Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1151 | CVE-2025-0457 |
|
79.6th | 8.8 | CVE-2025-0457 is an OS command injection vulnerability in NetVision Information's airPASS product th | |
| 1152 | CVE-2025-13223 |
|
79.6th | 8.8 | KEV | A type confusion vulnerability in Chrome's V8 JavaScript engine allows attackers to trigger heap cor |
| 1153 | CVE-2023-53964 |
|
79.6th | 9.8 | This vulnerability allows unauthenticated remote attackers to send a POST request to the /usr/cgi-bi | |
| 1154 | CVE-2023-53771 |
|
79.6th | 9.8 | MiniDVBLinux 5.4 contains an authentication bypass vulnerability that allows remote attackers to cha | |
| 1155 | CVE-2024-57222 |
|
79.6th | 6.3 | This CVE describes a command injection vulnerability in Linksys E7350 routers where an attacker can | |
| 1156 | CVE-2024-12905 |
|
79.6th | 7.5 | This vulnerability in tar-fs allows attackers to write files outside the intended extraction directo | |
| 1157 | CVE-2025-14184 |
|
79.6th | 6.3 | This vulnerability allows remote attackers to execute arbitrary commands on SGAI Space1 NAS N1211DS | |
| 1158 | CVE-2024-11629 |
|
79.5th | 7.1 | This vulnerability in Progress Telerik Document Processing Libraries allows attackers to export the | |
| 1159 | CVE-2025-25940 |
|
79.5th | 9.8 | CVE-2025-25940 is an insecure XML deserialization vulnerability in VisiCut 2.1 that allows remote co | |
| 1160 | CVE-2025-23922 |
|
79.5th | 10.0 | A Cross-Site Request Forgery (CSRF) vulnerability in the Harsh iSpring Embedder WordPress plugin all | |
| 1161 | CVE-2024-6486 |
|
79.5th | 7.2 | This vulnerability allows authenticated WordPress administrators to execute arbitrary operating syst | |
| 1162 | CVE-2025-5947 |
|
79.5th | 9.8 | The Service Finder Bookings WordPress plugin has an authentication bypass vulnerability that allows | |
| 1163 | CVE-2025-21279 |
|
79.5th | 6.5 | This vulnerability in Microsoft Edge (Chromium-based) allows remote attackers to execute arbitrary c | |
| 1164 | CVE-2025-30911 |
|
79.5th | 9.9 | This critical vulnerability in RomethemeKit For Elementor WordPress plugin allows authenticated atta | |
| 1165 | CVE-2025-34184 |
|
79.4th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary operating s | |
| 1166 | CVE-2025-61318 |
|
79.4th | 9.1 | Emlog Pro 2.5.20 contains an arbitrary file deletion vulnerability in admin/template.php and admin/p | |
| 1167 | CVE-2024-12627 |
|
79.4th | 7.5 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to p | |
| 1168 | CVE-2025-32706 |
|
79.4th | 7.8 | KEV | This vulnerability allows an authorized attacker with local access to exploit improper input validat |
| 1169 | CVE-2025-60693 |
|
79.4th | 6.5 | A stack-based buffer overflow vulnerability in Linksys E1200 v2 routers allows remote attackers to e | |
| 1170 | CVE-2025-0650 |
|
79.4th | 8.1 | This vulnerability in Open Virtual Network (OVN) allows specially crafted UDP packets to bypass egre | |
| 1171 | CVE-2024-39367 |
|
79.4th | 9.1 | This CVE describes an authenticated OS command injection vulnerability in the Wavlink AC3000 router' | |
| 1172 | CVE-2024-39360 |
|
79.4th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary operating system commands on | |
| 1173 | CVE-2025-2303 |
|
79.4th | 8.8 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to e | |
| 1174 | CVE-2025-29807 |
|
79.3th | 8.7 | This vulnerability allows an authorized attacker to execute arbitrary code on Microsoft Dataverse se | |
| 1175 | CVE-2024-13671 |
|
79.3th | 7.5 | The Music Sheet Viewer WordPress plugin contains an arbitrary file read vulnerability that allows un | |
| 1176 | CVE-2025-2056 |
|
79.3th | 7.5 | The WP Ghost (Hide My WP Ghost) plugin for WordPress has a path traversal vulnerability in the showF | |
| 1177 | CVE-2024-7776 |
|
79.3th | 9.1 | A path traversal vulnerability in the ONNX framework's download_model function allows attackers to o | |
| 1178 | CVE-2025-27657 |
|
79.2th | 9.8 | This critical vulnerability in Vasion Print (formerly PrinterLogic) allows remote attackers to execu | |
| 1179 | CVE-2026-0787 |
|
79.2th | 9.8 | CVE-2026-0787 is a command injection vulnerability in ALGO 8180 IP Audio Alerter devices that allows | |
| 1180 | CVE-2026-0759 |
|
79.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands on systems running Katana N | |
| 1181 | CVE-2026-0756 |
|
79.2th | 9.8 | This is a critical command injection vulnerability in github-kanban-mcp-server that allows unauthent | |
| 1182 | CVE-2026-0755 |
|
79.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands on systems running vulnerab | |
| 1183 | CVE-2025-15063 |
|
79.2th | 9.8 | This is a critical command injection vulnerability in Ollama MCP Server that allows remote attackers | |
| 1184 | CVE-2025-9934 |
|
79.1th | 6.3 | This CVE describes a command injection vulnerability in TOTOLINK X5000R routers affecting the sub_41 | |
| 1185 | CVE-2025-29959 |
|
79.1th | 6.5 | This vulnerability in Windows Routing and Remote Access Service (RRAS) allows attackers to read unin | |
| 1186 | CVE-2025-34181 |
|
79.1th | N/A | NetSupport Manager versions before 14.12.0001 contain an authenticated path traversal vulnerability | |
| 1187 | CVE-2024-13163 |
|
79.1th | 7.8 | This vulnerability allows remote unauthenticated attackers to execute arbitrary code on Ivanti Endpo | |
| 1188 | CVE-2024-10954 |
|
79.1th | 8.8 | This vulnerability allows remote code execution on servers running vulnerable versions of the gpt_ac | |
| 1189 | CVE-2025-57685 |
|
79.1th | 8.8 | This vulnerability allows unauthenticated attackers to execute arbitrary commands with highest privi | |
| 1190 | CVE-2025-66401 |
|
79.1th | 9.8 | MCP Watch versions 0.1.2 and earlier contain a critical command injection vulnerability in the MCPSc | |
| 1191 | CVE-2025-1853 |
|
79.1th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC8 routers allows remote attackers to | |
| 1192 | CVE-2025-56110 |
|
79.1th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows att | |
| 1193 | CVE-2025-56109 |
|
79.1th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows att | |
| 1194 | CVE-2025-0308 |
|
79.1th | 7.5 | This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks agai | |
| 1195 | CVE-2025-68916 |
|
79th | 9.1 | This vulnerability allows attackers to perform directory traversal through the certsupload.cgi endpo | |
| 1196 | CVE-2024-10950 |
|
79th | 8.8 | This vulnerability allows attackers to execute arbitrary code on servers running vulnerable versions | |
| 1197 | CVE-2024-58258 |
|
79th | 7.2 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in SugarCRM's API module that | |
| 1198 | CVE-2023-49886 |
|
79th | 9.8 | CVE-2023-49886 is a critical remote code execution vulnerability in IBM Standards Processing Engine | |
| 1199 | CVE-2024-11041 |
|
79th | 9.8 | CVE-2024-11041 is a critical remote code execution vulnerability in vLLM v0.6.2 where the MessageQue | |
| 1200 | CVE-2026-2130 |
|
79th | 6.3 | This CVE describes a command injection vulnerability in BurtTheCoder's mcp-maigret tool up to versio |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free