Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 901 | CVE-2025-14884 |
|
70.5th | 7.2 | This CVE describes a command injection vulnerability in the firmware update service of D-Link DIR-60 | |
| 902 | CVE-2025-2270 |
|
70.4th | 8.1 | This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the Cou | |
| 903 | CVE-2025-29070 |
|
70.4th | 7.5 | A heap buffer overflow vulnerability exists in the smooth2() function of lcms2-2.16's cmsgamma.c fil | |
| 904 | CVE-2025-3029 |
|
70.4th | 7.3 | This vulnerability allows attackers to craft URLs with specific Unicode characters that hide the tru | |
| 905 | CVE-2024-13911 |
|
70.4th | 7.2 | The Database Backup and check Tables Automated With Scheduler 2024 WordPress plugin exposes sensitiv | |
| 906 | CVE-2025-24064 |
|
70.4th | 8.1 | This is a use-after-free vulnerability in DNS Server that allows unauthorized attackers to execute a | |
| 907 | CVE-2025-14174 |
|
70.4th | 8.8 | KEV | This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost N |
| 908 | CVE-2024-55629 |
|
70.4th | 7.5 | This vulnerability in Suricata allows attackers to evade detection by using TCP urgent data (out-of- | |
| 909 | CVE-2025-29230 |
|
70.3th | 8.6 | This CVE describes a command injection vulnerability in Linksys E5600 routers that allows attackers | |
| 910 | CVE-2018-9373 |
|
70.3th | 8.8 | CVE-2018-9373 is a critical vulnerability in MediaTek's WLAN driver that allows remote attackers to | |
| 911 | CVE-2024-56883 |
|
70.3th | 8.1 | Sage DPW versions before 2024_12_001 have an improper access control vulnerability where server-side | |
| 912 | CVE-2024-50566 |
|
70.2th | 7.2 | This CVE describes an OS command injection vulnerability in Fortinet FortiManager and FortiManager C | |
| 913 | CVE-2025-30165 |
|
70.2th | 8.0 | This vulnerability allows remote code execution in multi-node vLLM deployments using the V0 engine. | |
| 914 | CVE-2025-27739 |
|
70.1th | 7.8 | This Windows kernel vulnerability allows an authenticated attacker to exploit untrusted pointer dere | |
| 915 | CVE-2025-27728 |
|
70.1th | 7.8 | CVE-2025-27728 is an out-of-bounds read vulnerability in Windows Kernel-Mode Drivers that allows aut | |
| 916 | CVE-2025-27490 |
|
70.1th | 7.8 | A heap-based buffer overflow vulnerability in Windows Bluetooth Service allows authenticated attacke | |
| 917 | CVE-2024-13690 |
|
70.1th | 7.2 | The WP Church Donation plugin for WordPress has a stored cross-site scripting vulnerability that all | |
| 918 | CVE-2025-26678 |
|
70.1th | 8.4 | CVE-2025-26678 is an improper access control vulnerability in Windows Defender Application Control ( | |
| 919 | CVE-2025-29802 |
|
70th | 7.3 | This vulnerability allows an authenticated attacker with local access to a system running Visual Stu | |
| 920 | CVE-2025-27533 |
|
70th | 7.5 | This vulnerability in Apache ActiveMQ allows attackers to cause denial of service by sending special | |
| 921 | CVE-2025-29033 |
|
70th | 7.3 | This vulnerability in BambooHR Build allows remote attackers to perform privilege escalation through | |
| 922 | CVE-2025-6021 |
|
70th | 7.5 | This CVE describes an integer overflow vulnerability in libxml2's xmlBuildQName function that can ca | |
| 923 | CVE-2024-9439 |
|
69.9th | 8.8 | SuperAGI's latest version contains a critical remote code execution vulnerability in the agent templ | |
| 924 | CVE-2025-21402 |
|
69.9th | 7.8 | This vulnerability in Microsoft Office OneNote allows remote attackers to execute arbitrary code on | |
| 925 | CVE-2025-2773 |
|
69.9th | 7.2 | This vulnerability allows authenticated remote attackers to execute arbitrary commands on BEC Techno | |
| 926 | CVE-2025-25205 |
|
69.9th | 8.2 | A vulnerability in Audiobookshelf versions 2.17.0 through 2.19.0 allows unauthenticated attackers to | |
| 927 | CVE-2025-61920 |
|
69.9th | 7.5 | This vulnerability in Authlib allows remote attackers to craft malicious JWT tokens with extremely l | |
| 928 | CVE-2025-13661 |
|
69.8th | 7.1 | CVE-2025-13661 is a path traversal vulnerability in Ivanti Endpoint Manager that allows authenticate | |
| 929 | CVE-2025-2370 |
|
69.8th | 8.8 | A critical stack-based buffer overflow vulnerability in TOTOLINK EX1800T WiFi extenders allows remot | |
| 930 | CVE-2025-3820 |
|
69.8th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote atta | |
| 931 | CVE-2025-63655 |
|
69.8th | 7.5 | This vulnerability allows attackers to crash Monkey web servers by sending specially crafted HTTP re | |
| 932 | CVE-2024-13473 |
|
69.7th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 933 | CVE-2022-50793 |
|
69.7th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary system commands on SOUND4 IMP | |
| 934 | CVE-2025-1565 |
|
69.7th | 7.5 | The Mayosis Core WordPress plugin contains an arbitrary file read vulnerability in all versions up t | |
| 935 | CVE-2025-3199 |
|
69.7th | 7.3 | This CVE describes an improper authorization vulnerability in the ruoyi-ai software up to version 2. | |
| 936 | CVE-2025-6685 |
|
69.7th | 8.8 | This vulnerability allows authenticated remote attackers to escalate privileges on ATEN eco DC insta | |
| 937 | CVE-2025-3802 |
|
69.6th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote atta | |
| 938 | CVE-2025-0255 |
|
69.5th | 7.2 | CVE-2025-0255 is an OS command injection vulnerability in HCL DevOps Deploy/Launch that allows authe | |
| 939 | CVE-2025-29795 |
|
69.5th | 7.8 | This vulnerability in Microsoft Edge allows an authorized attacker to exploit improper link resoluti | |
| 940 | CVE-2025-49141 |
|
69.5th | 8.5 | CVE-2025-49141 is an OS command injection vulnerability in HAX CMS PHP's gitImportSite functionality | |
| 941 | CVE-2025-0187 |
|
69.4th | 7.5 | A Denial of Service vulnerability in gradio-app/gradio version 0.39.1 allows attackers to crash serv | |
| 942 | CVE-2025-24306 |
|
69.4th | 7.2 | This CVE describes an OS command injection vulnerability in +F FS010M devices that allows authentica | |
| 943 | CVE-2025-21326 |
|
69.4th | 7.8 | This CVE describes a remote code execution vulnerability in Internet Explorer that allows attackers | |
| 944 | CVE-2025-0724 |
|
69.4th | 8.8 | The ProfileGrid WordPress plugin is vulnerable to PHP object injection via deserialization of untrus | |
| 945 | CVE-2025-60691 |
|
69.4th | 8.8 | A stack-based buffer overflow vulnerability in Linksys E1200 v2 routers allows remote attackers to e | |
| 946 | CVE-2025-60690 |
|
69.4th | 8.8 | A stack-based buffer overflow vulnerability in Linksys E1200 v2 routers allows remote attackers to e | |
| 947 | CVE-2024-9131 |
|
69.3th | 7.2 | This CVE allows administrators to execute arbitrary commands through command injection in Arista pro | |
| 948 | CVE-2024-57357 |
|
69.3th | 8.0 | This vulnerability allows remote attackers to execute arbitrary code on TP-Link TL-WPA8630 powerline | |
| 949 | CVE-2024-13723 |
|
69.3th | 7.2 | CVE-2024-13723 is a remote code execution vulnerability in the NagVis component of Checkmk. Authenti | |
| 950 | CVE-2024-58283 |
|
69.3th | 8.8 | This vulnerability allows authenticated attackers to upload malicious PHP files through the Elfinder |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free