🔥 Trending CVEs - Last 90 Days
4,484 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
SumatraPDF versions 3.5.2 and earlier contain a vulnerability where clicking 'Show in folder' in the File menu executes explorer.exe from the same dir...
📅 30 days ago • Feb 9, 2026GIGABYTE MacroHub has a local privilege escalation vulnerability where authenticated local attackers can execute arbitrary code with SYSTEM privileges...
📅 31 days ago • Feb 9, 2026A Server-Side Template Injection vulnerability in Calibre's Templite engine allows arbitrary code execution when converting ebooks using malicious cus...
📅 33 days ago • Feb 6, 2026This CVE describes a buffer overlap vulnerability in iccDEV's CIccTagMultiProcessElement::Apply() function where SrcPixel and DestPixel stack buffers ...
📅 33 days ago • Feb 6, 2026CVE-2025-15311 is an unauthorized code execution vulnerability in Tanium Appliance that allows attackers to execute arbitrary code without proper auth...
📅 34 days ago • Feb 5, 2026This vulnerability in iccDEV allows attackers to trigger an out-of-bounds read by providing a malformed ICC color profile. This can lead to memory dis...
📅 35 days ago • Feb 4, 2026A heap buffer overflow vulnerability in iccDEV's CIccIO::WriteUInt16Float() function allows attackers to cause denial of service or potentially execut...
📅 35 days ago • Feb 4, 2026A heap buffer overflow vulnerability exists in iccDEV's CIccFileIO::Read8() function when processing malformed ICC profile files. This allows attacker...
📅 35 days ago • Feb 4, 2026A stack-buffer-overflow vulnerability in iccDEV's CIccTagFloatNum::GetValues() function allows memory corruption when processing malformed ICC color p...
📅 35 days ago • Feb 4, 2026CVE-2026-25546 is a command injection vulnerability in godot-mcp that allows remote code execution. Attackers can inject shell metacharacters through ...
📅 35 days ago • Feb 4, 2026This vulnerability allows attackers to execute arbitrary shell commands on the build host by injecting shell metacharacters into melange's patch pipel...
📅 35 days ago • Feb 4, 2026A stack-based buffer overflow vulnerability in Autodesk 3ds Max allows arbitrary code execution when processing malicious GIF files. Attackers can exp...
📅 35 days ago • Feb 4, 2026This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious project directories in Autodesk 3ds Max. The at...
📅 35 days ago • Feb 4, 2026A memory corruption vulnerability in Autodesk 3ds Max allows arbitrary code execution when processing malicious RGB files. This affects all users who ...
📅 35 days ago • Feb 4, 2026A malicious GIF file can trigger an out-of-bounds write vulnerability in Autodesk 3ds Max, allowing attackers to execute arbitrary code with the privi...
📅 35 days ago • Feb 4, 2026This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious USD files in Autodesk Arnold or 3ds Max. Affect...
📅 35 days ago • Feb 4, 2026A stack-based buffer overflow vulnerability in Autodesk 3ds Max allows arbitrary code execution when parsing malicious GIF files. This affects users w...
📅 35 days ago • Feb 4, 2026This vulnerability allows attackers to execute arbitrary code by tricking users into opening malicious RGB files in Autodesk 3ds Max. Users who open u...
📅 35 days ago • Feb 4, 2026This vulnerability in Samsung Dialer allows local attackers to launch arbitrary activities with the app's elevated privileges. It affects Samsung devi...
📅 36 days ago • Feb 4, 2026This vulnerability allows local attackers to launch arbitrary activities with Settings application privileges on Samsung devices. It affects Samsung m...
📅 36 days ago • Feb 4, 2026NVIDIA Megatron-LM contains a code injection vulnerability (CWE-94) where malicious data can lead to arbitrary code execution. This affects all platfo...
📅 36 days ago • Feb 3, 2026A stack-based buffer overflow vulnerability in iccDEV's icFixXml() function allows attackers to execute arbitrary code by crafting malicious NamedColo...
📅 36 days ago • Feb 3, 2026CVE-2026-24669 is an insecure password reset vulnerability in Open eClass (formerly GUnet eClass) that allows local attackers to reuse valid password ...
📅 36 days ago • Feb 3, 2026A local privilege escalation vulnerability in Quick Heal Total Security allows low-privileged users to restore quarantined files into protected system...
📅 36 days ago • Feb 3, 2026This vulnerability in CyberArk Endpoint Privilege Manager Agent allows a local user to escalate privileges by exploiting policy elevation of an Admini...
📅 36 days ago • Feb 3, 2026A local privilege escalation vulnerability in avanquest Driver Updater allows attackers with local access to gain SYSTEM-level privileges through the ...
📅 36 days ago • Feb 3, 2026This vulnerability allows local authenticated users on Brocade Fabric OS systems to escalate their privileges to root level using specific commands. I...
📅 37 days ago • Feb 3, 2026This vulnerability allows attackers to execute arbitrary code by exploiting insecure DLL loading in Roland Cloud Manager. Attackers can plant maliciou...
📅 37 days ago • Feb 3, 2026This vulnerability in Brocade Fabric OS allows authenticated local attackers with Bash shell access to read insecurely stored file contents, including...
📅 37 days ago • Feb 3, 2026This CVE describes a use-after-free vulnerability in Qualcomm GPU memory management where improper pointer handling during buffer deallocation can cau...
📅 37 days ago • Feb 2, 2026This vulnerability allows attackers to cause memory corruption by sending specially crafted IOCTL calls with invalid parameters to sensor property set...
📅 37 days ago • Feb 2, 2026CVE-2025-47359 is a use-after-free vulnerability in Qualcomm memory management APIs that allows memory corruption when multiple threads simultaneously...
📅 37 days ago • Feb 2, 2026This vulnerability allows attackers to bypass code signature verification in Native Access's XPC service on macOS through PID reuse attacks. An attack...
📅 37 days ago • Feb 2, 2026This CVE describes a use-after-free vulnerability in the cameraisp component that could allow local privilege escalation. Attackers with System privil...
📅 38 days ago • Feb 2, 2026CVE-2026-20412 is an out-of-bounds write vulnerability in the cameraisp component that allows local privilege escalation. Attackers with initial Syste...
📅 38 days ago • Feb 2, 2026CVE-2026-20409 is an out-of-bounds write vulnerability in the imgsys component that allows local privilege escalation. Attackers with initial System p...
📅 38 days ago • Feb 2, 2026This vulnerability in Salt's junos execution module allows remote code execution through unsafe YAML deserialization. Attackers can craft malicious YA...
📅 40 days ago • Jan 30, 2026This OS command injection vulnerability in Dell UnityVSA allows low-privileged local attackers to execute arbitrary commands with root privileges. It ...
📅 41 days ago • Jan 30, 2026This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privileged attacker with local access can execute arbitr...
📅 41 days ago • Jan 30, 2026This vulnerability allows any local Windows user to escalate their privileges to local administrator by directly communicating with the LocalAdminServ...
📅 41 days ago • Jan 30, 2026CVE-2026-24905 is a command injection vulnerability in Inspektor Gadget's image building functionality. An attacker who can control the YAML gadget ma...
📅 41 days ago • Jan 29, 2026This vulnerability in SuperDuper! backup software allows local attackers to modify task templates to install arbitrary packages with root privileges a...
📅 41 days ago • Jan 29, 2026A memory corruption vulnerability in iccDEV library versions before 2.3.1.2 allows arbitrary code execution when processing malicious ICC color profil...
📅 42 days ago • Jan 28, 2026This vulnerability allows attackers to write arbitrary content to files they control by exploiting the '#cgo pkg-config:' directive in Go source files...
📅 42 days ago • Jan 28, 2026Dell PremierColor Panel Driver versions before 1.0.0.1 A01 contain an improper access control vulnerability that allows local low-privileged attackers...
📅 42 days ago • Jan 28, 2026This vulnerability in NVIDIA Display Driver for Windows allows attackers to exploit a use-after-free memory error. Successful exploitation could lead ...
📅 42 days ago • Jan 28, 2026An integer overflow vulnerability in NVIDIA's Windows GPU display driver kernel component (nvlddmkm.sys) could allow attackers to execute arbitrary co...
📅 42 days ago • Jan 28, 2026The NVIDIA Display Driver for Linux contains an integer overflow vulnerability in the kernel module that could allow local attackers to execute arbitr...
📅 42 days ago • Jan 28, 2026NVIDIA vGPU software contains a use-after-free vulnerability in the Virtual GPU Manager that allows a malicious guest VM to access heap memory after i...
📅 42 days ago • Jan 28, 2026The browserstack-local Node.js package version 1.5.8 contains a command injection vulnerability due to improper sanitization of the logfile variable i...
📅 42 days ago • Jan 28, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats