🔥 Trending CVEs - Last 30 Days

1,255 critical and high-severity vulnerabilities discovered in the last 30 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
2,737
Total CVEs Published
302
Critical Severity
953
High Severity
⚠️
Critical Alert
302 critical vulnerabilities published in the last 30 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2019-25351 8.8

Centova Cast 3.2.11 contains an arbitrary file download vulnerability in the server.copyfile API endpoint. Authenticated attackers can exploit this to...

📅 17 days ago • Feb 18, 2026
CVE-2026-1426 8.8

The Advanced AJAX Product Filters WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input in the Live Composer c...

📅 17 days ago • Feb 18, 2026
CVE-2025-13689 8.8

CVE-2025-13689 is an unrestricted file upload vulnerability in IBM DataStage on Cloud Pak for Data that allows authenticated users to upload malicious...

📅 17 days ago • Feb 17, 2026
CVE-2026-23595 8.8

This authentication bypass vulnerability in the application API allows remote attackers to create unauthorized administrative accounts. Attackers can ...

📅 18 days ago • Feb 17, 2026
CVE-2026-2630 8.8

This CVE describes a command injection vulnerability in Tenable Security Center that allows authenticated remote attackers to execute arbitrary comman...

📅 18 days ago • Feb 17, 2026
CVE-2026-26732 8.8

This CVE describes a stack-based buffer overflow vulnerability in TOTOLINK A3002RU routers. Attackers can exploit this by sending specially crafted vp...

📅 18 days ago • Feb 17, 2026
CVE-2024-55270 8.8

CVE-2024-55270 is an SQL injection vulnerability in phpgurukul Student Management System 1.0 that allows attackers to execute arbitrary SQL commands t...

📅 18 days ago • Feb 17, 2026
CVE-2025-70828 8.8

This vulnerability in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code on the server by manipulating the JDBC configuration URL parameter...

📅 18 days ago • Feb 17, 2026
CVE-2026-2616 8.8

This vulnerability involves hard-coded credentials in the web management interface of Beetel 777VR1 routers. Attackers on the local network can exploi...

📅 18 days ago • Feb 17, 2026
CVE-2025-12062 8.8

This vulnerability allows authenticated attackers with Subscriber-level access or higher to include and execute arbitrary .html files on WordPress ser...

📅 18 days ago • Feb 17, 2026
CVE-2026-2001 8.8

The WowRevenue WordPress plugin allows authenticated attackers with subscriber-level access or higher to install arbitrary plugins due to missing capa...

📅 19 days ago • Feb 16, 2026
CVE-2026-2447 8.8

A heap buffer overflow vulnerability in libvpx video codec library allows attackers to execute arbitrary code or cause denial of service. This affects...

📅 19 days ago • Feb 16, 2026
CVE-2026-26368 8.8

This vulnerability allows any authenticated low-privileged user in eNet SMART HOME server to reset passwords of any account, including administrators,...

📅 20 days ago • Feb 15, 2026
CVE-2025-32061 8.8

A stack-based buffer overflow in the Alps Alpine Bluetooth stack of Bosch Infotainment ECUs allows remote code execution with root privileges. Attacke...

📅 20 days ago • Feb 15, 2026
CVE-2025-70866 8.8

LavaLite CMS 10.1.0 has an access control vulnerability where authenticated users with low-level privileges can bypass role restrictions and access th...

📅 22 days ago • Feb 13, 2026
CVE-2025-15157 8.8

This vulnerability in the Starfish Review Generation & Marketing WordPress plugin allows authenticated attackers with Subscriber-level access or highe...

📅 22 days ago • Feb 13, 2026
CVE-2026-2441 8.8

This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to execute arbitrary code within the browser's sandbox by t...

📅 22 days ago • Feb 13, 2026
CVE-2026-1618 8.8

This authentication bypass vulnerability in Universal Software Inc.'s FlexCity/Kiosk software allows attackers to gain unauthorized access and escalat...

📅 22 days ago • Feb 13, 2026
CVE-2026-25108 8.8

FileZen contains an OS command injection vulnerability that allows authenticated users to execute arbitrary operating system commands when the virus c...

📅 22 days ago • Feb 13, 2026
CVE-2019-25318 8.8

CVE-2019-25318 is a stack overflow vulnerability in AVS Audio Converter 9.1.2.600 that allows remote code execution when attackers manipulate the outp...

📅 22 days ago • Feb 12, 2026
CVE-2026-26056 8.8

This vulnerability allows users with create/update permissions in Yoke's Air Traffic Controller to execute arbitrary WASM code by injecting malicious ...

📅 23 days ago • Feb 12, 2026
CVE-2026-26020 8.8

This vulnerability allows authenticated users of AutoGPT to execute arbitrary code on the backend server by bypassing disabled block restrictions. Att...

📅 23 days ago • Feb 12, 2026
CVE-2026-25922 8.8

This vulnerability in authentik allows attackers to bypass SAML authentication by injecting malicious assertions before legitimate signed ones. It aff...

📅 23 days ago • Feb 12, 2026
CVE-2025-61880 8.8

This vulnerability in Infoblox NIOS allows attackers to execute arbitrary code remotely through insecure deserialization. It affects all Infoblox NIOS...

📅 23 days ago • Feb 12, 2026
CVE-2026-2004 8.8

This vulnerability in PostgreSQL's intarray extension allows attackers to execute arbitrary code with the privileges of the database operating system ...

📅 23 days ago • Feb 12, 2026
CVE-2026-2006 8.8

A buffer overflow vulnerability in PostgreSQL's text manipulation functions allows authenticated database users to execute arbitrary code with the pri...

📅 23 days ago • Feb 12, 2026
CVE-2026-26234 8.8

JUNG Smart Visu Server 1.1.1050 has a request header manipulation vulnerability where unauthenticated attackers can inject arbitrary values in the X-F...

📅 23 days ago • Feb 12, 2026
CVE-2026-0969 8.8

CVE-2026-0969 allows remote attackers to execute arbitrary code on servers using next-mdx-remote when processing untrusted MDX content. This occurs be...

📅 23 days ago • Feb 12, 2026
CVE-2026-20667 8.8

This CVE describes a sandbox escape vulnerability in Apple operating systems where a malicious app could bypass security restrictions designed to isol...

📅 23 days ago • Feb 11, 2026
CVE-2024-50619 8.8

CVE-2024-50619 allows authenticated low-privileged users in CIPPlanner CIPAce to escalate privileges by manipulating user IDs to access other accounts...

📅 24 days ago • Feb 11, 2026
CVE-2024-50620 8.8

This vulnerability allows authorized users to upload executable files through CIPPlanner CIPAce's rich text editor and document management components....

📅 24 days ago • Feb 11, 2026
CVE-2026-2321 8.8

This is a use-after-free vulnerability in Chrome's Ozone component that could allow heap corruption when users perform specific UI gestures on a malic...

📅 24 days ago • Feb 11, 2026
CVE-2026-2315 8.8

This vulnerability in Chrome's WebGPU implementation allows attackers to access memory outside intended boundaries via malicious web pages. It affects...

📅 24 days ago • Feb 11, 2026
CVE-2026-2313 8.8

This is a use-after-free vulnerability in Chrome's CSS engine that allows remote attackers to potentially exploit heap corruption. Attackers can trigg...

📅 24 days ago • Feb 11, 2026
CVE-2025-65480 8.8

This vulnerability allows authenticated users of Pacom Unison Client 5.13.1 to inject malicious scripts into Report Templates. When specific script co...

📅 24 days ago • Feb 11, 2026
CVE-2024-36324 8.8

This vulnerability in AMD Graphics Driver allows attackers to execute arbitrary code by exploiting improper input validation of pointers. It affects s...

📅 24 days ago • Feb 11, 2026
CVE-2025-57707 8.8

A static code injection vulnerability in QNAP File Station 5 allows authenticated attackers to access restricted files and data. This affects users of...

📅 24 days ago • Feb 11, 2026
CVE-2025-30276 8.8

An out-of-bounds write vulnerability in Qsync Central allows authenticated remote attackers to modify or corrupt memory. This affects QNAP Qsync Centr...

📅 24 days ago • Feb 11, 2026
CVE-2025-15096 8.8

The Videospirecore Theme Plugin for WordPress has an authentication bypass vulnerability that allows authenticated attackers with Subscriber-level acc...

📅 24 days ago • Feb 11, 2026
CVE-2026-1560 8.8

This vulnerability in the Lazy Blocks WordPress plugin allows authenticated attackers with Contributor-level access or higher to execute arbitrary cod...

📅 24 days ago • Feb 11, 2026
CVE-2026-25947 8.8

CVE-2026-25947 is a SQL injection vulnerability in Worklenz project management software that allows attackers to execute arbitrary SQL commands throug...

📅 25 days ago • Feb 10, 2026
CVE-2026-21537 8.8

A code injection vulnerability in Microsoft Defender for Linux allows attackers on adjacent networks to execute arbitrary code without authorization. ...

📅 25 days ago • Feb 10, 2026
CVE-2026-21516 8.8

CVE-2026-21516 is a command injection vulnerability in GitHub Copilot that allows unauthorized attackers to execute arbitrary code over a network. Thi...

📅 25 days ago • Feb 10, 2026
CVE-2026-21513 8.8

This vulnerability in the MSHTML Framework allows attackers to bypass security protections remotely, potentially enabling unauthorized access or code ...

📅 25 days ago • Feb 10, 2026
CVE-2026-21510 8.8

A protection mechanism failure in Windows Shell allows attackers to bypass security features over a network, potentially enabling unauthorized access ...

📅 25 days ago • Feb 10, 2026
CVE-2026-24343 8.8

This XPath injection vulnerability in Apache HertzBeat allows attackers to manipulate XPath queries by injecting malicious data, potentially accessing...

📅 25 days ago • Feb 10, 2026
CVE-2026-2097 8.8

Agentflow software by Flowring contains an arbitrary file upload vulnerability that allows authenticated attackers to upload malicious files and execu...

📅 25 days ago • Feb 10, 2026
CVE-2026-2094 8.8

Docpedia software from Flowring contains a SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL commands. This ena...

📅 25 days ago • Feb 10, 2026
CVE-2026-23687 8.8

This vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform allows authenticated attackers with normal privileges to modify signed X...

📅 25 days ago • Feb 10, 2026
CVE-2026-25807 8.8

CVE-2026-25807 is a critical vulnerability in ZAI Shell's P2P terminal sharing feature that allows unauthenticated remote attackers to execute arbitra...

📅 26 days ago • Feb 9, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free