Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 551 | CVE-2020-36859 |
|
78.2th | 8.8 | This SQL injection vulnerability in Nagios XI's Core Config Manager allows authenticated users to in | |
| 552 | CVE-2016-15050 |
|
78.2th | 8.8 | Nagios XI versions before 5.2.4 contain a SQL injection vulnerability in the notification search fea | |
| 553 | CVE-2025-60962 |
|
78.2th | 8.2 | This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T | |
| 554 | CVE-2025-60959 |
|
78.2th | 8.2 | This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T | |
| 555 | CVE-2024-13094 |
|
78.1th | 7.1 | This vulnerability allows attackers to inject malicious scripts into WordPress admin pages via unsan | |
| 556 | CVE-2025-58429 |
|
78.1th | 7.5 | An unauthenticated remote attacker can exploit a relative path traversal vulnerability in Productivi | |
| 557 | CVE-2025-10090 |
|
78.1th | 7.3 | This CVE describes a SQL injection vulnerability in Jinher OA software up to version 1.2, specifical | |
| 558 | CVE-2025-3328 |
|
78th | 8.8 | A critical buffer overflow vulnerability in Tenda AC1206 routers allows remote attackers to execute | |
| 559 | CVE-2025-27737 |
|
78th | 8.6 | This vulnerability allows a local attacker to bypass Windows Security Zone Mapping through improper | |
| 560 | CVE-2023-37032 |
|
78th | 7.5 | A stack-based buffer overflow vulnerability in Magma's Mobile Management Entity (MME) allows remote | |
| 561 | CVE-2025-24962 |
|
78th | 8.8 | CVE-2025-24962 is a command injection vulnerability in reNgine's nmap_cmd parameter that allows auth | |
| 562 | CVE-2025-4350 |
|
78th | 8.8 | A critical command injection vulnerability in D-Link DIR-600L routers allows remote attackers to exe | |
| 563 | CVE-2024-12556 |
|
77.9th | 8.7 | This vulnerability allows attackers to exploit prototype pollution in Kibana to achieve code injecti | |
| 564 | CVE-2025-64444 |
|
77.9th | 7.2 | This OS command injection vulnerability in NCP-HG100 network devices allows authenticated attackers | |
| 565 | CVE-2024-13899 |
|
77.8th | 7.2 | The Mambo Importer WordPress plugin is vulnerable to PHP object injection via deserialization of unt | |
| 566 | CVE-2022-50790 |
|
77.8th | 7.5 | This vulnerability allows unauthenticated remote attackers to access live radio stream information f | |
| 567 | CVE-2026-20098 |
|
77.8th | 8.8 | This vulnerability in Cisco Meeting Management allows authenticated attackers with video operator pr | |
| 568 | CVE-2026-20045 |
|
77.7th | 8.2 | KEV | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on |
| 569 | CVE-2025-0366 |
|
77.6th | 8.8 | The Jupiter X Core WordPress plugin has a Local File Inclusion vulnerability that leads to Remote Co | |
| 570 | CVE-2025-26866 |
|
77.6th | 8.8 | This CVE describes a remote code execution vulnerability in Apache HugeGraph's PD store where a mali | |
| 571 | CVE-2025-57201 |
|
77.6th | 8.8 | This CVE describes an authenticated command injection vulnerability in AVTECH SECURITY Corporation's | |
| 572 | CVE-2025-24993 |
|
77.6th | 7.8 | KEV | A heap-based buffer overflow vulnerability in Windows NTFS allows local attackers to execute arbitra |
| 573 | CVE-2024-43649 |
|
77.5th | 8.8 | Authenticated command injection in Iocharger AC charging station firmware allows attackers with low- | |
| 574 | CVE-2024-13720 |
|
77.5th | 8.8 | The WP Image Uploader WordPress plugin allows unauthenticated attackers to delete arbitrary files on | |
| 575 | CVE-2024-13696 |
|
77.5th | 7.2 | This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress si | |
| 576 | CVE-2025-2801 |
|
77.4th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug | |
| 577 | CVE-2025-0566 |
|
77.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers t | |
| 578 | CVE-2025-3546 |
|
77.4th | 8.0 | This critical vulnerability in H3C Magic routers allows authenticated attackers on the local network | |
| 579 | CVE-2025-27038 |
|
77.4th | 7.5 | KEV | This vulnerability allows memory corruption in Chrome's graphics rendering through Adreno GPU driver |
| 580 | CVE-2025-48492 |
|
77.3th | 8.8 | This vulnerability allows authenticated users with Edit component access in GetSimple CMS to inject | |
| 581 | CVE-2026-0772 |
|
77.3th | 7.5 | This vulnerability allows authenticated remote attackers to execute arbitrary code on Langflow insta | |
| 582 | CVE-2025-28059 |
|
77.3th | 7.5 | This vulnerability allows deleted users in Nagios Network Analyzer to maintain access to restricted | |
| 583 | CVE-2025-14501 |
|
77.2th | 7.5 | This vulnerability allows remote attackers to crash Sante PACS Server by sending specially crafted H | |
| 584 | CVE-2025-56123 |
|
77.2th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-EW1200G PRO wireless access po | |
| 585 | CVE-2025-56122 |
|
77.2th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-EW1800GX PRO wireless access p | |
| 586 | CVE-2025-56120 |
|
77.2th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attac | |
| 587 | CVE-2025-56118 |
|
77.2th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attac | |
| 588 | CVE-2025-56114 |
|
77.2th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie M18 routers that allows attackers | |
| 589 | CVE-2025-0956 |
|
77.2th | 8.1 | This CVE describes a PHP object injection vulnerability in the WooCommerce Recover Abandoned Cart Wo | |
| 590 | CVE-2024-55063 |
|
77.2th | 8.8 | Multiple code injection vulnerabilities in EasyVirt DC NetScope allow remote authenticated attackers | |
| 591 | CVE-2025-66474 |
|
77.2th | 8.8 | CVE-2025-66474 is an HTML injection vulnerability in XWiki Rendering that allows authenticated users | |
| 592 | CVE-2025-9935 |
|
77.2th | 7.3 | This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK N600R routers v | |
| 593 | CVE-2025-56130 |
|
77.2th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-S1930 switches that allows att | |
| 594 | CVE-2025-1104 |
|
77.1th | 7.3 | This critical vulnerability in D-Link DHP-W310AV powerline adapters allows remote attackers to bypas | |
| 595 | CVE-2025-31674 |
|
77.1th | 7.5 | This CVE describes an object injection vulnerability in Drupal core that allows attackers to modify | |
| 596 | CVE-2024-54146 |
|
77th | 7.6 | Cacti versions before 1.2.29 contain a SQL injection vulnerability in the host_templates.php templat | |
| 597 | CVE-2025-21365 |
|
77th | 7.8 | CVE-2025-21365 is a remote code execution vulnerability in Microsoft Office that allows attackers to | |
| 598 | CVE-2025-2525 |
|
77th | 8.8 | The Streamit WordPress theme allows authenticated users with subscriber-level permissions or higher | |
| 599 | CVE-2025-6220 |
|
76.9th | 7.2 | The Ultra Addons for Contact Form 7 WordPress plugin has a vulnerability that allows authenticated a | |
| 600 | CVE-2025-6464 |
|
76.9th | 7.5 | The Forminator WordPress plugin is vulnerable to PHP Object Injection via deserialization of untrust |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free