability in the PeakShops WordPress theme caused by unsafe deserialization of user-controlled data. Att...
📅 15 days ago • Feb 20, 2026This CVE describes a PHP object injection vulnerability in the Kleor Contact Manager WordPress plugin. Attackers can exploit insecure deserialization ...
📅 15 days ago • Feb 20, 2026This CVE describes a PHP object injection vulnerability in the ModelTheme Addons for WPBakery and Elementor WordPress plugin. Attackers can exploit in...
📅 15 days ago • Feb 20, 2026This vulnerability allows attackers to bypass authentication in the Miraculous Elementor WordPress plugin, potentially gaining unauthorized access to ...
📅 15 days ago • Feb 20, 2026LibreNMS versions 25.12.0 and below contain a time-based blind SQL injection vulnerability in the address-search functionality. Authenticated attacker...
📅 15 days ago • Feb 20, 2026CVE-2026-26065 is a path traversal vulnerability in calibre's PDB readers that allows attackers to write arbitrary files anywhere the user has write p...
📅 15 days ago • Feb 20, 2026CVE-2026-26975 is a critical path traversal vulnerability in Music Assistant that allows unauthenticated attackers on the same network to write arbitr...
📅 15 days ago • Feb 20, 2026OpenClaw versions 2026.1.8 through 2026.2.13 have a command injection vulnerability in a developer script that processes git commit metadata. When mai...
📅 15 days ago • Feb 19, 2026Dell Unisphere for PowerMax versions 10.2 contain a missing authorization vulnerability that allows low-privileged remote attackers to gain unauthoriz...
📅 16 days ago • Feb 19, 2026This CVE describes a PHP object injection vulnerability in the Valenti WordPress theme caused by unsafe deserialization of untrusted data. Attackers c...
📅 16 days ago • Feb 19, 2026This CVE describes an access control bypass vulnerability in Gogs self-hosted Git service where users with Write permissions can delete protected bran...
📅 16 days ago • Feb 19, 2026The Toret Manager WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to ...
📅 16 days ago • Feb 19, 2026This vulnerability in the IDonate WordPress plugin allows authenticated attackers with Subscriber-level access or higher to escalate privileges to adm...
📅 16 days ago • Feb 19, 2026The WP AUDIO GALLERY WordPress plugin up to version 2.0 allows authenticated attackers with subscriber-level access or higher to overwrite the site's ...
📅 16 days ago • Feb 19, 2026This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to access plugin table data containing email logs. Atta...
📅 16 days ago • Feb 19, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats