Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1701 | CVE-2024-12403 |
|
73.4th | 6.1 | This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting attack | |
| 1702 | CVE-2024-11327 |
|
73.4th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages | |
| 1703 | CVE-2025-37094 |
|
73.3th | 5.5 | This vulnerability allows attackers to delete arbitrary files on HPE StoreOnce backup appliances thr | |
| 1704 | CVE-2024-8053 |
|
73.3th | 8.2 | This vulnerability in open-webui v0.3.10 allows unauthenticated attackers to access the PDF generati | |
| 1705 | CVE-2025-34392 |
|
73.3th | 9.8 | This vulnerability in Barracuda Service Center allows attackers to upload malicious WSDL files that | |
| 1706 | CVE-2022-31631 |
|
73.3th | 9.1 | This vulnerability in PHP's PDO::quote() function for SQLite allows SQL injection when processing ov | |
| 1707 | CVE-2025-30426 |
|
73.3th | 9.8 | This vulnerability allows an app to enumerate a user's installed applications without proper authori | |
| 1708 | CVE-2024-11343 |
|
73.2th | 8.3 | This vulnerability in Progress Telerik Document Processing Libraries allows attackers to perform pat | |
| 1709 | CVE-2025-25535 |
|
73.2th | 9.8 | CVE-2025-25535 is an HTTP response manipulation vulnerability in SCRIPT CASE v1.0.002 Build7 that al | |
| 1710 | CVE-2025-67186 |
|
73.2th | 9.8 | This critical buffer overflow vulnerability in TOTOLINK A950RG routers allows remote attackers to ex | |
| 1711 | CVE-2025-21379 |
|
73.2th | 7.1 | This vulnerability allows remote attackers to execute arbitrary code on affected systems by sending | |
| 1712 | CVE-2025-44635 |
|
73.2th | 9.8 | This critical vulnerability allows unauthenticated attackers to execute arbitrary commands with root | |
| 1713 | CVE-2024-13793 |
|
73.2th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the | |
| 1714 | CVE-2025-6514 |
|
73.2th | 9.6 | CVE-2025-6514 is a critical OS command injection vulnerability in mcp-remote that allows remote code | |
| 1715 | CVE-2024-12537 |
|
73.2th | 7.5 | This vulnerability in open-webui version 0.3.32 allows unauthenticated attackers to send large POST | |
| 1716 | CVE-2024-57536 |
|
73.1th | 8.0 | This CVE describes a command injection vulnerability in the Linksys E8450 router's wizard_status com | |
| 1717 | CVE-2025-24230 |
|
73.1th | 9.8 | This CVE describes an out-of-bounds read vulnerability in Apple's audio file processing that could a | |
| 1718 | CVE-2025-24211 |
|
73.1th | 9.8 | A memory corruption vulnerability in Apple's video processing components allows attackers to cause u | |
| 1719 | CVE-2025-24190 |
|
73.1th | 9.8 | This is a critical memory corruption vulnerability in Apple's video processing components across mul | |
| 1720 | CVE-2024-11286 |
|
73.1th | 9.8 | The WP JobHunt plugin for WordPress has an authentication bypass vulnerability that allows unauthent | |
| 1721 | CVE-2025-0349 |
|
73.1th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC6 routers allows remote attackers to | |
| 1722 | CVE-2024-58310 |
|
73.1th | N/A | APC Network Management Card 4 contains an unauthenticated path traversal vulnerability that allows a | |
| 1723 | CVE-2025-8890 |
|
73.1th | N/A | CVE-2025-8890 is a shell command injection vulnerability in the network diagnostics tool of SDMC NE6 | |
| 1724 | CVE-2025-14208 |
|
73.1th | 6.3 | This CVE describes a command injection vulnerability in D-Link DIR-823X routers where attackers can | |
| 1725 | CVE-2025-2581 |
|
73.1th | 4.3 | An integer underflow vulnerability in xmedcon's DICOM file handler allows remote attackers to potent | |
| 1726 | CVE-2026-0625 |
|
73.1th | N/A | This CVE describes an authentication bypass vulnerability in D-Link DSL/DIR/DNS devices that allows | |
| 1727 | CVE-2025-3785 |
|
73.1th | 8.8 | This critical vulnerability in D-Link DWR-M961 routers allows remote attackers to execute arbitrary | |
| 1728 | CVE-2025-49741 |
|
73.1th | 7.4 | This vulnerability in Microsoft Edge (Chromium-based) allows unauthorized attackers to access sensit | |
| 1729 | CVE-2022-50936 |
|
73.1th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary PHP code on WBCE CMS servers | |
| 1730 | CVE-2025-69288 |
|
73th | 9.1 | This vulnerability allows any authenticated admin user in Titra time tracking software to execute ar | |
| 1731 | CVE-2025-21346 |
|
73th | 7.1 | This CVE describes a security feature bypass vulnerability in Microsoft Office that could allow atta | |
| 1732 | CVE-2024-10763 |
|
73th | 9.8 | The Campress WordPress theme contains a Local File Inclusion vulnerability that allows unauthenticat | |
| 1733 | CVE-2025-56431 |
|
73th | 7.5 | This directory traversal vulnerability in FearlessCMS allows remote attackers to use the plugin-hand | |
| 1734 | CVE-2025-56430 |
|
73th | 7.5 | This CVE describes a directory traversal vulnerability in FearlessCMS that allows remote attackers t | |
| 1735 | CVE-2025-30479 |
|
73th | 8.4 | Dell CloudLink versions before 8.2 contain an OS command injection vulnerability (CWE-78) where auth | |
| 1736 | CVE-2025-1609 |
|
73th | 6.3 | This CVE describes a critical OS command injection vulnerability in LB-LINK AC1900 routers. Attacker | |
| 1737 | CVE-2025-27716 |
|
72.9th | 6.5 | A path traversal vulnerability in the HGW-BL1500HM gateway's USB file-sharing function allows attack | |
| 1738 | CVE-2025-29411 |
|
72.9th | 9.8 | An arbitrary file upload vulnerability in Mart Developers iBanking v2.0.0 allows authenticated attac | |
| 1739 | CVE-2025-47204 |
|
72.9th | 6.1 | This vulnerability in bootstrap-multiselect 1.1.2 allows attackers to execute arbitrary JavaScript c | |
| 1740 | CVE-2025-21361 |
|
72.9th | 7.8 | Microsoft Outlook contains a remote code execution vulnerability that allows attackers to execute ar | |
| 1741 | CVE-2024-43097 |
|
72.9th | 7.8 | This vulnerability is an integer overflow in Skia's SkRegion.cpp that leads to out-of-bounds write. | |
| 1742 | CVE-2025-64120 |
|
72.9th | 8.8 | This OS command injection vulnerability in Nuvation Energy Multi-Stack Controller allows attackers t | |
| 1743 | CVE-2024-53305 |
|
72.9th | 7.3 | This vulnerability allows remote attackers to execute arbitrary code on Whoogle Search instances by | |
| 1744 | CVE-2024-25183 |
|
72.9th | 7.5 | CVE-2024-25183 is a directory traversal vulnerability in givanz VvvebJs 1.7.2 that allows attackers | |
| 1745 | CVE-2025-0247 |
|
72.9th | 9.8 | CVE-2025-0247 is a critical memory safety vulnerability in Firefox and Thunderbird that could allow | |
| 1746 | CVE-2024-49749 |
|
72.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on affected systems without use | |
| 1747 | CVE-2025-0864 |
|
72.8th | 6.1 | This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS) | |
| 1748 | CVE-2023-39339 |
|
72.8th | 4.9 | This vulnerability allows authenticated administrators on Ivanti Policy Secure to read arbitrary fil | |
| 1749 | CVE-2025-21362 |
|
72.8th | 8.4 | This vulnerability allows attackers to execute arbitrary code on a victim's system by tricking them | |
| 1750 | CVE-2024-13421 |
|
72.8th | 9.8 | This vulnerability in the Real Estate 7 WordPress theme allows unauthenticated attackers to register |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free