🔥 Trending CVEs - Last 30 Days

1,256 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
2,743
Total CVEs Published
303
Critical Severity
953
High Severity
⚠️
Critical Alert
303 critical vulnerabilities published in the last 30 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2025-70328 8.8

This CVE describes an OS command injection vulnerability in TOTOLINK X6000R routers. Authenticated attackers can execute arbitrary shell commands by e...

📅 11 days ago • Feb 23, 2026
CVE-2026-3015 8.8

This CVE describes a buffer overflow vulnerability in UTT HiPER 810G routers through manipulation of the GroupName parameter. Attackers can remotely e...

📅 12 days ago • Feb 23, 2026
CVE-2026-2960 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 12 days ago • Feb 23, 2026
CVE-2026-2962 8.8

A remote stack-based buffer overflow vulnerability exists in D-Link DWR-M960 routers through the Scheduled Reboot Configuration endpoint. Attackers ca...

📅 12 days ago • Feb 23, 2026
CVE-2026-2958 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the save_appl...

📅 12 days ago • Feb 23, 2026
CVE-2026-2929 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 13 days ago • Feb 22, 2026
CVE-2026-2928 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 13 days ago • Feb 22, 2026
CVE-2026-2926 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 13 days ago • Feb 22, 2026
CVE-2026-2925 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 13 days ago • Feb 22, 2026
CVE-2026-2910 8.8

A remote stack-based buffer overflow vulnerability in Tenda HG9 routers allows attackers to execute arbitrary code by manipulating the pingAddr parame...

📅 13 days ago • Feb 22, 2026
CVE-2026-2909 8.8

This vulnerability allows remote attackers to execute arbitrary code on Tenda HG9 routers via a stack-based buffer overflow in the Diagnostic Ping End...

📅 13 days ago • Feb 22, 2026
CVE-2026-2907 8.8

This vulnerability allows remote attackers to execute arbitrary code on Tenda HG9 routers via a stack-based buffer overflow in the GPON configuration ...

📅 13 days ago • Feb 22, 2026
CVE-2026-2905 8.8

A stack-based buffer overflow vulnerability in Tenda HG9 routers allows remote attackers to execute arbitrary code by manipulating the ssid parameter ...

📅 13 days ago • Feb 22, 2026
CVE-2026-2904 8.8

A buffer overflow vulnerability in the UTT HiPER 810G router's web interface allows remote attackers to execute arbitrary code by exploiting the strcp...

📅 13 days ago • Feb 22, 2026
CVE-2026-2885 8.8

A remote stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows attackers to execute arbitrary code by manipulating the submit-ur...

📅 13 days ago • Feb 21, 2026
CVE-2026-2883 8.8

A remote stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows attackers to execute arbitrary code by manipulating the submit-ur...

📅 14 days ago • Feb 21, 2026
CVE-2026-2881 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 14 days ago • Feb 21, 2026
CVE-2026-2877 8.8

A stack-based buffer overflow vulnerability in Tenda A18 routers allows remote attackers to execute arbitrary code by exploiting the strcpy function i...

📅 14 days ago • Feb 21, 2026
CVE-2026-2874 8.8

A stack-based buffer overflow vulnerability in Tenda A21 routers allows remote attackers to execute arbitrary code by manipulating the SSID parameter....

📅 14 days ago • Feb 21, 2026
CVE-2026-2873 8.8

A stack-based buffer overflow vulnerability in Tenda A21 routers allows remote attackers to execute arbitrary code by manipulating time parameters in ...

📅 14 days ago • Feb 21, 2026
CVE-2026-2871 8.8

CVE-2026-2871 is a remote stack-based buffer overflow vulnerability in Tenda A21 routers. Attackers can exploit this to execute arbitrary code or cras...

📅 14 days ago • Feb 21, 2026
CVE-2026-2870 8.8

A stack-based buffer overflow vulnerability in Tenda A21 routers allows remote attackers to execute arbitrary code by manipulating the QoS configurati...

📅 14 days ago • Feb 21, 2026
CVE-2026-27470 8.8

ZoneMinder versions 1.36.37 and below and 1.37.61 through 1.38.0 contain a second-order SQL injection vulnerability in the web/ajax/status.php file. A...

📅 14 days ago • Feb 21, 2026
CVE-2026-27198 8.8

This vulnerability allows authenticated users with editor roles in Formwork CMS to create new accounts with administrative privileges. It affects all ...

📅 14 days ago • Feb 21, 2026
CVE-2026-27168 8.8

CVE-2026-27168 is a heap-based buffer overflow vulnerability in SAIL's XWD image parser that allows attackers to execute arbitrary code or cause denia...

📅 14 days ago • Feb 21, 2026
CVE-2026-2042 8.8

This vulnerability allows authenticated remote attackers to execute arbitrary commands on Nagios Host installations through command injection in the m...

📅 14 days ago • Feb 20, 2026
CVE-2026-2036 8.8

This vulnerability allows remote authenticated attackers to bypass authentication and execute arbitrary code with SYSTEM privileges on GFI Archiver in...

📅 14 days ago • Feb 20, 2026
CVE-2019-25451 8.8

phpMoAdmin 1.1.5 contains a CSRF vulnerability that allows attackers to trick authenticated administrators into performing unauthorized database opera...

📅 14 days ago • Feb 20, 2026
CVE-2018-25158 8.8

CVE-2018-25158 is an arbitrary file upload vulnerability in Chamilo LMS that allows authenticated users to upload PHP files disguised as images, then ...

📅 14 days ago • Feb 20, 2026
CVE-2026-2857 8.8

A stack-based buffer overflow vulnerability in the D-Link DWR-M960 router's port forwarding configuration endpoint allows remote attackers to execute ...

📅 14 days ago • Feb 20, 2026
CVE-2026-2853 8.8

A stack-based buffer overflow vulnerability in D-Link DWR-M960 routers allows remote attackers to execute arbitrary code by manipulating the submit-ur...

📅 15 days ago • Feb 20, 2026
CVE-2026-2855 8.8

This vulnerability allows remote attackers to execute arbitrary code on D-Link DWR-M960 routers through a stack-based buffer overflow in the DDNS sett...

📅 15 days ago • Feb 20, 2026
CVE-2026-26746 8.8

OpenSourcePOS 3.4.1 contains a Local File Inclusion vulnerability that allows attackers to read arbitrary files on the web server by manipulating invo...

📅 15 days ago • Feb 20, 2026
CVE-2026-22354 8.8

This vulnerability allows attackers to inject malicious objects through deserialization of untrusted data in the Dotstore Woocommerce Category Banner ...

📅 15 days ago • Feb 20, 2026
CVE-2026-22346 8.8

This CVE describes a PHP object injection vulnerability in the WordPress Slider Responsive Slideshow plugin, allowing attackers to execute arbitrary c...

📅 15 days ago • Feb 20, 2026
CVE-2025-69294 8.8

This CVE describes a PHP object injection vulnerability in the PeakShops WordPress theme caused by unsafe deserialization of user-controlled data. Att...

📅 15 days ago • Feb 20, 2026
CVE-2025-68853 8.8

This CVE describes a PHP object injection vulnerability in the Kleor Contact Manager WordPress plugin. Attackers can exploit insecure deserialization ...

📅 15 days ago • Feb 20, 2026
CVE-2025-68531 8.8

This CVE describes a PHP object injection vulnerability in the ModelTheme Addons for WPBakery and Elementor WordPress plugin. Attackers can exploit in...

📅 15 days ago • Feb 20, 2026
CVE-2025-67998 8.8

This vulnerability allows attackers to bypass authentication in the Miraculous Elementor WordPress plugin, potentially gaining unauthorized access to ...

📅 15 days ago • Feb 20, 2026
CVE-2026-26990 8.8

LibreNMS versions 25.12.0 and below contain a time-based blind SQL injection vulnerability in the address-search functionality. Authenticated attacker...

📅 15 days ago • Feb 20, 2026
CVE-2026-26065 8.8

CVE-2026-26065 is a path traversal vulnerability in calibre's PDB readers that allows attackers to write arbitrary files anywhere the user has write p...

📅 15 days ago • Feb 20, 2026
CVE-2026-26975 8.8

CVE-2026-26975 is a critical path traversal vulnerability in Music Assistant that allows unauthenticated attackers on the same network to write arbitr...

📅 15 days ago • Feb 20, 2026
CVE-2026-26323 8.8

OpenClaw versions 2026.1.8 through 2026.2.13 have a command injection vulnerability in a developer script that processes git commit metadata. When mai...

📅 15 days ago • Feb 19, 2026
CVE-2026-26358 8.8

Dell Unisphere for PowerMax versions 10.2 contain a missing authorization vulnerability that allows low-privileged remote attackers to gain unauthoriz...

📅 16 days ago • Feb 19, 2026
CVE-2026-23544 8.8

This CVE describes a PHP object injection vulnerability in the Valenti WordPress theme caused by unsafe deserialization of untrusted data. Attackers c...

📅 16 days ago • Feb 19, 2026
CVE-2026-25232 8.8

This CVE describes an access control bypass vulnerability in Gogs self-hosted Git service where users with Write permissions can delete protected bran...

📅 16 days ago • Feb 19, 2026
CVE-2026-0912 8.8

The Toret Manager WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to ...

📅 16 days ago • Feb 19, 2026
CVE-2025-4521 8.8

This vulnerability in the IDonate WordPress plugin allows authenticated attackers with Subscriber-level access or higher to escalate privileges to adm...

📅 16 days ago • Feb 19, 2026
CVE-2025-13603 8.8

The WP AUDIO GALLERY WordPress plugin up to version 2.0 allows authenticated attackers with subscriber-level access or higher to overwrite the site's ...

📅 16 days ago • Feb 19, 2026
CVE-2025-12845 8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to access plugin table data containing email logs. Atta...

📅 16 days ago • Feb 19, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free