Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 851 | CVE-2025-3053 |
|
71.5th | 8.8 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex | |
| 852 | CVE-2025-9784 |
|
71.4th | 7.5 | This vulnerability in Undertow allows malicious clients to send malformed requests that trigger serv | |
| 853 | CVE-2024-45421 |
|
71.4th | 8.5 | A buffer overflow vulnerability in some Zoom Apps allows authenticated users to escalate privileges | |
| 854 | CVE-2024-8684 |
|
71.4th | 8.3 | This CVE describes an OS command injection vulnerability in Revolution Pi devices that allows authen | |
| 855 | CVE-2025-56427 |
|
71.4th | 7.5 | A directory traversal vulnerability in ComposioHQ v0.7.20 allows remote attackers to access sensitiv | |
| 856 | CVE-2024-14008 |
|
71.4th | 7.2 | Nagios XI versions before 2024R1.3.2 contain a remote command execution vulnerability in the WinRM C | |
| 857 | CVE-2025-1539 |
|
71.4th | 8.8 | A critical stack-based buffer overflow vulnerability exists in D-Link DAP-1320 firmware version 1.00 | |
| 858 | CVE-2025-29461 |
|
71.3th | 7.6 | This vulnerability in a-blogcms 3.1.15 allows remote attackers to access sensitive information throu | |
| 859 | CVE-2025-29459 |
|
71.3th | 7.6 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in MyBB 1.8.38's Mail function | |
| 860 | CVE-2025-29451 |
|
71.3th | 7.6 | This vulnerability in Seo Panel 4.11.0 allows remote attackers to access sensitive information throu | |
| 861 | CVE-2025-29394 |
|
71.3th | 8.1 | An insecure file upload vulnerability in Verydows v2.0 allows remote attackers to upload malicious f | |
| 862 | CVE-2020-36863 |
|
71.3th | 8.8 | This vulnerability allows authenticated attackers to upload PHP files to Nagios XI's Audio Import di | |
| 863 | CVE-2025-63651 |
|
71.3th | 7.5 | A use-after-free vulnerability in Monkey web server's string handling function allows attackers to c | |
| 864 | CVE-2025-63650 |
|
71.3th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's memory handling allows attackers to cause | |
| 865 | CVE-2025-29820 |
|
71.3th | 7.8 | A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o | |
| 866 | CVE-2024-50630 |
|
71.3th | 7.5 | This vulnerability allows remote attackers to obtain administrator credentials in Synology Drive Ser | |
| 867 | CVE-2025-25997 |
|
71.2th | 7.5 | CVE-2025-25997 is a directory traversal vulnerability in FeMiner wms v1.0 that allows remote attacke | |
| 868 | CVE-2025-7359 |
|
71.2th | 8.2 | The Counter live visitors for WooCommerce WordPress plugin has an arbitrary file deletion vulnerabil | |
| 869 | CVE-2025-22130 |
|
71.2th | 8.8 | CVE-2025-22130 is a path traversal vulnerability in Soft Serve Git server that allows non-admin user | |
| 870 | CVE-2026-0779 |
|
71.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 871 | CVE-2024-53834 |
|
71.1th | 7.5 | This vulnerability in Android's SMS utilities allows remote attackers to read memory beyond intended | |
| 872 | CVE-2025-21376 |
|
71.1th | 8.1 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems running vuln | |
| 873 | CVE-2023-36419 |
|
71.1th | 8.8 | This vulnerability in Azure HDInsight's Apache Oozie workflow scheduler allows attackers to perform | |
| 874 | CVE-2025-12945 |
|
71.1th | 7.2 | This vulnerability allows authenticated administrators on NETGEAR Nighthawk R7000P routers to execut | |
| 875 | CVE-2025-25200 |
|
71th | 7.5 | Koa middleware for Node.js versions prior to 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3 contain a regu | |
| 876 | CVE-2024-20153 |
|
71th | 7.5 | This vulnerability allows attackers to spoof Wi-Fi access point SSIDs, tricking client devices into | |
| 877 | CVE-2025-25246 |
|
71th | 8.1 | This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected NET | |
| 878 | CVE-2024-13497 |
|
71th | 7.2 | The Tripetto WordPress plugin (versions up to 8.0.9) has a stored XSS vulnerability in attachment up | |
| 879 | CVE-2025-1561 |
|
71th | 7.2 | This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress pa | |
| 880 | CVE-2025-3445 |
|
70.9th | 8.1 | A path traversal vulnerability in mholt/archiver Go library allows attackers to create or overwrite | |
| 881 | CVE-2025-30014 |
|
70.9th | 7.7 | SAP Capital Yield Tax Management contains a directory traversal vulnerability (CWE-35) that allows a | |
| 882 | CVE-2025-34506 |
|
70.9th | 8.8 | This vulnerability allows authenticated administrators in WBCE CMS to upload malicious ZIP modules c | |
| 883 | CVE-2025-3155 |
|
70.8th | 7.4 | CVE-2025-3155 is a vulnerability in Yelp (the GNOME help application) that allows malicious help doc | |
| 884 | CVE-2024-57451 |
|
70.8th | 7.5 | ChestnutCMS versions 1.5.0 and earlier contain a directory traversal vulnerability in the FileContro | |
| 885 | CVE-2025-4803 |
|
70.8th | 7.2 | This vulnerability allows authenticated WordPress administrators to perform PHP object injection via | |
| 886 | CVE-2024-11187 |
|
70.8th | 7.5 | This CVE describes a resource exhaustion vulnerability in BIND DNS servers where specially crafted z | |
| 887 | CVE-2025-23359 |
|
70.8th | 8.3 | CVE-2025-23359 is a Time-of-Check Time-of-Use (TOCTOU) vulnerability in NVIDIA Container Toolkit for | |
| 888 | CVE-2025-25053 |
|
70.8th | 8.8 | This CVE describes an OS command injection vulnerability in the WEB UI setting page of Wi-Fi AP UNIT | |
| 889 | CVE-2025-67684 |
|
70.8th | 7.2 | Quick.Cart e-commerce software contains a Local File Inclusion and Path Traversal vulnerability in i | |
| 890 | CVE-2024-13562 |
|
70.7th | 7.5 | The Import WP plugin for WordPress exposes sensitive data stored in the uploads directory to unauthe | |
| 891 | CVE-2025-24366 |
|
70.7th | 7.5 | This vulnerability allows authenticated SFTPGo users to exploit unsanitized rsync command arguments | |
| 892 | CVE-2025-21410 |
|
70.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Rout | |
| 893 | CVE-2025-21407 |
|
70.6th | 8.8 | CVE-2025-21407 is a heap-based buffer overflow vulnerability in Windows Telephony Service that allow | |
| 894 | CVE-2025-21406 |
|
70.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 895 | CVE-2025-21201 |
|
70.6th | 8.8 | This vulnerability in Windows Telephony Server allows remote attackers to execute arbitrary code on | |
| 896 | CVE-2025-21190 |
|
70.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 897 | CVE-2025-21338 |
|
70.6th | 7.8 | This CVE describes a GDI+ remote code execution vulnerability that allows attackers to execute arbit | |
| 898 | CVE-2025-0928 |
|
70.6th | 8.8 | This vulnerability allows any authenticated Juju controller user to upload malicious agent binaries | |
| 899 | CVE-2025-23011 |
|
70.5th | 8.8 | Fedora Repository 3.8.1 contains a path traversal vulnerability (Zip Slip) that allows authenticated | |
| 900 | CVE-2025-24983 |
|
70.5th | 7.0 | KEV | This is a use-after-free vulnerability in the Windows Win32 Kernel Subsystem that allows an authenti |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free