🔥 Trending CVEs - Last 90 Days
4,477 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.
Critical & High-Risk CVEs
This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level. At...
📅 78 days ago • Dec 23, 2025This vulnerability allows local attackers to escalate privileges from a low-privileged account to SYSTEM on systems running RealDefense SUPERAntiSpywa...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level acc...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of pdfforge PDF Architect by tricking user...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PNM image files in GIMP. The integer ove...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious LBM image files in GIMP. The flaw is a s...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious XCF files in GIMP. The use-after-free fl...
📅 78 days ago • Dec 23, 2025This vulnerability in GIMP allows remote attackers to execute arbitrary code by tricking users into opening malicious JP2 image files. The flaw exists...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level acc...
📅 78 days ago • Dec 23, 2025This vulnerability in RealDefense SUPERAntiSpyware allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level acc...
📅 78 days ago • Dec 23, 2025This vulnerability in Soda PDF Desktop allows remote attackers to execute arbitrary code by tricking users into opening malicious XLS files. The softw...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code on Soda PDF Desktop by tricking users into opening malicious CBZ files. Attackers...
📅 78 days ago • Dec 23, 2025This vulnerability in Soda PDF Desktop allows remote attackers to execute arbitrary code by tricking users into opening malicious Word files. The soft...
📅 78 days ago • Dec 23, 2025This vulnerability in Soda PDF Desktop allows remote attackers to execute arbitrary code by tricking users into opening malicious files or visiting ma...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of pdfforge PDF Architect. Attackers can e...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of pdfforge PDF Architect by tricking user...
📅 78 days ago • Dec 23, 2025Soda PDF Desktop contains an uncontrolled search path vulnerability where it loads OpenSSL configuration files from insecure locations. This allows lo...
📅 78 days ago • Dec 23, 2025CVE-2025-14409 is an out-of-bounds write vulnerability in Soda PDF Desktop's PDF file parser that allows remote code execution when a user opens a mal...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on systems running vulnerable versions of Tencent Hunyuan3D-1. Attackers ...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on Tencent MedicalNet installations through deserialization of untrusted ...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on systems running Tencent FaceDetection-DSFD with the resnet endpoint. A...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on Tencent MimicMotion installations through deserialization of untrusted...
📅 78 days ago • Dec 23, 2025CVE-2025-14401 is an out-of-bounds read vulnerability in PDFsam Enhanced that can lead to remote code execution when users open malicious PDF files or...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of PDFsam Enhanced. Attackers can exploit ...
📅 78 days ago • Dec 23, 2025This vulnerability allows local attackers with initial low-privileged access to escalate privileges to SYSTEM level by exploiting incorrect folder per...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on Tencent PatrickStar installations by exploiting a deserialization flaw...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on systems running vulnerable versions of Tencent HunyuanDiT. Attackers c...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on systems running Tencent NeuralNLP-NeuralClassifier. Attackers can expl...
📅 78 days ago • Dec 23, 2025This vulnerability in Tencent TFace's restore_checkpoint function allows remote attackers to execute arbitrary code as root when users interact with m...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on Tencent HunyuanVideo installations through deserialization of untruste...
📅 78 days ago • Dec 23, 2025This vulnerability in Tencent TFace allows remote attackers to execute arbitrary code with root privileges by exploiting insecure deserialization in t...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code as root on Tencent HunyuanDiT installations by exploiting insecure deserializatio...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious EXR image files. It affects systems runn...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious EXR image files. It affects systems runn...
📅 78 days ago • Dec 23, 2025This is a heap-based buffer overflow vulnerability in Academy Software Foundation OpenEXR's EXR file parsing. Attackers can execute arbitrary code by ...
📅 78 days ago • Dec 23, 2025This is a heap-based buffer overflow vulnerability in NSF Unidata NetCDF-C library that allows remote code execution when processing malicious files. ...
📅 78 days ago • Dec 23, 2025This is a stack-based buffer overflow vulnerability in NSF Unidata NetCDF-C library that allows remote code execution when processing malicious NetCDF...
📅 78 days ago • Dec 23, 2025A stack-based buffer overflow vulnerability in NSF Unidata NetCDF-C allows remote attackers to execute arbitrary code when users process malicious fil...
📅 78 days ago • Dec 23, 2025This vulnerability allows remote attackers to execute arbitrary code by exploiting an integer overflow in NSF Unidata NetCDF-C when processing malicio...
📅 78 days ago • Dec 23, 2025This is a stack-based buffer overflow vulnerability in NSF Unidata NetCDF-C that allows remote attackers to execute arbitrary code. Attackers can expl...
📅 78 days ago • Dec 23, 2025A heap-based buffer overflow vulnerability in Foxit PDF Reader's JBIG2 image parsing allows remote code execution when opening malicious PDF files. Th...
📅 83 days ago • Dec 19, 2025A use-after-free vulnerability in Foxit PDF Reader's PDF parsing allows remote code execution when opening malicious PDF files. This affects Windows u...
📅 83 days ago • Dec 19, 2025A use-after-free vulnerability in Foxit PDF Reader's annotation handling allows remote code execution when opening malicious PDF files containing craf...
📅 83 days ago • Dec 19, 2025A use-after-free vulnerability in Foxit PDF software allows remote code execution when opening malicious PDF files containing crafted JavaScript. This...
📅 83 days ago • Dec 19, 2025A stack-based buffer overflow vulnerability exists in proxychains-ng versions up to 4.17, allowing attackers to cause denial of service or potentially...
📅 83 days ago • Dec 18, 2025A stack-based buffer overflow vulnerability in rtl_433's parse_rfraw() function allows attackers to cause denial of service or potentially execute arb...
📅 83 days ago • Dec 18, 2025Hubstaff 1.6.14 has a DLL search order hijacking vulnerability where attackers can place a malicious wow64log.dll in the system32 directory. When Hubs...
📅 83 days ago • Dec 18, 2025Codigo Markdown Editor 1.0.1 contains a remote code execution vulnerability where attackers can craft malicious markdown files that execute arbitrary ...
📅 83 days ago • Dec 18, 2025A use-after-free vulnerability in NI LabVIEW's sentry!sentry_span_set_data() function when parsing corrupted VI files could allow information disclosu...
📅 84 days ago • Dec 18, 2025A stack-based buffer overflow vulnerability in NI LabVIEW's LVResFile::FindRsrcListEntry() function allows attackers to execute arbitrary code or disc...
📅 84 days ago • Dec 18, 2025Why Track Trending CVEs?
Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.
Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.
🚀 Automated Trending CVE Monitoring
- Scan your servers to detect packages affected by trending CVEs
- Receive instant email alerts when critical vulnerabilities are discovered
- Dashboard shows CVE age, severity, CVSS scores, and affected systems
- Filter by time period (7/30/90 days) to focus on recent threats