🔥 Trending CVEs - Last 90 Days

4,484 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,134
Total CVEs Published
990
Critical Severity
3,494
High Severity
⚠️
Critical Alert
990 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2026-25880 7.8

SumatraPDF versions 3.5.2 and earlier contain a vulnerability where clicking 'Show in folder' in the File menu executes explorer.exe from the same dir...

📅 30 days ago • Feb 9, 2026
CVE-2026-0870 7.8

GIGABYTE MacroHub has a local privilege escalation vulnerability where authenticated local attackers can execute arbitrary code with SYSTEM privileges...

📅 31 days ago • Feb 9, 2026
CVE-2026-25731 7.8

A Server-Side Template Injection vulnerability in Calibre's Templite engine allows arbitrary code execution when converting ebooks using malicious cus...

📅 33 days ago • Feb 6, 2026
CVE-2026-25634 7.8

This CVE describes a buffer overlap vulnerability in iccDEV's CIccTagMultiProcessElement::Apply() function where SrcPixel and DestPixel stack buffers ...

📅 33 days ago • Feb 6, 2026
CVE-2025-15311 7.8

CVE-2025-15311 is an unauthorized code execution vulnerability in Tanium Appliance that allows attackers to execute arbitrary code without proper auth...

📅 34 days ago • Feb 5, 2026
CVE-2026-25585 7.8

This vulnerability in iccDEV allows attackers to trigger an out-of-bounds read by providing a malformed ICC color profile. This can lead to memory dis...

📅 35 days ago • Feb 4, 2026
CVE-2026-25582 7.8

A heap buffer overflow vulnerability in iccDEV's CIccIO::WriteUInt16Float() function allows attackers to cause denial of service or potentially execut...

📅 35 days ago • Feb 4, 2026
CVE-2026-25583 7.8

A heap buffer overflow vulnerability exists in iccDEV's CIccFileIO::Read8() function when processing malformed ICC profile files. This allows attacker...

📅 35 days ago • Feb 4, 2026
CVE-2026-25584 7.8

A stack-buffer-overflow vulnerability in iccDEV's CIccTagFloatNum::GetValues() function allows memory corruption when processing malformed ICC color p...

📅 35 days ago • Feb 4, 2026
CVE-2026-25546 7.8

CVE-2026-25546 is a command injection vulnerability in godot-mcp that allows remote code execution. Attackers can inject shell metacharacters through ...

📅 35 days ago • Feb 4, 2026
CVE-2026-25143 7.8

This vulnerability allows attackers to execute arbitrary shell commands on the build host by injecting shell metacharacters into melange's patch pipel...

📅 35 days ago • Feb 4, 2026
CVE-2026-0536 7.8

A stack-based buffer overflow vulnerability in Autodesk 3ds Max allows arbitrary code execution when processing malicious GIF files. Attackers can exp...

📅 35 days ago • Feb 4, 2026
CVE-2026-0662 7.8

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious project directories in Autodesk 3ds Max. The at...

📅 35 days ago • Feb 4, 2026
CVE-2026-0537 7.8

A memory corruption vulnerability in Autodesk 3ds Max allows arbitrary code execution when processing malicious RGB files. This affects all users who ...

📅 35 days ago • Feb 4, 2026
CVE-2026-0538 7.8

A malicious GIF file can trigger an out-of-bounds write vulnerability in Autodesk 3ds Max, allowing attackers to execute arbitrary code with the privi...

📅 35 days ago • Feb 4, 2026
CVE-2026-0659 7.8

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious USD files in Autodesk Arnold or 3ds Max. Affect...

📅 35 days ago • Feb 4, 2026
CVE-2026-0660 7.8

A stack-based buffer overflow vulnerability in Autodesk 3ds Max allows arbitrary code execution when parsing malicious GIF files. This affects users w...

📅 35 days ago • Feb 4, 2026
CVE-2026-0661 7.8

This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious RGB files in Autodesk 3ds Max. Users who open u...

📅 35 days ago • Feb 4, 2026
CVE-2026-20983 7.8

This vulnerability in Samsung Dialer allows local attackers to launch arbitrary activities with the app's elevated privileges. It affects Samsung devi...

📅 36 days ago • Feb 4, 2026
CVE-2026-20979 7.8

This vulnerability allows local attackers to launch arbitrary activities with Settings application privileges on Samsung devices. It affects Samsung m...

📅 36 days ago • Feb 4, 2026
CVE-2026-24149 7.8

NVIDIA Megatron-LM contains a code injection vulnerability (CWE-94) where malicious data can lead to arbitrary code execution. This affects all platfo...

📅 36 days ago • Feb 3, 2026
CVE-2026-25502 7.8

A stack-based buffer overflow vulnerability in iccDEV's icFixXml() function allows attackers to execute arbitrary code by crafting malicious NamedColo...

📅 36 days ago • Feb 3, 2026
CVE-2026-24669 7.8

CVE-2026-24669 is an insecure password reset vulnerability in Open eClass (formerly GUnet eClass) that allows local attackers to reuse valid password ...

📅 36 days ago • Feb 3, 2026
CVE-2025-69875 7.8

A local privilege escalation vulnerability in Quick Heal Total Security allows low-privileged users to restore quarantined files into protected system...

📅 36 days ago • Feb 3, 2026
CVE-2025-66374 7.8

This vulnerability in CyberArk Endpoint Privilege Manager Agent allows a local user to escalate privileges by exploiting policy elevation of an Admini...

📅 36 days ago • Feb 3, 2026
CVE-2025-60865 7.8

A local privilege escalation vulnerability in avanquest Driver Updater allows attackers with local access to gain SYSTEM-level privileges through the ...

📅 36 days ago • Feb 3, 2026
CVE-2025-9711 7.8

This vulnerability allows local authenticated users on Brocade Fabric OS systems to escalate their privileges to root level using specific commands. I...

📅 37 days ago • Feb 3, 2026
CVE-2026-24694 7.8

This vulnerability allows attackers to execute arbitrary code by exploiting insecure DLL loading in Roland Cloud Manager. Attackers can plant maliciou...

📅 37 days ago • Feb 3, 2026
CVE-2026-0383 7.8

This vulnerability in Brocade Fabric OS allows authenticated local attackers with Bash shell access to read insecurely stored file contents, including...

📅 37 days ago • Feb 3, 2026
CVE-2025-47398 7.8

This CVE describes a use-after-free vulnerability in Qualcomm GPU memory management where improper pointer handling during buffer deallocation can cau...

📅 37 days ago • Feb 2, 2026
CVE-2025-47399 7.8

This vulnerability allows attackers to cause memory corruption by sending specially crafted IOCTL calls with invalid parameters to sensor property set...

📅 37 days ago • Feb 2, 2026
CVE-2025-47359 7.8

CVE-2025-47359 is a use-after-free vulnerability in Qualcomm memory management APIs that allows memory corruption when multiple threads simultaneously...

📅 37 days ago • Feb 2, 2026
CVE-2026-24071 7.8

This vulnerability allows attackers to bypass code signature verification in Native Access's XPC service on macOS through PID reuse attacks. An attack...

📅 37 days ago • Feb 2, 2026
CVE-2026-20411 7.8

This CVE describes a use-after-free vulnerability in the cameraisp component that could allow local privilege escalation. Attackers with System privil...

📅 38 days ago • Feb 2, 2026
CVE-2026-20412 7.8

CVE-2026-20412 is an out-of-bounds write vulnerability in the cameraisp component that allows local privilege escalation. Attackers with initial Syste...

📅 38 days ago • Feb 2, 2026
CVE-2026-20409 7.8

CVE-2026-20409 is an out-of-bounds write vulnerability in the imgsys component that allows local privilege escalation. Attackers with initial System p...

📅 38 days ago • Feb 2, 2026
CVE-2025-62348 7.8

This vulnerability in Salt's junos execution module allows remote code execution through unsafe YAML deserialization. Attackers can craft malicious YA...

📅 40 days ago • Jan 30, 2026
CVE-2026-22277 7.8

This OS command injection vulnerability in Dell UnityVSA allows low-privileged local attackers to execute arbitrary commands with root privileges. It ...

📅 41 days ago • Jan 30, 2026
CVE-2026-21418 7.8

This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privileged attacker with local access can execute arbitr...

📅 41 days ago • Jan 30, 2026
CVE-2026-1680 7.8

This vulnerability allows any local Windows user to escalate their privileges to local administrator by directly communicating with the LocalAdminServ...

📅 41 days ago • Jan 30, 2026
CVE-2026-24905 7.8

CVE-2026-24905 is a command injection vulnerability in Inspektor Gadget's image building functionality. An attacker who can control the YAML gadget ma...

📅 41 days ago • Jan 29, 2026
CVE-2025-69604 7.8

This vulnerability in SuperDuper! backup software allows local attackers to modify task templates to install arbitrary packages with root privileges a...

📅 41 days ago • Jan 29, 2026
CVE-2026-24856 7.8

A memory corruption vulnerability in iccDEV library versions before 2.3.1.2 allows arbitrary code execution when processing malicious ICC color profil...

📅 42 days ago • Jan 28, 2026
CVE-2025-61731 7.8

This vulnerability allows attackers to write arbitrary content to files they control by exploiting the '#cgo pkg-config:' directive in Go source files...

📅 42 days ago • Jan 28, 2026
CVE-2025-46691 7.8

Dell PremierColor Panel Driver versions before 1.0.0.1 A01 contain an improper access control vulnerability that allows local low-privileged attackers...

📅 42 days ago • Jan 28, 2026
CVE-2025-33217 7.8

This vulnerability in NVIDIA Display Driver for Windows allows attackers to exploit a use-after-free memory error. Successful exploitation could lead ...

📅 42 days ago • Jan 28, 2026
CVE-2025-33218 7.8

An integer overflow vulnerability in NVIDIA's Windows GPU display driver kernel component (nvlddmkm.sys) could allow attackers to execute arbitrary co...

📅 42 days ago • Jan 28, 2026
CVE-2025-33219 7.8

The NVIDIA Display Driver for Linux contains an integer overflow vulnerability in the kernel module that could allow local attackers to execute arbitr...

📅 42 days ago • Jan 28, 2026
CVE-2025-33220 7.8

NVIDIA vGPU software contains a use-after-free vulnerability in the Virtual GPU Manager that allows a malicious guest VM to access heap memory after i...

📅 42 days ago • Jan 28, 2026
CVE-2025-57283 7.8

The browserstack-local Node.js package version 1.5.8 contains a command injection vulnerability due to improper sanitization of the logfile variable i...

📅 42 days ago • Jan 28, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free