🔥 Trending CVEs - Last 30 Days
1,255 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
Centova Cast 3.2.11 contains an arbitrary file download vulnerability in the server.copyfile API endpoint. Authenticated attackers can exploit this to...
📅 17 days ago • Feb 18, 2026The Advanced AJAX Product Filters WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input in the Live Composer c...
📅 17 days ago • Feb 18, 2026CVE-2025-13689 is an unrestricted file upload vulnerability in IBM DataStage on Cloud Pak for Data that allows authenticated users to upload malicious...
📅 17 days ago • Feb 17, 2026This authentication bypass vulnerability in the application API allows remote attackers to create unauthorized administrative accounts. Attackers can ...
📅 18 days ago • Feb 17, 2026This CVE describes a command injection vulnerability in Tenable Security Center that allows authenticated remote attackers to execute arbitrary comman...
📅 18 days ago • Feb 17, 2026This CVE describes a stack-based buffer overflow vulnerability in TOTOLINK A3002RU routers. Attackers can exploit this by sending specially crafted vp...
📅 18 days ago • Feb 17, 2026CVE-2024-55270 is an SQL injection vulnerability in phpgurukul Student Management System 1.0 that allows attackers to execute arbitrary SQL commands t...
📅 18 days ago • Feb 17, 2026This vulnerability in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code on the server by manipulating the JDBC configuration URL parameter...
📅 18 days ago • Feb 17, 2026This vulnerability involves hard-coded credentials in the web management interface of Beetel 777VR1 routers. Attackers on the local network can exploi...
📅 18 days ago • Feb 17, 2026This vulnerability allows authenticated attackers with Subscriber-level access or higher to include and execute arbitrary .html files on WordPress ser...
📅 18 days ago • Feb 17, 2026The WowRevenue WordPress plugin allows authenticated attackers with subscriber-level access or higher to install arbitrary plugins due to missing capa...
📅 19 days ago • Feb 16, 2026A heap buffer overflow vulnerability in libvpx video codec library allows attackers to execute arbitrary code or cause denial of service. This affects...
📅 19 days ago • Feb 16, 2026This vulnerability allows any authenticated low-privileged user in eNet SMART HOME server to reset passwords of any account, including administrators,...
📅 20 days ago • Feb 15, 2026A stack-based buffer overflow in the Alps Alpine Bluetooth stack of Bosch Infotainment ECUs allows remote code execution with root privileges. Attacke...
📅 20 days ago • Feb 15, 2026LavaLite CMS 10.1.0 has an access control vulnerability where authenticated users with low-level privileges can bypass role restrictions and access th...
📅 22 days ago • Feb 13, 2026This vulnerability in the Starfish Review Generation & Marketing WordPress plugin allows authenticated attackers with Subscriber-level access or highe...
📅 22 days ago • Feb 13, 2026This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to execute arbitrary code within the browser's sandbox by t...
📅 22 days ago • Feb 13, 2026This authentication bypass vulnerability in Universal Software Inc.'s FlexCity/Kiosk software allows attackers to gain unauthorized access and escalat...
📅 22 days ago • Feb 13, 2026FileZen contains an OS command injection vulnerability that allows authenticated users to execute arbitrary operating system commands when the virus c...
📅 22 days ago • Feb 13, 2026CVE-2019-25318 is a stack overflow vulnerability in AVS Audio Converter 9.1.2.600 that allows remote code execution when attackers manipulate the outp...
📅 22 days ago • Feb 12, 2026This vulnerability allows users with create/update permissions in Yoke's Air Traffic Controller to execute arbitrary WASM code by injecting malicious ...
📅 23 days ago • Feb 12, 2026This vulnerability allows authenticated users of AutoGPT to execute arbitrary code on the backend server by bypassing disabled block restrictions. Att...
📅 23 days ago • Feb 12, 2026This vulnerability in authentik allows attackers to bypass SAML authentication by injecting malicious assertions before legitimate signed ones. It aff...
📅 23 days ago • Feb 12, 2026This vulnerability in Infoblox NIOS allows attackers to execute arbitrary code remotely through insecure deserialization. It affects all Infoblox NIOS...
📅 23 days ago • Feb 12, 2026This vulnerability in PostgreSQL's intarray extension allows attackers to execute arbitrary code with the privileges of the database operating system ...
📅 23 days ago • Feb 12, 2026A buffer overflow vulnerability in PostgreSQL's text manipulation functions allows authenticated database users to execute arbitrary code with the pri...
📅 23 days ago • Feb 12, 2026JUNG Smart Visu Server 1.1.1050 has a request header manipulation vulnerability where unauthenticated attackers can inject arbitrary values in the X-F...
📅 23 days ago • Feb 12, 2026CVE-2026-0969 allows remote attackers to execute arbitrary code on servers using next-mdx-remote when processing untrusted MDX content. This occurs be...
📅 23 days ago • Feb 12, 2026This CVE describes a sandbox escape vulnerability in Apple operating systems where a malicious app could bypass security restrictions designed to isol...
📅 23 days ago • Feb 11, 2026CVE-2024-50619 allows authenticated low-privileged users in CIPPlanner CIPAce to escalate privileges by manipulating user IDs to access other accounts...
📅 24 days ago • Feb 11, 2026This vulnerability allows authorized users to upload executable files through CIPPlanner CIPAce's rich text editor and document management components....
📅 24 days ago • Feb 11, 2026This is a use-after-free vulnerability in Chrome's Ozone component that could allow heap corruption when users perform specific UI gestures on a malic...
📅 24 days ago • Feb 11, 2026This vulnerability in Chrome's WebGPU implementation allows attackers to access memory outside intended boundaries via malicious web pages. It affects...
📅 24 days ago • Feb 11, 2026This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to potentially exploit heap corruption. Attackers can trigg...
📅 24 days ago • Feb 11, 2026This vulnerability allows authenticated users of Pacom Unison Client 5.13.1 to inject malicious scripts into Report Templates. When specific script co...
📅 24 days ago • Feb 11, 2026This vulnerability in AMD Graphics Driver allows attackers to execute arbitrary code by exploiting improper input validation of pointers. It affects s...
📅 24 days ago • Feb 11, 2026A static code injection vulnerability in QNAP File Station 5 allows authenticated attackers to access restricted files and data. This affects users of...
📅 24 days ago • Feb 11, 2026An out-of-bounds write vulnerability in Qsync Central allows authenticated remote attackers to modify or corrupt memory. This affects QNAP Qsync Centr...
📅 24 days ago • Feb 11, 2026The Videospirecore Theme Plugin for WordPress has an authentication bypass vulnerability that allows authenticated attackers with Subscriber-level acc...
📅 24 days ago • Feb 11, 2026This vulnerability in the Lazy Blocks WordPress plugin allows authenticated attackers with Contributor-level access or higher to execute arbitrary cod...
📅 24 days ago • Feb 11, 2026CVE-2026-25947 is a SQL injection vulnerability in Worklenz project management software that allows attackers to execute arbitrary SQL commands throug...
📅 25 days ago • Feb 10, 2026A code injection vulnerability in Microsoft Defender for Linux allows attackers on adjacent networks to execute arbitrary code without authorization. ...
📅 25 days ago • Feb 10, 2026CVE-2026-21516 is a command injection vulnerability in GitHub Copilot that allows unauthorized attackers to execute arbitrary code over a network. Thi...
📅 25 days ago • Feb 10, 2026This vulnerability in the MSHTML Framework allows attackers to bypass security protections remotely, potentially enabling unauthorized access or code ...
📅 25 days ago • Feb 10, 2026A protection mechanism failure in Windows Shell allows attackers to bypass security features over a network, potentially enabling unauthorized access ...
📅 25 days ago • Feb 10, 2026This XPath injection vulnerability in Apache HertzBeat allows attackers to manipulate XPath queries by injecting malicious data, potentially accessing...
📅 25 days ago • Feb 10, 2026Agentflow software by Flowring contains an arbitrary file upload vulnerability that allows authenticated attackers to upload malicious files and execu...
📅 25 days ago • Feb 10, 2026Docpedia software from Flowring contains a SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL commands. This ena...
📅 25 days ago • Feb 10, 2026This vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform allows authenticated attackers with normal privileges to modify signed X...
📅 25 days ago • Feb 10, 2026CVE-2026-25807 is a critical vulnerability in ZAI Shell's P2P terminal sharing feature that allows unauthenticated remote attackers to execute arbitra...
📅 26 days ago • Feb 9, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats