Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 551 | CVE-2024-41790 |
|
76.9th | 9.1 | This vulnerability allows authenticated remote attackers to execute arbitrary code with root privile | |
| 552 | CVE-2024-41788 |
|
76.9th | 9.1 | This vulnerability allows authenticated remote attackers to execute arbitrary code with root privile | |
| 553 | CVE-2025-56005 |
|
76.8th | 9.8 | CVE-2025-56005 is a critical vulnerability in the PLY (Python Lex-Yacc) library that allows remote c | |
| 554 | CVE-2025-63690 |
|
76.8th | 9.1 | This vulnerability allows remote attackers to execute arbitrary code on pig-mesh Pig servers by expl | |
| 555 | CVE-2025-47855 |
|
76.7th | 9.8 | An unauthenticated attacker can obtain device configuration files from vulnerable FortiFone systems | |
| 556 | CVE-2025-30012 |
|
76.7th | 10.0 | This vulnerability allows unauthenticated attackers to execute arbitrary operating system commands a | |
| 557 | CVE-2025-61304 |
|
76.7th | 9.8 | This CVE describes an OS command injection vulnerability in Dynatrace ActiveGate's ping extension. A | |
| 558 | CVE-2025-1009 |
|
76.6th | 9.8 | A use-after-free vulnerability in Firefox and Thunderbird allows attackers to cause potentially expl | |
| 559 | CVE-2025-21628 |
|
76.6th | 9.1 | This SQL injection vulnerability in Chatwoot allows authenticated users to execute arbitrary SQL que | |
| 560 | CVE-2025-32973 |
|
76.6th | 9.0 | This vulnerability in XWiki allows attackers to gain programming rights through a privilege escalati | |
| 561 | CVE-2024-14003 |
|
76.5th | 9.8 | Nagios XI versions before 2024R1.2 contain a critical remote code execution vulnerability in the NRD | |
| 562 | CVE-2025-20124 |
|
76.4th | 9.9 | This vulnerability allows authenticated attackers with read-only admin credentials to execute arbitr | |
| 563 | CVE-2025-6389 |
|
76.4th | 9.8 | The Sneeit Framework WordPress plugin has a critical Remote Code Execution vulnerability that allows | |
| 564 | CVE-2025-20363 |
|
76.4th | 9.0 | This critical vulnerability allows remote attackers to execute arbitrary code with root privileges o | |
| 565 | CVE-2025-14500 |
|
76.4th | 9.8 | This vulnerability allows unauthenticated remote attackers to execute arbitrary operating system com | |
| 566 | CVE-2025-61811 |
|
76.3th | 9.1 | This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion that allows high-pri | |
| 567 | CVE-2024-32641 |
|
76.4th | 9.8 | CVE-2024-32641 is a critical remote code execution vulnerability in Masa CMS that allows unauthentic | |
| 568 | CVE-2024-8019 |
|
76.3th | 9.1 | This vulnerability in PyTorch Lightning's LightningApp allows attackers to write arbitrary files via | |
| 569 | CVE-2025-28399 |
|
76.3th | 9.8 | A privilege escalation vulnerability in Erick xmall v1.1 and earlier allows remote attackers to gain | |
| 570 | CVE-2025-28412 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 571 | CVE-2025-28410 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain administrative | |
| 572 | CVE-2025-28408 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 573 | CVE-2025-28405 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 574 | CVE-2025-28402 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 575 | CVE-2024-13790 |
|
76.3th | 9.8 | This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the Min | |
| 576 | CVE-2024-58308 |
|
76.2th | 9.8 | CVE-2024-58308 is a critical SQL injection vulnerability in Quick.CMS 6.7 that allows unauthenticate | |
| 577 | CVE-2025-22204 |
|
76.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Joomla websites using the So | |
| 578 | CVE-2025-65294 |
|
76.2th | 9.8 | Aqara Hub devices contain an undocumented remote access mechanism that allows attackers to execute a | |
| 579 | CVE-2025-30727 |
|
76.1th | 9.8 | This critical vulnerability in Oracle E-Business Suite's iSurvey Module allows unauthenticated attac | |
| 580 | CVE-2025-30457 |
|
76.1th | 9.8 | This macOS vulnerability allows malicious applications to create symbolic links to protected disk re | |
| 581 | CVE-2025-63218 |
|
76.1th | 9.8 | This vulnerability allows unauthenticated remote attackers to completely compromise Axel Technology | |
| 582 | CVE-2025-25388 |
|
76th | 9.8 | A SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to execu | |
| 583 | CVE-2025-25914 |
|
76th | 9.8 | A SQL injection vulnerability in Online Exam Mastering System v1.0 allows remote attackers to execut | |
| 584 | CVE-2025-58045 |
|
75.9th | 9.8 | This vulnerability in Dataease allows attackers to exploit the DB2 JDBC connection string to trigger | |
| 585 | CVE-2026-25643 |
|
75.8th | 9.1 | CVE-2026-25643 is a critical Remote Command Execution vulnerability in Frigate NVR software that all | |
| 586 | CVE-2025-11367 |
|
75.8th | 9.8 | CVE-2025-11367 allows remote attackers to execute arbitrary code on systems running vulnerable versi | |
| 587 | CVE-2024-51138 |
|
75.7th | 9.8 | A critical stack-based buffer overflow vulnerability in DrayTek router TR069 STUN server URL parsing | |
| 588 | CVE-2024-10901 |
|
75.7th | 9.8 | This vulnerability in eosphoros-ai/db-gpt allows attackers to execute arbitrary SQL queries via an u | |
| 589 | CVE-2025-7384 |
|
75.6th | 9.8 | This vulnerability allows unauthenticated attackers to perform PHP object injection through deserial | |
| 590 | CVE-2025-1023 |
|
75.6th | 9.8 | A critical SQL injection vulnerability in ChurchCRM versions 5.13.0 and earlier allows attackers to | |
| 591 | CVE-2024-57430 |
|
75.6th | 9.8 | An SQL injection vulnerability in PHPJabbers Cinema Booking System v2.0 allows attackers to manipula | |
| 592 | CVE-2025-58384 |
|
75.6th | 10.0 | This vulnerability allows remote attackers to execute arbitrary code on DOXENSE WATCHDOC systems by | |
| 593 | CVE-2024-13786 |
|
75.3th | 9.8 | The Education WordPress theme has a PHP object injection vulnerability that allows unauthenticated a | |
| 594 | CVE-2025-61913 |
|
75.3th | 9.9 | This vulnerability in Flowise allows authenticated attackers to read and write arbitrary files anywh | |
| 595 | CVE-2025-23045 |
|
75.2th | 9.8 | This vulnerability allows authenticated attackers to execute arbitrary code within CVAT's Nuclio fun | |
| 596 | CVE-2024-49649 |
|
75.2th | 9.8 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 597 | CVE-2024-10442 |
|
75.2th | 10.0 | This critical vulnerability allows remote attackers to execute arbitrary code on affected Synology s | |
| 598 | CVE-2025-0960 |
|
75.1th | 9.8 | AutomationDirect C-more EA9 HMI devices contain a buffer overflow vulnerability due to insufficient | |
| 599 | CVE-2025-34071 |
|
75.1th | 9.8 | This critical vulnerability in GFI Kerio Control allows attackers with administrative access to uplo | |
| 600 | CVE-2024-54808 |
|
75.1th | 9.8 | This CVE describes a critical stack-based buffer overflow vulnerability in Netgear WNR854T routers t |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free