🔥 Trending CVEs - Last 90 Days
4,478 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim'...
📅 57 days ago • Jan 13, 2026This vulnerability allows an unauthorized attacker to execute arbitrary code on SharePoint servers through improper input validation. Organizations us...
📅 57 days ago • Jan 13, 2026A heap-based buffer overflow vulnerability in the Windows Cloud Files Mini Filter Driver allows authenticated attackers to execute arbitrary code with...
📅 57 days ago • Jan 13, 2026This vulnerability allows an authenticated attacker to exploit improper link resolution in the Windows Task Host process to elevate privileges locally...
📅 57 days ago • Jan 13, 2026CVE-2026-20938 is an untrusted pointer dereference vulnerability in Windows Virtualization-Based Security (VBS) Enclave that allows an authenticated a...
📅 57 days ago • Jan 13, 2026This vulnerability is a use-after-free flaw in Windows Management Services that allows an authenticated attacker to execute arbitrary code with elevat...
📅 57 days ago • Jan 13, 2026This is a use-after-free vulnerability in the Windows Win32K ICOMP component that allows an authenticated attacker to execute arbitrary code with elev...
📅 57 days ago • Jan 13, 2026A heap-based buffer overflow vulnerability in Windows NTFS allows authenticated attackers to execute arbitrary code locally on affected systems. This ...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in Windows Management Services that allows an authenticated attacker to execute arbitrary code with ...
📅 57 days ago • Jan 13, 2026A race condition vulnerability in Windows Management Services allows authenticated attackers to execute code concurrently with improper synchronizatio...
📅 57 days ago • Jan 13, 2026This CVE describes a race condition vulnerability in Windows Management Services that allows an authenticated attacker to escalate privileges on a loc...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in Windows Management Services that allows an authenticated attacker to execute arbitrary code with ...
📅 57 days ago • Jan 13, 2026A race condition vulnerability in Windows Management Services allows authenticated attackers to escalate privileges on local systems. This affects Win...
📅 57 days ago • Jan 13, 2026This CVE describes a race condition vulnerability in Windows Management Services that allows an authenticated attacker to escalate privileges on a loc...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in the Windows Win32K ICOMP component that allows an authenticated attacker to escalate privileges l...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in Desktop Windows Manager that allows an authenticated attacker to execute arbitrary code with elev...
📅 57 days ago • Jan 13, 2026This CVE describes a race condition vulnerability in Windows Management Services that allows an authenticated attacker to escalate privileges on a loc...
📅 57 days ago • Jan 13, 2026This vulnerability is a heap-based buffer overflow in the Connected Devices Platform Service (Cdpsvc) on Windows systems. It allows an authenticated a...
📅 57 days ago • Jan 13, 2026This vulnerability involves a use-after-free memory corruption flaw in Windows Management Services that allows an authenticated attacker to execute ar...
📅 57 days ago • Jan 13, 2026A race condition vulnerability in Windows Management Services allows authenticated attackers to execute code concurrently with improper synchronizatio...
📅 57 days ago • Jan 13, 2026This vulnerability allows an authorized attacker to exploit an untrusted pointer dereference in the Windows Cloud Files Mini Filter Driver to elevate ...
📅 57 days ago • Jan 13, 2026This vulnerability is a use-after-free flaw in Windows Management Services that allows an authenticated attacker to execute arbitrary code with elevat...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in Windows Kernel-Mode Drivers that allows an authenticated attacker to execute arbitrary code with ...
📅 57 days ago • Jan 13, 2026This vulnerability is a type confusion flaw in Windows Ancillary Function Driver for WinSock that allows an authenticated attacker to escalate privile...
📅 57 days ago • Jan 13, 2026A heap-based buffer overflow vulnerability in Windows NTFS allows authenticated attackers to execute arbitrary code locally on affected systems. This ...
📅 57 days ago • Jan 13, 2026This vulnerability in Windows Routing and Remote Access Service (RRAS) allows authenticated attackers to escalate privileges on the local system. Atta...
📅 57 days ago • Jan 13, 2026This vulnerability allows an authenticated attacker to execute code with elevated privileges on Windows systems by exploiting a flaw in the Remote Pro...
📅 57 days ago • Jan 13, 2026A heap-based buffer overflow vulnerability in Windows Media allows local attackers to execute arbitrary code on affected systems. This affects Windows...
📅 57 days ago • Jan 13, 2026This CVE describes a race condition vulnerability in the Tablet Windows User Interface (TWINUI) subsystem that allows an authenticated attacker to esc...
📅 57 days ago • Jan 13, 2026A time-of-check time-of-use race condition in Windows Ancillary Function Driver for WinSock allows authenticated attackers to escalate privileges loca...
📅 57 days ago • Jan 13, 2026This vulnerability is a heap-based buffer overflow in the Windows Common Log File System Driver that allows an authenticated attacker to execute arbit...
📅 57 days ago • Jan 13, 2026This vulnerability involves a use-after-free flaw in Microsoft's Graphics Component that allows an authenticated attacker to execute arbitrary code wi...
📅 57 days ago • Jan 13, 2026A Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in Windows Installer allows authenticated attackers to elevate privileges locally. T...
📅 57 days ago • Jan 13, 2026This vulnerability allows an authenticated attacker with limited privileges to elevate their access rights on Windows systems through improper handlin...
📅 57 days ago • Jan 13, 2026A Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the Windows Kernel Memory allows authenticated attackers to escalate privileges l...
📅 57 days ago • Jan 13, 2026This vulnerability in Windows Ancillary Function Driver for WinSock allows an authorized attacker to perform a use-after-free attack on non-heap memor...
📅 57 days ago • Jan 13, 2026This vulnerability is a type confusion flaw in Windows Win32K - ICOMP that allows an authenticated attacker to escalate privileges locally. It affects...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in Imagination Technologies GPU drivers where improper reference counting allows non-privileged user...
📅 57 days ago • Jan 13, 2026An authentication bypass vulnerability in NETGEAR Orbi routers allows local network users to access the administrative web interface without credentia...
📅 57 days ago • Jan 13, 2026A Linux kernel vulnerability in IOMMU Shared Virtual Addressing (SVA) on x86 systems allows stale kernel page table entries to persist in IOMMU caches...
📅 57 days ago • Jan 13, 2026This CVE describes a use-after-free vulnerability in the Linux kernel's ksmbd SMB server module. Under high concurrency conditions, a tree-connection ...
📅 57 days ago • Jan 13, 2026This CVE describes a deserialization vulnerability in TYPO3 CMS mail file spool functionality. Local users with write access to the spool directory ca...
📅 58 days ago • Jan 13, 2026This vulnerability allows attackers to execute arbitrary commands on systems running vulnerable versions of Kiro IDE by tricking users into opening ma...
📅 61 days ago • Jan 9, 2026An improper input validation vulnerability in Galaxy Store allows local attackers to execute arbitrary scripts on affected devices. This affects Samsu...
📅 62 days ago • Jan 9, 2026This vulnerability allows local attackers on Samsung devices to execute privileged APIs due to improper access control in SLocation. It affects Samsun...
📅 62 days ago • Jan 9, 2026A use-after-free vulnerability in Samsung's PROCA driver allows local attackers to potentially execute arbitrary code with kernel privileges. This aff...
📅 62 days ago • Jan 9, 2026This vulnerability allows authenticated Backup or Tape Operators to execute arbitrary code with root privileges by creating a malicious backup configu...
📅 62 days ago • Jan 8, 2026This vulnerability allows attackers to execute arbitrary code by exploiting DLL hijacking in PIONEER CORPORATION installers. When users run affected i...
📅 63 days ago • Jan 8, 2026Bio-Formats up to version 8.3.0 has unsafe Java deserialization in the Memoizer class, allowing attackers to execute arbitrary code by providing malic...
📅 63 days ago • Jan 7, 2026CVE-2026-21678 is a heap-buffer-overflow vulnerability in the IccTagXml() function of iccDEV, a library for ICC color management profiles. It allows a...
📅 63 days ago • Jan 7, 2026Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats