🔥 Trending CVEs - Last 90 Days
4,671 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This critical vulnerability in Ivanti Endpoint Manager Mobile allows unauthenticated attackers to inject malicious code and execute arbitrary commands...
📅 36 days ago • Jan 29, 2026CVE-2026-1281 is a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows unauthenticated attackers to execute arb...
📅 36 days ago • Jan 29, 2026This vulnerability in N3uron Web User Interface v1.21.7-240207.1047 allows remote attackers to escalate privileges by exploiting weak client-side pass...
📅 37 days ago • Jan 29, 2026An unauthenticated attacker can create or delete administrator accounts on KiloView Encoder Series devices, granting full administrative control. This...
📅 37 days ago • Jan 29, 2026CVE-2026-1188 is a buffer overflow vulnerability in Eclipse OMR's port library component where an API function fails to properly account for separator...
📅 37 days ago • Jan 29, 2026A heap buffer overflow vulnerability in bulk_extractor's embedded unrar code allows attackers to trigger out-of-bounds writes when processing crafted ...
📅 37 days ago • Jan 28, 2026CVE-2025-61140 is a prototype pollution vulnerability in jsonpath 1.1.1 that allows attackers to modify object prototypes, potentially leading to remo...
📅 38 days ago • Jan 28, 2026SolarWinds Web Help Desk has an unauthenticated remote code execution vulnerability via untrusted data deserialization. Attackers can execute arbitrar...
📅 38 days ago • Jan 28, 2026SolarWinds Web Help Desk contains an authentication bypass vulnerability that allows attackers to execute privileged actions without valid credentials...
📅 38 days ago • Jan 28, 2026SolarWinds Web Help Desk has an unauthenticated remote code execution vulnerability via untrusted data deserialization. Attackers can exploit this to ...
📅 38 days ago • Jan 28, 2026SolarWinds Web Help Desk contains an authentication bypass vulnerability that allows attackers to execute specific actions without proper credentials....
📅 38 days ago • Jan 28, 2026CVE-2026-24770 is a critical Zip Slip vulnerability in RAGFlow's MinerU parser that allows attackers to overwrite arbitrary files on the server via ma...
📅 38 days ago • Jan 27, 2026This authentication bypass vulnerability in Juniper Session Smart products allows network-based attackers to gain administrative control without valid...
📅 38 days ago • Jan 27, 2026This authentication bypass vulnerability allows attackers with a FortiCloud account and registered device to log into other organizations' Fortinet de...
📅 39 days ago • Jan 27, 2026CVE-2025-69564 is a critical SQL injection vulnerability in code-projects Mobile Shop Management System 1.0 that allows attackers to execute arbitrary...
📅 39 days ago • Jan 27, 2026Computer Book Store 1.0 contains an unrestricted file upload vulnerability in admin_add.php that allows attackers to upload malicious files. This can ...
📅 39 days ago • Jan 27, 2026CVE-2025-69562 is a critical SQL injection vulnerability in code-projects Mobile Shop Management System 1.0 that allows attackers to execute arbitrary...
📅 39 days ago • Jan 27, 2026CVE-2025-69563 is a critical SQL injection vulnerability in code-projects Mobile Shop Management System 1.0 that allows attackers to execute arbitrary...
📅 39 days ago • Jan 27, 2026CVE-2026-24872 is an improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548 that could allow attackers to execute arbitrary code or c...
📅 39 days ago • Jan 27, 2026CVE-2026-24832 is an out-of-bounds write vulnerability in ixray-team's ixray-1.6-stcop software that allows attackers to write data beyond allocated m...
📅 39 days ago • Jan 27, 2026CVE-2025-69565 is an unrestricted file upload vulnerability in code-projects Mobile Shop Management System 1.0 that allows attackers to upload malicio...
📅 39 days ago • Jan 27, 2026This vulnerability allows attackers to trigger a stack buffer overflow by sending maliciously crafted CMS AuthEnvelopedData messages with oversized IV...
📅 39 days ago • Jan 27, 2026Dirsearch 0.4.1 contains a CSV injection vulnerability that allows attackers to inject Excel formulas into generated CSV reports. When attackers contr...
📅 39 days ago • Jan 27, 2026CVE-2021-47900 is a critical remote code execution vulnerability in Gila CMS that allows unauthenticated attackers to execute arbitrary system command...
📅 39 days ago • Jan 27, 2026An integer overflow vulnerability in Ralim IronOS firmware allows attackers to cause memory corruption through improper arithmetic operations. This af...
📅 39 days ago • Jan 27, 2026This CVE describes a vulnerability in the ROOT data analysis framework's built-in zlib modules, specifically in the inffast.C program files. The vulne...
📅 39 days ago • Jan 27, 2026This CVE describes a classic buffer overflow vulnerability in AzerothCore's Wrath of the Lich King implementation, specifically in the zlib dependency...
📅 39 days ago • Jan 27, 2026This vulnerability allows attackers to achieve remote code execution by uploading malicious ZIP archives containing path traversal sequences. The flaw...
📅 39 days ago • Jan 27, 2026This vulnerability in vm2 sandbox for Node.js allows attackers to bypass Promise callback sanitization and escape the sandbox environment. Attackers c...
📅 39 days ago • Jan 26, 2026This vulnerability allows attackers to perform unlimited brute-force attacks against administrative credentials on Tenda W30E V2 routers. Attackers ca...
📅 40 days ago • Jan 26, 2026This vulnerability allows attackers to use hardcoded default credentials to gain administrative access to Tenda W30E V2 routers. Anyone using affected...
📅 40 days ago • Jan 26, 2026The Kalrav AI Agent WordPress plugin allows unauthenticated attackers to upload arbitrary files due to missing file type validation. This vulnerabilit...
📅 42 days ago • Jan 24, 2026This vulnerability allows remote code execution through malicious web pages containing specially crafted GPU shader code. When loaded, it triggers a u...
📅 42 days ago • Jan 24, 2026This vulnerability allows attackers to inject malicious arguments into Salesforce Marketing Cloud commands through the CloudPagesUrl module, potential...
📅 42 days ago • Jan 24, 2026This CVE describes a broken cryptographic algorithm vulnerability in Salesforce Marketing Cloud Engagement that allows attackers to manipulate web ser...
📅 42 days ago • Jan 24, 2026A hard-coded cryptographic key vulnerability in Salesforce Marketing Cloud Engagement allows attackers to manipulate web services protocols by bypassi...
📅 42 days ago • Jan 24, 2026This vulnerability allows attackers to inject malicious arguments into Salesforce Marketing Cloud commands through the MicrositeUrl module, potentiall...
📅 42 days ago • Jan 24, 2026This vulnerability allows unauthenticated attackers to upload malicious PHP files disguised as images to the Modern Image Gallery App v1.0. Successful...
📅 42 days ago • Jan 23, 2026This vulnerability allows unauthenticated attackers to execute arbitrary operating system commands on SmarterMail servers by pointing them to maliciou...
📅 43 days ago • Jan 23, 2026An improper certificate validation vulnerability in ToDesktop Builder v0.32.1 allows an unauthenticated, on-path attacker to spoof backend responses b...
📅 43 days ago • Jan 23, 2026CVE-2022-25369 is an authentication bypass vulnerability in Dynamicweb CMS that allows unauthenticated attackers to create new administrator accounts....
📅 43 days ago • Jan 23, 2026CVE-2021-47891 is a critical remote code execution vulnerability in Unified Remote 3.9.0.2463 that allows attackers to send crafted network packets to...
📅 43 days ago • Jan 23, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 43 days ago • Jan 23, 2026This vulnerability allows unauthenticated remote attackers to bypass authentication and gain administrator privileges by manipulating the web front-en...
📅 43 days ago • Jan 23, 2026CVE-2026-1364 is a critical missing authentication vulnerability in IAQS and I6 systems developed by JNC. Unauthenticated remote attackers can directl...
📅 43 days ago • Jan 23, 2026CVE-2026-0793 is a heap-based buffer overflow vulnerability in the InformaCast functionality of ALGO 8180 IP Audio Alerter devices, allowing remote at...
📅 43 days ago • Jan 23, 2026CVE-2026-0794 is a use-after-free vulnerability in ALGO 8180 IP Audio Alerter devices that allows remote attackers to execute arbitrary code without a...
📅 43 days ago • Jan 23, 2026CVE-2026-0787 is a command injection vulnerability in ALGO 8180 IP Audio Alerter devices that allows unauthenticated remote attackers to execute arbit...
📅 43 days ago • Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary code on ALGO 8180 IP Audio Alerter devices without authentication by sending specially...
📅 43 days ago • Jan 23, 2026This vulnerability allows unauthenticated remote attackers to execute arbitrary code on ALGO 8180 IP Audio Alerter devices by sending specially crafte...
📅 43 days ago • Jan 23, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats