Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 751 | CVE-2024-13377 |
|
73.8th | 7.2 | The Gravity Forms WordPress plugin has a stored XSS vulnerability in the 'alt' parameter that allows | |
| 752 | CVE-2025-0511 |
|
73.8th | 7.2 | The Welcart e-Commerce plugin for WordPress has a stored cross-site scripting (XSS) vulnerability in | |
| 753 | CVE-2025-30382 |
|
73.8th | 7.8 | This vulnerability allows an unauthorized attacker to execute arbitrary code on SharePoint servers b | |
| 754 | CVE-2025-62703 |
|
73.7th | 8.8 | This CVE describes a remote code execution vulnerability in Fugue's RPC server implementation. Attac | |
| 755 | CVE-2025-21400 |
|
73.7th | 8.0 | CVE-2025-21400 is a remote code execution vulnerability in Microsoft SharePoint Server that allows a | |
| 756 | CVE-2025-21369 |
|
73.7th | 8.8 | This vulnerability allows remote code execution via Microsoft Digest Authentication, enabling attack | |
| 757 | CVE-2022-50695 |
|
73.7th | 7.5 | This vulnerability allows unauthenticated attackers to abuse network diagnostic scripts (ping.php, t | |
| 758 | CVE-2025-1538 |
|
73.7th | 8.8 | A critical heap-based buffer overflow vulnerability in D-Link DAP-1320's set_ws_action function allo | |
| 759 | CVE-2024-13888 |
|
73.7th | 7.2 | The WPMobile.App WordPress plugin contains an open redirect vulnerability that allows unauthenticate | |
| 760 | CVE-2025-23249 |
|
73.7th | 7.6 | The NVIDIA NeMo Framework vulnerability allows remote attackers to execute arbitrary code by exploit | |
| 761 | CVE-2025-63657 |
|
73.6th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's mk_mimetype_find function allows attacker | |
| 762 | CVE-2025-63656 |
|
73.6th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's HTTP parser allows attackers to cause den | |
| 763 | CVE-2025-63653 |
|
73.6th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's mk_vhost_fdt_close function allows attack | |
| 764 | CVE-2025-63652 |
|
73.6th | 7.5 | A use-after-free vulnerability in Monkey web server's HTTP request handling allows attackers to cras | |
| 765 | CVE-2025-2802 |
|
73.6th | 7.3 | The LayoutBoxx WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes due | |
| 766 | CVE-2024-13738 |
|
73.6th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the | |
| 767 | CVE-2025-32906 |
|
73.5th | 7.5 | An out-of-bounds read vulnerability in libsoup's soup_headers_parse_request() function allows attack | |
| 768 | CVE-2024-11169 |
|
73.5th | 7.5 | An unhandled exception in the fs module of danny-avila/librechat allows unauthenticated attackers to | |
| 769 | CVE-2025-26631 |
|
73.5th | 7.3 | This vulnerability in Visual Studio Code allows an authorized attacker to execute arbitrary code wit | |
| 770 | CVE-2025-29791 |
|
73.5th | 7.8 | A type confusion vulnerability in Microsoft Office allows attackers to execute arbitrary code on vul | |
| 771 | CVE-2025-27749 |
|
73.4th | 7.8 | A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on vul | |
| 772 | CVE-2025-27747 |
|
73.4th | 7.8 | A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o | |
| 773 | CVE-2025-27745 |
|
73.4th | 7.8 | CVE-2025-27745 is a use-after-free vulnerability in Microsoft Office that allows local attackers to | |
| 774 | CVE-2025-27741 |
|
73.4th | 7.8 | This vulnerability is an out-of-bounds read in Windows NTFS that allows a local attacker to read mem | |
| 775 | CVE-2025-27483 |
|
73.4th | 7.8 | This vulnerability is an out-of-bounds read in Windows NTFS that allows a local attacker to read sen | |
| 776 | CVE-2024-8053 |
|
73.3th | 8.2 | This vulnerability in open-webui v0.3.10 allows unauthenticated attackers to access the PDF generati | |
| 777 | CVE-2024-11343 |
|
73.2th | 8.3 | This vulnerability in Progress Telerik Document Processing Libraries allows attackers to perform pat | |
| 778 | CVE-2025-21379 |
|
73.2th | 7.1 | This vulnerability allows remote attackers to execute arbitrary code on affected systems by sending | |
| 779 | CVE-2024-13793 |
|
73.2th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the | |
| 780 | CVE-2024-12537 |
|
73.2th | 7.5 | This vulnerability in open-webui version 0.3.32 allows unauthenticated attackers to send large POST | |
| 781 | CVE-2024-57536 |
|
73.1th | 8.0 | This CVE describes a command injection vulnerability in the Linksys E8450 router's wizard_status com | |
| 782 | CVE-2025-0349 |
|
73.1th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC6 routers allows remote attackers to | |
| 783 | CVE-2025-3785 |
|
73.1th | 8.8 | This critical vulnerability in D-Link DWR-M961 routers allows remote attackers to execute arbitrary | |
| 784 | CVE-2025-49741 |
|
73.1th | 7.4 | This vulnerability in Microsoft Edge (Chromium-based) allows unauthorized attackers to access sensit | |
| 785 | CVE-2022-50936 |
|
73.1th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary PHP code on WBCE CMS servers | |
| 786 | CVE-2025-21346 |
|
73th | 7.1 | This CVE describes a security feature bypass vulnerability in Microsoft Office that could allow atta | |
| 787 | CVE-2025-56431 |
|
73th | 7.5 | This directory traversal vulnerability in FearlessCMS allows remote attackers to use the plugin-hand | |
| 788 | CVE-2025-56430 |
|
73th | 7.5 | This CVE describes a directory traversal vulnerability in FearlessCMS that allows remote attackers t | |
| 789 | CVE-2025-30479 |
|
73th | 8.4 | Dell CloudLink versions before 8.2 contain an OS command injection vulnerability (CWE-78) where auth | |
| 790 | CVE-2025-21361 |
|
72.9th | 7.8 | Microsoft Outlook contains a remote code execution vulnerability that allows attackers to execute ar | |
| 791 | CVE-2024-43097 |
|
72.9th | 7.8 | This vulnerability is an integer overflow in Skia's SkRegion.cpp that leads to out-of-bounds write. | |
| 792 | CVE-2025-64120 |
|
72.9th | 8.8 | This OS command injection vulnerability in Nuvation Energy Multi-Stack Controller allows attackers t | |
| 793 | CVE-2024-53305 |
|
72.9th | 7.3 | This vulnerability allows remote attackers to execute arbitrary code on Whoogle Search instances by | |
| 794 | CVE-2024-25183 |
|
72.9th | 7.5 | CVE-2024-25183 is a directory traversal vulnerability in givanz VvvebJs 1.7.2 that allows attackers | |
| 795 | CVE-2024-49749 |
|
72.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on affected systems without use | |
| 796 | CVE-2025-21362 |
|
72.8th | 8.4 | This vulnerability allows attackers to execute arbitrary code on a victim's system by tricking them | |
| 797 | CVE-2025-2807 |
|
72.8th | 8.8 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to in | |
| 798 | CVE-2025-59295 |
|
72.7th | 8.8 | A heap-based buffer overflow vulnerability in Internet Explorer allows remote attackers to execute a | |
| 799 | CVE-2025-5322 |
|
72.7th | 7.2 | The VikRentCar WordPress plugin up to version 1.4.3 allows authenticated administrators to upload ar | |
| 800 | CVE-2025-5966 |
|
72.7th | 8.1 | This vulnerability allows attackers to inject malicious scripts into the 'Attachments by filename ke |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free