🔥 Trending CVEs - Last 90 Days
4,389 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability allows authenticated attackers to upload arbitrary files to mobility conductors running AOS-10 or AOS-8 operating systems. Successf...
📅 61 days ago • Jan 13, 2026A stack overflow vulnerability in the AOS-10 web management interface of HPE Mobility Gateway allows authenticated attackers to execute arbitrary code...
📅 61 days ago • Jan 13, 2026Authenticated command injection vulnerabilities in Aruba mobility conductors running AOS-8 allow attackers with valid credentials to execute arbitrary...
📅 61 days ago • Jan 13, 2026This vulnerability in SQL Server allows attackers with existing network access to bypass authentication checks and execute privileged functions. It af...
📅 61 days ago • Jan 13, 2026This SQL injection vulnerability in Fortinet FortiClientEMS allows authenticated attackers with read-only admin permissions to execute unauthorized SQ...
📅 61 days ago • Jan 13, 2026Gin-vue-admin versions up to 2.8.7 contain a path traversal vulnerability in the breakpoint resume upload functionality. Attackers with file upload pr...
📅 62 days ago • Jan 12, 2026Vivotek IP7137 cameras with vulnerable firmware allow authenticated attackers to execute arbitrary system commands via command injection in the system...
📅 65 days ago • Jan 9, 2026This vulnerability in the Eventin WordPress plugin allows unauthenticated attackers to modify plugin settings and inject malicious scripts. Attackers ...
📅 65 days ago • Jan 9, 2026This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress sites using the Frontend Admin plugin. The injected ...
📅 65 days ago • Jan 9, 2026The SlimStat Analytics WordPress plugin has a stored XSS vulnerability in versions up to 5.3.4 that allows unauthenticated attackers to inject malicio...
📅 65 days ago • Jan 9, 2026The SlimStat Analytics WordPress plugin has a stored XSS vulnerability in all versions up to 5.3.3. Unauthenticated attackers can inject malicious scr...
📅 65 days ago • Jan 9, 2026OpenMetadata versions before 1.11.4 contain a Server-Side Template Injection vulnerability in FreeMarker email templates that allows remote code execu...
📅 66 days ago • Jan 8, 2026CVE-2026-22241 is an arbitrary file upload vulnerability in Open eClass (formerly GUnet eClass) that allows authenticated administrators to upload mal...
📅 66 days ago • Jan 8, 2026This vulnerability in NiceGUI allows attackers to manipulate URL fragment identifiers via cross-site iframe attacks, potentially enabling UI manipulat...
📅 66 days ago • Jan 8, 2026This CVE describes a time-based blind SQL injection vulnerability in Tarkov Data Manager's webhook edit and scanner API endpoints. Authenticated attac...
📅 67 days ago • Jan 7, 2026This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDnet TEW-811DRU routers by manipulating the DeviceURL...
📅 67 days ago • Jan 7, 2026This vulnerability allows authenticated remote code execution in Craft CMS when an attacker with administrator access uploads a malicious Behavior att...
📅 69 days ago • Jan 5, 2026CVE-2025-66648 is a cross-site scripting (XSS) vulnerability in vega-functions library that allows attackers to execute arbitrary JavaScript code by e...
📅 69 days ago • Jan 5, 2026This vulnerability allows authenticated users with high privileges to inject arbitrary operating system commands through backup configuration paramete...
📅 69 days ago • Jan 5, 2026Signal K Server versions before 2.19.0 allow authenticated administrators to install npm packages from arbitrary sources via the appstore interface. T...
📅 73 days ago • Jan 1, 2026CVE-2022-50787 is an unauthenticated stored cross-site scripting vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco software versions 2.x. Attackers can i...
📅 75 days ago • Dec 30, 2025This vulnerability allows authenticated WordPress administrators to execute arbitrary PHP code on servers running the Lucky Wheel for WooCommerce plug...
📅 75 days ago • Dec 30, 2025The Advanced Ads WordPress plugin up to version 2.0.14 contains a remote code execution vulnerability via the 'change-ad__content' shortcode parameter...
📅 76 days ago • Dec 29, 2025A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execute arbitrary code by sending specially crafted HTTP...
📅 76 days ago • Dec 29, 2025This vulnerability in Tenda WH450 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the HTTP request hand...
📅 76 days ago • Dec 29, 2025A stack-based buffer overflow vulnerability in Tenda WH450 router firmware version 1.0.0.18 allows remote attackers to execute arbitrary code by manip...
📅 76 days ago • Dec 29, 2025A stack-based buffer overflow vulnerability in Tenda WH450 router firmware version 1.0.0.18 allows remote attackers to execute arbitrary code by sendi...
📅 76 days ago • Dec 29, 2025This vulnerability in Tenda WH450 routers allows remote attackers to execute arbitrary code via a stack-based buffer overflow in the SafeEmailFilter f...
📅 77 days ago • Dec 29, 2025A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parame...
📅 77 days ago • Dec 29, 2025A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execute arbitrary code by manipulating the 'page' parame...
📅 77 days ago • Dec 29, 2025This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers via a stack-based buffer overflow in the PPTPServer compon...
📅 77 days ago • Dec 28, 2025A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execute arbitrary code by manipulating the 'delno' param...
📅 77 days ago • Dec 28, 2025This vulnerability allows remote attackers to execute arbitrary commands on affected camera systems due to improper input validation in video analytic...
📅 80 days ago • Dec 26, 2025This vulnerability in BlueChi allows a root user on a managed node to create or modify systemd service unit files on the host node, leading to privile...
📅 81 days ago • Dec 24, 2025This vulnerability allows authenticated remote attackers to execute arbitrary operating system commands on DreamFactory instances. Attackers can achie...
📅 82 days ago • Dec 23, 2025PhotoShow 3.0 contains a remote code execution vulnerability where authenticated administrators can inject malicious commands through the exiftran pat...
📅 83 days ago • Dec 22, 2025This vulnerability allows unauthenticated attackers to bypass authentication in Mattermost's Jira plugin and make authenticated requests to Jira serve...
📅 83 days ago • Dec 22, 2025This SQL injection vulnerability in Centreon's Open-tickets module allows authenticated users with elevated privileges to execute arbitrary SQL comman...
📅 83 days ago • Dec 22, 2025The SureForms WordPress plugin has a stored cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts into ...
📅 84 days ago • Dec 21, 2025The ELEX WordPress HelpDesk & Customer Ticketing System plugin has a stored XSS vulnerability that allows unauthenticated attackers to inject maliciou...
📅 85 days ago • Dec 21, 2025This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the HTML5 Audio Player WordPress plugin. Unauthenticated attackers can exploi...
📅 86 days ago • Dec 19, 2025The Ocean Modal Window WordPress plugin before version 2.3.3 contains a remote code execution vulnerability. Attackers can exploit this by manipulatin...
📅 86 days ago • Dec 19, 2025This CVE describes a cross-site scripting (XSS) vulnerability in Vega visualization components that allows authenticated users to inject malicious scr...
📅 87 days ago • Dec 18, 2025This vulnerability in Microsoft Purview allows authenticated attackers to execute arbitrary code remotely by exploiting improper input validation in p...
📅 87 days ago • Dec 18, 2025This CVE describes a command injection vulnerability in the firmware update service of D-Link DIR-605 routers with firmware version 202WWB03. Attacker...
📅 87 days ago • Dec 18, 2025This vulnerability allows attackers to escalate privileges in WordPress sites using the PostX (ultimate-post) plugin. Attackers can gain administrativ...
📅 87 days ago • Dec 18, 2025This vulnerability allows attackers to escalate privileges in the Custom Fields Account Registration For Woocommerce WordPress plugin. Attackers can g...
📅 87 days ago • Dec 18, 2025This vulnerability allows authenticated attackers to execute arbitrary operating system commands on Ruijie Networks AP180 series wireless access point...
📅 87 days ago • Dec 18, 2025This CVE describes a Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail that allows attackers to inject malicious scripts via the animate t...
📅 88 days ago • Dec 18, 2025Roundcube Webmail contains an information disclosure vulnerability in its HTML style sanitizer that could allow attackers to extract sensitive data fr...
📅 88 days ago • Dec 18, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats