Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1001 | CVE-2025-8769 |
|
81.7th | 9.8 | CVE-2025-8769 is a critical remote code execution vulnerability in Telenium Online Web Application. | |
| 1002 | CVE-2024-54525 |
|
81.7th | 8.8 | This vulnerability allows attackers to modify protected system files by restoring maliciously crafte | |
| 1003 | CVE-2025-27692 |
|
81.7th | 4.7 | Dell Wyse Management Suite versions before 5.1 have a vulnerability where high-privileged attackers | |
| 1004 | CVE-2025-58751 |
|
81.7th | 5.3 | This vulnerability in Vite allows attackers to bypass server.fs restrictions and access files outsid | |
| 1005 | CVE-2025-30384 |
|
81.7th | 7.4 | This vulnerability allows remote code execution on Microsoft SharePoint servers through deserializat | |
| 1006 | CVE-2025-4946 |
|
81.7th | 8.1 | The Vikinger WordPress theme allows authenticated attackers with Subscriber-level access or higher t | |
| 1007 | CVE-2026-0768 |
|
81.7th | 9.8 | CVE-2026-0768 is a critical remote code execution vulnerability in Langflow that allows unauthentica | |
| 1008 | CVE-2026-0761 |
|
81.7th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary Python code | |
| 1009 | CVE-2025-29806 |
|
81.6th | 6.5 | This vulnerability in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute arb | |
| 1010 | CVE-2025-29635 |
|
81.6th | 8.8 | A command injection vulnerability in D-Link DIR-823X routers allows authenticated attackers to execu | |
| 1011 | CVE-2025-27407 |
|
81.6th | 9.0 | This vulnerability in graphql-ruby allows remote code execution when loading malicious schema defini | |
| 1012 | CVE-2024-53303 |
|
81.6th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary code on LRQA Nettitude PoshC2 | |
| 1013 | CVE-2018-25115 |
|
81.6th | 9.8 | This CVE describes an unauthenticated remote command execution vulnerability in multiple D-Link DIR- | |
| 1014 | CVE-2025-21306 |
|
81.6th | 8.8 | This is a heap-based buffer overflow vulnerability in Windows Telephony Service that allows remote a | |
| 1015 | CVE-2025-21291 |
|
81.6th | 8.8 | This vulnerability in Windows DirectShow allows remote attackers to execute arbitrary code on affect | |
| 1016 | CVE-2025-21282 |
|
81.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 1017 | CVE-2025-21273 |
|
81.6th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on | |
| 1018 | CVE-2025-21266 |
|
81.6th | 8.8 | This is a heap-based buffer overflow vulnerability in Windows Telephony Service that allows remote a | |
| 1019 | CVE-2025-21252 |
|
81.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 1020 | CVE-2025-21250 |
|
81.6th | 8.8 | This is a heap-based buffer overflow vulnerability in the Windows Telephony Service that allows remo | |
| 1021 | CVE-2025-21241 |
|
81.6th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on | |
| 1022 | CVE-2025-21240 |
|
81.6th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code wi | |
| 1023 | CVE-2025-60425 |
|
81.6th | 8.6 | Nagios Fusion versions 2024R1.2 and 2024R2 fail to invalidate existing session tokens when enabling | |
| 1024 | CVE-2023-53690 |
|
81.6th | 4.8 | Nagios Fusion versions before 4.2.0 have a stored XSS vulnerability in LDAP/AD authentication config | |
| 1025 | CVE-2026-20963 |
|
81.5th | 8.8 | This vulnerability allows an authorized attacker to execute arbitrary code on Microsoft SharePoint s | |
| 1026 | CVE-2024-57227 |
|
81.5th | 8.0 | This CVE describes a command injection vulnerability in Linksys E7350 routers where an attacker can | |
| 1027 | CVE-2025-30282 |
|
81.5th | 9.1 | This CVE describes an improper authentication vulnerability in Adobe ColdFusion that allows high-pri | |
| 1028 | CVE-2025-21197 |
|
81.5th | 6.5 | This vulnerability allows an authenticated attacker to discover file paths within restricted directo | |
| 1029 | CVE-2024-25699 |
|
81.5th | 8.5 | An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows auth | |
| 1030 | CVE-2025-60699 |
|
81.5th | 6.5 | This CVE describes a buffer overflow vulnerability in TOTOLINK A950RG router firmware that allows un | |
| 1031 | CVE-2025-45988 |
|
81.4th | 9.8 | This CVE describes multiple command injection vulnerabilities in Blink routers where attackers can e | |
| 1032 | CVE-2025-45986 |
|
81.4th | 9.8 | This CVE describes a command injection vulnerability in multiple Blink router models that allows att | |
| 1033 | CVE-2025-45984 |
|
81.4th | 9.8 | This CVE describes a command injection vulnerability in multiple Blink router models via the routepw | |
| 1034 | CVE-2025-2105 |
|
81.4th | 8.1 | The Jupiter X Core WordPress plugin is vulnerable to PHP object injection via deserialization of unt | |
| 1035 | CVE-2024-53924 |
|
81.4th | 9.8 | Pycel versions up to 1.0b30 allow remote code execution when processing untrusted Excel spreadsheets | |
| 1036 | CVE-2023-54327 |
|
81.4th | 9.8 | CVE-2023-54327 is an authentication bypass vulnerability in Tinycontrol LAN Controller 1.58a that al | |
| 1037 | CVE-2025-27743 |
|
81.4th | 7.8 | CVE-2025-27743 is an untrusted search path vulnerability in Microsoft System Center that allows an a | |
| 1038 | CVE-2025-25014 |
|
81.4th | 9.1 | A prototype pollution vulnerability in Kibana allows attackers to execute arbitrary code by sending | |
| 1039 | CVE-2025-24406 |
|
81.4th | 7.5 | This CVE describes a path traversal vulnerability in Adobe Commerce that allows unauthenticated atta | |
| 1040 | CVE-2025-5515 |
|
81.4th | 6.3 | This critical vulnerability in TOTOLINK X2000R routers allows remote attackers to execute arbitrary | |
| 1041 | CVE-2025-26699 |
|
81.3th | 5.0 | A denial-of-service vulnerability exists in Django's text wrapping functions when processing extreme | |
| 1042 | CVE-2025-0316 |
|
81.3th | 9.8 | The WP Directorybox Manager plugin for WordPress has an authentication bypass vulnerability that all | |
| 1043 | CVE-2025-25001 |
|
81.3th | 4.3 | This cross-site scripting (XSS) vulnerability in Microsoft Edge allows attackers to inject malicious | |
| 1044 | CVE-2025-47166 |
|
81.3th | 8.8 | CVE-2025-47166 is a deserialization vulnerability in Microsoft Office SharePoint that allows authent | |
| 1045 | CVE-2025-22398 |
|
81.3th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary operating s | |
| 1046 | CVE-2025-32103 |
|
81.3th | 5.0 | CVE-2025-32103 is a directory traversal vulnerability in CrushFTP that allows attackers to bypass Se | |
| 1047 | CVE-2025-7952 |
|
81.2th | 6.3 | This critical vulnerability in TOTOLINK T6 routers allows remote attackers to execute arbitrary comm | |
| 1048 | CVE-2024-12044 |
|
81.2th | 9.8 | This critical vulnerability allows remote code execution in open-mmlab/mmdetection v3.3.0 through un | |
| 1049 | CVE-2024-13744 |
|
81.2th | 8.1 | The Booster for WooCommerce WordPress plugin versions 4.0.1 through 7.2.4 contain an arbitrary file | |
| 1050 | CVE-2024-13725 |
|
81.2th | 9.8 | The Keap Official Opt-in Forms WordPress plugin has a Local File Inclusion vulnerability that allows |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free