🔥 Trending CVEs - Last 90 Days
4,671 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability allows remote attackers to execute arbitrary code as root on Langflow installations without authentication. The flaw exists in how ...
📅 43 days ago • Jan 23, 2026CVE-2026-0773 is a critical remote code execution vulnerability in Upsonic's Cloudpickle deserialization. Attackers can execute arbitrary code without...
📅 43 days ago • Jan 23, 2026CVE-2026-0763 is a critical deserialization vulnerability in GPT Academic's run_in_subprocess_wrapper_func that allows unauthenticated remote attacker...
📅 43 days ago • Jan 23, 2026CVE-2026-0764 is a critical deserialization vulnerability in GPT Academic's upload endpoint that allows unauthenticated remote attackers to execute ar...
📅 43 days ago • Jan 23, 2026CVE-2026-0768 is a critical remote code execution vulnerability in Langflow that allows unauthenticated attackers to execute arbitrary Python code on ...
📅 43 days ago • Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary Python code on Langflow installations without authentication. Attackers can achieve fu...
📅 43 days ago • Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerable versions of gemini-mcp-tool without authenticat...
📅 43 days ago • Jan 23, 2026This is a critical command injection vulnerability in github-kanban-mcp-server that allows unauthenticated remote attackers to execute arbitrary syste...
📅 43 days ago • Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary commands on systems running Katana Network Development Starter Kit without authenticat...
📅 43 days ago • Jan 23, 2026CVE-2026-0760 is a critical remote code execution vulnerability in Foundation Agents MetaGPT's deserialize_message function. Attackers can exploit thi...
📅 43 days ago • Jan 23, 2026This critical vulnerability allows unauthenticated remote attackers to execute arbitrary Python code on systems running vulnerable versions of Foundat...
📅 43 days ago • Jan 23, 2026This is a critical command injection vulnerability in Ollama MCP Server that allows remote attackers to execute arbitrary system commands without auth...
📅 43 days ago • Jan 23, 2026This vulnerability allows remote attackers to execute arbitrary code on Framelink Figma MCP Server installations without authentication. Attackers can...
📅 43 days ago • Jan 23, 2026Orval versions 7.19.0 and below and 8.0.0-rc.0 through 8.0.2 contain a code injection vulnerability where untrusted OpenAPI specifications can inject ...
📅 43 days ago • Jan 23, 2026Dragonfly versions 2.4.1-rc.0 and below have missing authentication and authorization checks on Job API endpoints, allowing unauthenticated users with...
📅 43 days ago • Jan 22, 2026CVE-2026-24306 is an improper access control vulnerability in Azure Front Door that allows unauthorized attackers to elevate privileges over a network...
📅 43 days ago • Jan 22, 2026Soft Serve versions 0.11.2 and below have a critical authentication bypass vulnerability that allows attackers to impersonate any user, including admi...
📅 44 days ago • Jan 22, 2026This vulnerability in Apryse HTML2PDF SDK allows attackers to execute arbitrary operating system commands on servers using the InsertFromURL() functio...
📅 44 days ago • Jan 22, 2026This CVE describes a Missing Authorization vulnerability in the BA Book Everything WordPress plugin that allows attackers to bypass access controls. I...
📅 44 days ago • Jan 22, 2026This CVE describes a PHP Local File Inclusion vulnerability in the Golo WordPress theme that allows attackers to include arbitrary local files through...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...
📅 44 days ago • Jan 22, 2026This vulnerability allows remote attackers to execute arbitrary code through deserialization of untrusted data in the ThemeREX Sound | Musical Instrum...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to bypass authentication in the Workreap Core WordPress plugin, potentially gaining unauthorized access to user ac...
📅 44 days ago • Jan 22, 2026This CVE describes a Missing Authorization vulnerability in the Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin. It all...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to escalate privileges in LazyTasks project management software, potentially gaining administrative access. It aff...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress servers running the vulnerable g-FFL Checkout plugin...
📅 44 days ago • Jan 22, 2026CVE-2025-67617 is a PHP object injection vulnerability in the Consult Aid WordPress theme that allows attackers to execute arbitrary code by exploitin...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to include local PHP files through improper filename control in the Depot WordPress theme. Attackers can potential...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to upload arbitrary files, including web shells, to web servers running the Farost Energia WordPress theme. Attack...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to include local PHP files through improper filename control in the Amuli WordPress theme. Attackers can potential...
📅 44 days ago • Jan 22, 2026This SQL injection vulnerability in the WP Lead Capturing Pages WordPress plugin allows attackers to execute arbitrary SQL commands on the database. I...
📅 44 days ago • Jan 22, 2026This vulnerability allows attackers to include local PHP files through improper filename control in the Anarkali WordPress theme. Attackers can potent...
📅 44 days ago • Jan 22, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploiting a stack-based buffer overflow in the formGetIp...
📅 44 days ago • Jan 22, 2026CVE-2026-23760 is an authentication bypass vulnerability in SmarterMail's password reset API that allows unauthenticated attackers to reset administra...
📅 44 days ago • Jan 22, 2026This vulnerability in NervesHub allows attackers to brute-force user API tokens due to their predictable format, potentially granting unauthorized acc...
📅 44 days ago • Jan 22, 2026MeetingHub software from HAMASTAR Technology contains an unauthenticated arbitrary file upload vulnerability that allows remote attackers to upload ma...
📅 44 days ago • Jan 22, 2026The LA-Studio Element Kit for Elementor WordPress plugin allows unauthenticated attackers to create administrator accounts by manipulating the registr...
📅 44 days ago • Jan 22, 2026Dataease versions before 2.10.19 use MD5-hashed passwords as JWT signing secrets, allowing attackers to brute-force admin passwords via unmonitored AP...
📅 44 days ago • Jan 22, 2026This vulnerability in Fleet's Windows MDM enrollment flow allows attackers to bypass authentication by submitting forged JWT tokens that aren't proper...
📅 45 days ago • Jan 21, 2026CVE-2026-23524 is a critical deserialization vulnerability in Laravel Reverb that allows remote code execution when horizontal scaling is enabled. Att...
📅 45 days ago • Jan 21, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploiting a stack overflow in the formSetIptv function. ...
📅 45 days ago • Jan 21, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploiting a stack overflow in the formSetIptv function v...
📅 45 days ago • Jan 21, 2026This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploiting a stack-based buffer overflow in the formGetIp...
📅 45 days ago • Jan 21, 2026GeoGebra CAS Calculator 6.0.631.0 contains a buffer overflow vulnerability that allows attackers to crash the application by pasting a specially craft...
📅 45 days ago • Jan 21, 2026CVE-2021-47854 is a critical buffer overflow vulnerability in DD-WRT's UPnP service that allows remote attackers to execute arbitrary code on affected...
📅 45 days ago • Jan 21, 2026Mini Mouse 9.2.0 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands via crafted HTTP ...
📅 45 days ago • Jan 21, 2026CVE-2021-47748 is a critical remote code execution vulnerability in Hasura GraphQL Engine that allows attackers to execute arbitrary shell commands on...
📅 45 days ago • Jan 21, 2026This vulnerability in GNU Inetutils telnetd allows remote attackers to bypass authentication by setting the USER environment variable to '-f root'. Th...
📅 45 days ago • Jan 21, 2026This vulnerability allows unauthenticated attackers to change any user's password in the Academy LMS WordPress plugin, including administrator account...
📅 45 days ago • Jan 21, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats