🔥 Trending CVEs - Last 90 Days
4,488 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
A heap-based buffer overflow vulnerability in Azure Linux Virtual Machines allows authenticated local attackers to execute arbitrary code with elevate...
⚡ Yesterday • Mar 10, 2026MobaXterm versions before 26.1 contain a path search order vulnerability where the application executes Notepad++ without specifying the full executab...
📅 2 days ago • Mar 9, 2026A local privilege escalation vulnerability allows low-privileged attackers with access to the UBR service account to gain full system control. This oc...
📅 2 days ago • Mar 9, 2026This vulnerability allows attackers to execute arbitrary code with administrative privileges by placing malicious DLL files in the same directory as t...
📅 3 days ago • Mar 9, 2026This vulnerability allows local attackers to escalate privileges on macOS systems by exploiting insecure Unix socket permissions in Acronis Cyber Prot...
📅 6 days ago • Mar 6, 2026CVE-2026-26034 is an incorrect default permissions vulnerability in Dell UPS Multi-UPS Management Console (MUMC) that allows attackers to execute arbi...
📅 7 days ago • Mar 5, 2026Delta Electronics CNCSoft-G2 has a file parsing vulnerability that allows out-of-bounds write when processing malicious files. This enables remote cod...
📅 7 days ago • Mar 4, 2026OpenViking versions 0.2.1 and earlier contain a path traversal vulnerability in .ovpack import handling that allows attackers to write arbitrary files...
📅 8 days ago • Mar 3, 2026This CVE describes a memory corruption vulnerability in alignment-based memory allocation functions. Attackers can exploit this to execute arbitrary c...
📅 9 days ago • Mar 2, 2026This CVE describes a buffer overflow vulnerability in Qualcomm software where user-supplied data is added without proper bounds checking, leading to m...
📅 9 days ago • Mar 2, 2026This vulnerability allows memory corruption when accessing the trusted execution environment (TEE) without proper privilege checks. Attackers could po...
📅 9 days ago • Mar 2, 2026This vulnerability allows memory corruption when multiple processes concurrently access shared buffers through IOCTL calls in Qualcomm drivers. Attack...
📅 9 days ago • Mar 2, 2026This vulnerability allows memory corruption when multiple processes concurrently access a shared buffer during IOCTL calls in Qualcomm components. Att...
📅 9 days ago • Mar 2, 2026This CVE describes a memory corruption vulnerability in Qualcomm Trusted Application (TA) invocation where accessing buffers with invalid length can l...
📅 9 days ago • Mar 2, 2026The installer for FinalCode Client by Digital Arts Inc. has incorrect default permissions that allow non-administrative users to execute arbitrary cod...
📅 14 days ago • Feb 26, 2026A stack buffer overflow vulnerability in GPAC multimedia framework allows attackers to execute arbitrary code or crash applications by providing malic...
📅 14 days ago • Feb 26, 2026This vulnerability allows authenticated low-privileged Windows users to escalate their privileges on systems running Genetec Update Service. Attackers...
📅 15 days ago • Feb 24, 2026A vulnerability in Trellix HX Agent's fekern.sys driver allows local attackers to escalate privileges and access lsass.exe memory via BYOVD techniques...
📅 15 days ago • Feb 24, 2026An out-of-bounds read vulnerability in the grpcfuse kernel module in Docker Desktop's Linux VM allows local attackers to write to /proc/docker entries...
📅 15 days ago • Feb 24, 2026This CVE describes a DLL hijacking vulnerability in eAI Technologies ERP software where authenticated local attackers can place malicious DLL files in...
📅 17 days ago • Feb 23, 2026This CVE describes a heap-based buffer overflow vulnerability in GIMP's ICNS file parser that allows remote code execution. Attackers can exploit this...
📅 19 days ago • Feb 20, 2026This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PGM image files in GIMP. The flaw exists...
📅 19 days ago • Feb 20, 2026CVE-2019-25435 is a local buffer overflow vulnerability in Sricam DeviceViewer 3.12.0.1 that allows authenticated attackers to execute arbitrary code ...
📅 19 days ago • Feb 20, 2026This vulnerability allows remote attackers to execute arbitrary code on Xmind installations by tricking users into opening malicious attachments. The ...
📅 19 days ago • Feb 20, 2026CVE-2026-26101 is an incorrect permission assignment vulnerability in Owl opds 2.2.0.4 that allows attackers to manipulate files through crafted netwo...
📅 19 days ago • Feb 20, 2026This vulnerability allows attackers to execute arbitrary code with administrative privileges by exploiting insecure DLL loading in the RICOH job log a...
📅 19 days ago • Feb 20, 2026ADB Explorer versions 0.9.26020 and below fail to validate the ADB binary path before execution, allowing arbitrary code execution with current user p...
📅 20 days ago • Feb 20, 2026This CVE describes a heap buffer overflow vulnerability in HDF5 software that allows attackers to trigger denial-of-service conditions through special...
📅 20 days ago • Feb 19, 2026This vulnerability allows local attackers to achieve privilege escalation to SYSTEM level by placing a malicious executable in a world-writable direct...
📅 20 days ago • Feb 19, 2026This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious CATPART files in affected Autodesk products. Us...
📅 21 days ago • Feb 18, 2026A race condition vulnerability in the Linux kernel's ksmbd (SMB server) component allows use-after-free attacks in multi-channel SMB sessions. This af...
📅 21 days ago • Feb 18, 2026CVE-2025-33252 is a deserialization vulnerability in NVIDIA's NeMo Framework that allows remote attackers to execute arbitrary code. This affects orga...
📅 21 days ago • Feb 18, 2026A deserialization vulnerability in the OPC.Testclient utility within Rexroth IndraWorks allows attackers to execute arbitrary code by tricking users i...
📅 21 days ago • Feb 18, 2026This vulnerability in Rexroth IndraWorks allows attackers to execute arbitrary code on a user's system by tricking them into opening a malicious file,...
📅 21 days ago • Feb 18, 2026The NVIDIA NeMo Framework vulnerability allows remote code execution in distributed environments, enabling attackers to execute arbitrary code, escala...
📅 21 days ago • Feb 18, 2026CVE-2025-33246 is a command injection vulnerability in NVIDIA's NeMo Framework ASR Evaluator utility that allows attackers to execute arbitrary comman...
📅 21 days ago • Feb 18, 2026CVE-2025-33250 is a remote code execution vulnerability in NVIDIA's NeMo Framework that allows attackers to execute arbitrary code on affected systems...
📅 21 days ago • Feb 18, 2026The NVIDIA NeMo Framework vulnerability allows attackers to inject malicious code through crafted data inputs. Successful exploitation could lead to r...
📅 21 days ago • Feb 18, 2026NVIDIA Megatron Bridge contains a code injection vulnerability in a data shuffling tutorial component. Successful exploitation could allow attackers t...
📅 21 days ago • Feb 18, 2026This vulnerability in Softland FBackup allows local attackers to exploit a link following weakness (CWE-59) in the HID.dll library during backup/resto...
📅 22 days ago • Feb 17, 2026CVE-2025-65715 is a remote code execution vulnerability in Visual Studio Code's Code Runner extension that allows attackers to execute arbitrary code ...
📅 23 days ago • Feb 16, 2026A Use of Uninitialized Variable vulnerability in SOLIDWORKS eDrawings allows attackers to execute arbitrary code when users open specially crafted EPR...
📅 23 days ago • Feb 16, 2026An Out-Of-Bounds Write vulnerability in SOLIDWORKS eDrawings allows an attacker to execute arbitrary code by tricking a user into opening a malicious ...
📅 23 days ago • Feb 16, 2026Calero VeraSMART versions before 2026 R1 contain hardcoded AES encryption keys in the Veramark.Framework.dll file. This allows attackers with local sy...
📅 26 days ago • Feb 13, 2026CVE-2019-25345 is an unquoted service path vulnerability in Realtek IIS Codec Service that allows local attackers to execute arbitrary code with eleva...
📅 27 days ago • Feb 12, 2026NextVPN 4.10 has insecure file permissions that allow local users to modify executable files with full access rights. Attackers can replace system exe...
📅 27 days ago • Feb 12, 2026The M-Track Duo HD installer version 1.0.0 has a DLL hijacking vulnerability where attackers can place malicious DLLs in directories searched by the i...
📅 28 days ago • Feb 12, 2026A memory corruption vulnerability in Apple operating systems allows attackers with memory write capability to execute arbitrary code. This affects wat...
📅 28 days ago • Feb 11, 2026A package validation vulnerability in macOS allows malicious applications to gain root privileges. This affects macOS systems running versions before ...
📅 28 days ago • Feb 11, 2026This vulnerability allows a malicious application to gain root privileges on affected Apple devices. It affects macOS, iOS, iPadOS, and visionOS syste...
📅 28 days ago • Feb 11, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats