Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1651 | CVE-2025-21309 |
|
74th | 8.1 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Remo | |
| 1652 | CVE-2025-24216 |
|
74th | 4.3 | This CVE describes a memory handling vulnerability in Apple's Safari browser and related operating s | |
| 1653 | CVE-2025-48200 |
|
74th | 10.0 | This critical vulnerability in the sr_feuser_register TYPO3 extension allows unauthenticated attacke | |
| 1654 | CVE-2025-1016 |
|
74th | 9.8 | This CVE describes memory safety bugs in Mozilla Firefox and Thunderbird that could lead to memory c | |
| 1655 | CVE-2025-27394 |
|
73.9th | 7.2 | This vulnerability allows an authenticated, highly-privileged remote attacker to execute arbitrary c | |
| 1656 | CVE-2025-27393 |
|
73.9th | 7.2 | This vulnerability in Siemens SCALANCE LPE9403 industrial network devices allows authenticated high- | |
| 1657 | CVE-2025-27392 |
|
73.9th | 7.2 | A vulnerability in SCALANCE LPE9403 industrial network devices allows authenticated high-privileged | |
| 1658 | CVE-2025-42928 |
|
73.9th | 9.1 | A high-privileged user can exploit a deserialization vulnerability in SAP jConnect to execute arbitr | |
| 1659 | CVE-2024-53800 |
|
73.9th | 8.1 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 1660 | CVE-2025-34225 |
|
73.9th | 8.6 | This CVE describes an unauthenticated server-side request forgery (SSRF) vulnerability in Vasion Pri | |
| 1661 | CVE-2025-25361 |
|
73.8th | 9.8 | This vulnerability allows attackers to upload malicious SVG or XML files to PublicCMS v4.0.202406, p | |
| 1662 | CVE-2025-14107 |
|
73.8th | 8.8 | This CVE describes a command injection vulnerability in ZSPACE Q2C NAS devices that allows remote at | |
| 1663 | CVE-2024-13377 |
|
73.8th | 7.2 | The Gravity Forms WordPress plugin has a stored XSS vulnerability in the 'alt' parameter that allows | |
| 1664 | CVE-2025-22974 |
|
73.8th | 9.8 | This SQL injection vulnerability in SeaCMS allows remote attackers to execute arbitrary SQL commands | |
| 1665 | CVE-2025-53364 |
|
73.8th | 5.3 | Parse Server's GraphQL API exposed schema metadata without authentication in versions 5.3.0 through | |
| 1666 | CVE-2025-0511 |
|
73.8th | 7.2 | The Welcart e-Commerce plugin for WordPress has a stored cross-site scripting (XSS) vulnerability in | |
| 1667 | CVE-2025-30382 |
|
73.8th | 7.8 | This vulnerability allows an unauthorized attacker to execute arbitrary code on SharePoint servers b | |
| 1668 | CVE-2025-8356 |
|
73.7th | 9.8 | CVE-2025-8356 is a critical path traversal vulnerability in Xerox FreeFlow Core version 8.0.4 that a | |
| 1669 | CVE-2025-62703 |
|
73.7th | 8.8 | This CVE describes a remote code execution vulnerability in Fugue's RPC server implementation. Attac | |
| 1670 | CVE-2025-21400 |
|
73.7th | 8.0 | CVE-2025-21400 is a remote code execution vulnerability in Microsoft SharePoint Server that allows a | |
| 1671 | CVE-2025-21369 |
|
73.7th | 8.8 | This vulnerability allows remote code execution via Microsoft Digest Authentication, enabling attack | |
| 1672 | CVE-2022-50695 |
|
73.7th | 7.5 | This vulnerability allows unauthenticated attackers to abuse network diagnostic scripts (ping.php, t | |
| 1673 | CVE-2025-1538 |
|
73.7th | 8.8 | A critical heap-based buffer overflow vulnerability in D-Link DAP-1320's set_ws_action function allo | |
| 1674 | CVE-2024-13888 |
|
73.7th | 7.2 | The WPMobile.App WordPress plugin contains an open redirect vulnerability that allows unauthenticate | |
| 1675 | CVE-2025-23249 |
|
73.7th | 7.6 | The NVIDIA NeMo Framework vulnerability allows remote attackers to execute arbitrary code by exploit | |
| 1676 | CVE-2025-1976 |
|
73.6th | 6.7 | KEV | This vulnerability allows local admin users on Brocade Fabric OS to escalate privileges to root leve |
| 1677 | CVE-2025-63657 |
|
73.6th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's mk_mimetype_find function allows attacker | |
| 1678 | CVE-2025-63656 |
|
73.6th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's HTTP parser allows attackers to cause den | |
| 1679 | CVE-2025-63653 |
|
73.6th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's mk_vhost_fdt_close function allows attack | |
| 1680 | CVE-2025-63652 |
|
73.6th | 7.5 | A use-after-free vulnerability in Monkey web server's HTTP request handling allows attackers to cras | |
| 1681 | CVE-2025-1861 |
|
73.6th | 9.8 | This CVE describes a buffer size limitation vulnerability in PHP's HTTP redirect parsing. When PHP p | |
| 1682 | CVE-2025-2802 |
|
73.6th | 7.3 | The LayoutBoxx WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes due | |
| 1683 | CVE-2024-13738 |
|
73.6th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the | |
| 1684 | CVE-2025-25675 |
|
73.5th | 9.8 | This CVE describes a command injection vulnerability in Tenda AC10 routers that allows remote attack | |
| 1685 | CVE-2025-2174 |
|
73.5th | 5.3 | An integer overflow vulnerability in libzvbi's vbi_strndup_iconv_ucs2 function allows remote attacke | |
| 1686 | CVE-2025-32906 |
|
73.5th | 7.5 | An out-of-bounds read vulnerability in libsoup's soup_headers_parse_request() function allows attack | |
| 1687 | CVE-2022-50919 |
|
73.5th | 9.8 | CVE-2022-50919 is an unauthenticated remote code execution vulnerability in Tdarr's Help terminal th | |
| 1688 | CVE-2024-11169 |
|
73.5th | 7.5 | An unhandled exception in the fs module of danny-avila/librechat allows unauthenticated attackers to | |
| 1689 | CVE-2025-2494 |
|
73.5th | 9.8 | CVE-2025-2494 allows unrestricted file upload in Softdial Contact Center via the '/softdial/phpconso | |
| 1690 | CVE-2025-26631 |
|
73.5th | 7.3 | This vulnerability in Visual Studio Code allows an authorized attacker to execute arbitrary code wit | |
| 1691 | CVE-2025-29791 |
|
73.5th | 7.8 | A type confusion vulnerability in Microsoft Office allows attackers to execute arbitrary code on vul | |
| 1692 | CVE-2025-59359 |
|
73.5th | 9.8 | CVE-2025-59359 is an OS command injection vulnerability in Chaos Controller Manager's cleanTcs mutat | |
| 1693 | CVE-2025-32726 |
|
73.4th | 6.8 | This vulnerability in Visual Studio Code allows an authenticated local attacker to bypass access con | |
| 1694 | CVE-2025-25101 |
|
73.4th | 9.6 | A Cross-Site Request Forgery (CSRF) vulnerability in the MetricThemes Munk Sites WordPress plugin al | |
| 1695 | CVE-2025-27749 |
|
73.4th | 7.8 | A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on vul | |
| 1696 | CVE-2025-27747 |
|
73.4th | 7.8 | A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o | |
| 1697 | CVE-2025-27745 |
|
73.4th | 7.8 | CVE-2025-27745 is a use-after-free vulnerability in Microsoft Office that allows local attackers to | |
| 1698 | CVE-2025-27741 |
|
73.4th | 7.8 | This vulnerability is an out-of-bounds read in Windows NTFS that allows a local attacker to read mem | |
| 1699 | CVE-2025-27483 |
|
73.4th | 7.8 | This vulnerability is an out-of-bounds read in Windows NTFS that allows a local attacker to read sen | |
| 1700 | CVE-2025-5746 |
|
73.4th | 9.8 | This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress servers r |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free