🔥 Trending CVEs - Last 90 Days
4,478 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability allows attackers to execute arbitrary code by exploiting DLL hijacking in PIONEER CORPORATION installers. When users run affected i...
📅 63 days ago • Jan 8, 2026Bio-Formats up to version 8.3.0 has unsafe Java deserialization in the Memoizer class, allowing attackers to execute arbitrary code by providing malic...
📅 63 days ago • Jan 7, 2026CVE-2026-21678 is a heap-buffer-overflow vulnerability in the IccTagXml() function of iccDEV, a library for ICC color management profiles. It allows a...
📅 64 days ago • Jan 7, 2026An origin validation error in Fujitsu Security Solution AuthConductor Client Basic V2 allows attackers with local Windows login access to execute arbi...
📅 64 days ago • Jan 7, 2026This CVE describes a memory corruption vulnerability in Qualcomm DSP (Digital Signal Processor) drivers where passing memory pages with unaligned star...
📅 64 days ago • Jan 7, 2026This CVE describes a memory corruption vulnerability in a Qualcomm kernel driver that could allow attackers to execute arbitrary code with kernel priv...
📅 64 days ago • Jan 7, 2026This CVE describes a memory corruption vulnerability in Qualcomm components where incorrect offset calculations during overlapping buffer copy operati...
📅 64 days ago • Jan 7, 2026A memory corruption vulnerability occurs when launching secure applications on devices with insufficient memory, potentially allowing attackers to exe...
📅 64 days ago • Jan 7, 2026This vulnerability involves memory corruption in the trusted application's secure logging command processing, which could allow attackers to execute a...
📅 64 days ago • Jan 7, 2026This vulnerability allows memory corruption in the trusted application when processing identity credential operations, potentially leading to arbitrar...
📅 64 days ago • Jan 7, 2026This CVE describes a double-free vulnerability in Qualcomm components where concurrent thread access to shared resources can cause memory corruption. ...
📅 64 days ago • Jan 7, 2026This vulnerability involves memory corruption in sensor IOCTL preprocessing, allowing attackers to potentially execute arbitrary code or cause system ...
📅 64 days ago • Jan 7, 2026This vulnerability involves memory corruption during HDCP session deinitialization, potentially allowing attackers to execute arbitrary code or cause ...
📅 64 days ago • Jan 7, 2026This CVE describes a memory corruption vulnerability in Qualcomm video processing components that could allow attackers to execute arbitrary code or c...
📅 64 days ago • Jan 7, 2026This vulnerability allows a local attacker to execute arbitrary code by tricking AsusSoftwareManagerAgent into loading a malicious DLL from a controll...
📅 65 days ago • Jan 6, 2026This vulnerability involves integer overflow/underflow in the CIccXmlArrayType::ParseTextCountNum() function of iccDEV library, which could allow memo...
📅 65 days ago • Jan 6, 2026CVE-2025-20800 is an out-of-bounds write vulnerability in mminfra that allows local privilege escalation. Attackers with initial System privilege can ...
📅 65 days ago • Jan 6, 2026CVE-2025-20795 is an out-of-bounds write vulnerability in KeyInstall that allows local privilege escalation. Attackers with System privilege can explo...
📅 65 days ago • Jan 6, 2026This vulnerability in imgsys allows an attacker with System privilege to perform an out-of-bounds write through improper input validation, potentially...
📅 65 days ago • Jan 6, 2026This CVE describes a buffer overflow vulnerability in MediaTek battery management software that allows local privilege escalation. Attackers with init...
📅 65 days ago • Jan 6, 2026This vulnerability allows local privilege escalation on MediaTek devices through an out-of-bounds write in the battery subsystem. Attackers with initi...
📅 65 days ago • Jan 6, 2026CVE-2025-20799 is a use-after-free vulnerability in c2ps that allows memory corruption. This enables local privilege escalation from System privilege ...
📅 65 days ago • Jan 6, 2026This CVE describes a use-after-free memory corruption vulnerability in display components that could allow local privilege escalation. Attackers who a...
📅 65 days ago • Jan 6, 2026This CVE describes a use-after-free memory corruption vulnerability in a display component that could allow local privilege escalation. Attackers who ...
📅 65 days ago • Jan 6, 2026This CVE describes an out-of-bounds write vulnerability in a display component that could allow local privilege escalation. Attackers who already have...
📅 65 days ago • Jan 6, 2026This vulnerability allows non-admin users on Windows systems to perform DLL hijacking during Samsung Magician installation, leading to privilege escal...
📅 66 days ago • Jan 5, 2026This vulnerability in QNAP HBS 3 Hybrid Backup Sync allows attackers with local network access to manipulate file paths, potentially reading or modify...
📅 69 days ago • Jan 2, 2026This vulnerability allows local attackers to perform unauthorized raw disk operations due to an incorrect NULL DACL in SevenCs ORCA G2's regService pr...
📅 71 days ago • Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SGI image files in FontForge. Attackers ...
📅 71 days ago • Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of FontForge. Attackers can exploit this b...
📅 71 days ago • Dec 31, 2025A heap-based buffer overflow vulnerability in FontForge's BMP file parsing allows remote attackers to execute arbitrary code when users open malicious...
📅 71 days ago • Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SFD font files in FontForge. Attackers c...
📅 71 days ago • Dec 31, 2025This vulnerability in Tenda networking devices allows local attackers to access hard-coded credentials through manipulation of the Shadow File compone...
📅 71 days ago • Dec 31, 2025Tosibox Key Service 3.3.0 has an unquoted service path vulnerability that allows local non-privileged users to execute arbitrary code with SYSTEM priv...
📅 71 days ago • Dec 30, 2025CVE-2022-50795 is a conditional command injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco systems up to version 2.x. Unauthenticated attackers ...
📅 71 days ago • Dec 30, 2025This is a command injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco systems up to version 2.x. Local authenticated users can create malicious f...
📅 71 days ago • Dec 30, 2025This vulnerability allows unauthenticated attackers to execute arbitrary commands on SOUND4 IMPACT/FIRST/PULSE/Eco systems by sending a single HTTP PO...
📅 71 days ago • Dec 30, 2025This CVE addresses an integer overflow vulnerability in the Linux kernel's iomap subsystem that could lead to memory corruption or system crashes. It ...
📅 72 days ago • Dec 30, 2025This CVE describes a use-after-free vulnerability in the Linux kernel's HID uclogic driver. When the input device is unregistered, it can trigger a ue...
📅 72 days ago • Dec 30, 2025This vulnerability in GnuPG (GNU Privacy Guard) allows an attacker to execute arbitrary code or cause a denial of service by sending specially crafted...
📅 74 days ago • Dec 28, 2025CVE-2025-12771 is a stack-based buffer overflow vulnerability in IBM Concert versions 1.0.0 through 2.1.0. A local authenticated user could exploit th...
📅 76 days ago • Dec 26, 2025The Eaton UPS Companion software has a vulnerability where insecure library loading allows attackers with access to the software package to execute ar...
📅 76 days ago • Dec 26, 2025This vulnerability involves a hardcoded encryption key in Device Manager software that allows attackers to decrypt sensitive information. It affects i...
📅 76 days ago • Dec 26, 2025This vulnerability allows local attackers with low-privileged access to escalate privileges to SYSTEM level by exploiting an exposed dangerous functio...
📅 78 days ago • Dec 23, 2025This vulnerability allows local attackers to escalate privileges on TradingView Desktop installations by exploiting an uncontrolled search path in the...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers who already have low-privileged access to escalate to SYSTEM privileges by e...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level acc...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level. At...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level acc...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level. At...
📅 78 days ago • Dec 23, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats