Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 151 | CVE-2025-22964 |
|
94.1th | 8.1 | This vulnerability allows unauthenticated attackers to perform time-based blind SQL injection attack | |
| 152 | CVE-2024-12365 |
|
94.1th | 8.5 | The W3 Total Cache WordPress plugin up to version 2.8.1 lacks proper capability checks, allowing aut | |
| 153 | CVE-2026-21509 |
|
94th | 7.8 | KEV | This vulnerability in Microsoft Office allows an attacker to bypass local security features by manip |
| 154 | CVE-2024-12085 |
|
93.9th | 7.5 | This vulnerability in rsync allows attackers to leak uninitialized stack memory one byte at a time b | |
| 155 | CVE-2024-40890 |
|
93.9th | 8.8 | KEV | This is a post-authentication command injection vulnerability in Zyxel VMG4325-B10A DSL CPE devices |
| 156 | CVE-2025-3935 |
|
93.7th | 8.1 | KEV | CVE-2025-3935 is a ViewState code injection vulnerability affecting ScreenConnect versions 25.2.3 an |
| 157 | CVE-2024-48419 |
|
93.4th | 8.8 | This CVE describes multiple command injection vulnerabilities in Edimax AC1200 routers that allow au | |
| 158 | CVE-2025-49716 |
|
93.3th | 7.5 | This vulnerability in Windows Netlogon allows unauthorized attackers to cause denial of service by c | |
| 159 | CVE-2025-7795 |
|
93.2th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 160 | CVE-2025-31131 |
|
93.2th | 8.6 | YesWiki versions before 4.5.2 contain a path traversal vulnerability in the squelette parameter that | |
| 161 | CVE-2024-55968 |
|
93.2th | 8.8 | This vulnerability allows unauthorized local attackers to escalate privileges to root on macOS syste | |
| 162 | CVE-2025-53558 |
|
93.2th | 8.8 | ZTE Japan's ZXHN-F660T and ZXHN-F660A routers use a hardcoded credential shared across all installat | |
| 163 | CVE-2025-21380 |
|
93.1th | 8.8 | This vulnerability allows authenticated attackers to bypass access controls in Azure SaaS Resources, | |
| 164 | CVE-2025-26264 |
|
93.1th | 8.8 | GeoVision GV-ASWeb versions 6.1.2.0 and below contain an authenticated remote code execution vulnera | |
| 165 | CVE-2025-66744 |
|
93.1th | 7.5 | This vulnerability in Yonyou YonBIP allows attackers to bypass normal directory restrictions via pat | |
| 166 | CVE-2025-32724 |
|
93.1th | 7.5 | This vulnerability allows an unauthorized attacker to cause a denial of service (DoS) in Windows LSA | |
| 167 | CVE-2025-23369 |
|
92.9th | 8.8 | This vulnerability allows unauthorized internal users to spoof cryptographic signatures in GitHub En | |
| 168 | CVE-2025-21343 |
|
92.8th | 7.5 | This vulnerability in Windows Web Threat Defense User Service allows attackers to read sensitive inf | |
| 169 | CVE-2025-33068 |
|
92.7th | 7.5 | This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke | |
| 170 | CVE-2025-1639 |
|
92.7th | 8.8 | The Animation Addons for Elementor Pro WordPress plugin has a vulnerability that allows authenticate | |
| 171 | CVE-2025-53722 |
|
92.7th | 7.5 | This vulnerability allows an unauthorized attacker to cause a denial-of-service condition in Windows | |
| 172 | CVE-2024-20150 |
|
92.6th | 7.5 | This vulnerability in MediaTek modem firmware allows remote attackers to cause a system crash (denia | |
| 173 | CVE-2025-6770 |
|
92.5th | 7.2 | CVE-2025-6770 is an OS command injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that | |
| 174 | CVE-2024-23733 |
|
92.5th | 7.5 | This vulnerability allows remote attackers to bypass authentication on Software AG webMethods Integr | |
| 175 | CVE-2025-6204 |
|
92.3th | 8.0 | KEV | This CVE describes a code injection vulnerability in DELMIA Apriso manufacturing software that allow |
| 176 | CVE-2024-56289 |
|
92.2th | 7.1 | This is a reflected cross-site scripting (XSS) vulnerability in the Groundhogg WordPress plugin that | |
| 177 | CVE-2025-21418 |
|
92.1th | 7.8 | KEV | This vulnerability in Windows Ancillary Function Driver for WinSock allows attackers to gain SYSTEM- |
| 178 | CVE-2024-57539 |
|
92.1th | 8.2 | This CVE describes a command injection vulnerability in Linksys E8450 routers where an attacker can | |
| 179 | CVE-2024-53345 |
|
92.1th | 8.8 | An authenticated arbitrary file upload vulnerability in Car Rental Management System versions 1.0 th | |
| 180 | CVE-2025-36845 |
|
92th | 8.6 | This Server-Side Request Forgery (SSRF) vulnerability in Eveo URVE Web Manager allows attackers to m | |
| 181 | CVE-2025-26633 |
|
91.9th | 7.0 | KEV | CVE-2025-26633 is a security feature bypass vulnerability in Microsoft Management Console (MMC) that |
| 182 | CVE-2025-27134 |
|
91.9th | 8.8 | This privilege escalation vulnerability in Joplin server allows non-admin users to modify their own | |
| 183 | CVE-2025-2473 |
|
91.9th | 7.3 | This critical SQL injection vulnerability in PHPGurukul Company Visitor Management System 2.0 allows | |
| 184 | CVE-2025-8876 |
|
91.8th | 8.8 | KEV | CVE-2025-8876 is an OS command injection vulnerability in N-able N-central management software cause |
| 185 | CVE-2025-56132 |
|
91.8th | 7.3 | LiquidFiles filetransfer server versions prior to 4.2 have a user enumeration vulnerability in the p | |
| 186 | CVE-2025-30355 |
|
91.6th | 7.1 | A malicious Matrix server can craft events that cause Synapse homeservers to stop federating with ot | |
| 187 | CVE-2025-44177 |
|
91.6th | 8.2 | An unauthenticated directory traversal vulnerability in White Star Software Protop version 4.4.2-202 | |
| 188 | CVE-2025-21204 |
|
91.5th | 7.8 | This vulnerability allows an authorized attacker with local access to exploit improper link resoluti | |
| 189 | CVE-2025-21173 |
|
91.5th | 7.3 | This CVE describes a privilege escalation vulnerability in .NET that allows authenticated attackers | |
| 190 | CVE-2024-57022 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 191 | CVE-2024-57021 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 192 | CVE-2024-57020 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 193 | CVE-2024-57019 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 194 | CVE-2024-57018 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 195 | CVE-2024-57017 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 196 | CVE-2024-57016 |
|
91.2th | 8.8 | This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers where an attacke | |
| 197 | CVE-2024-57015 |
|
91.2th | 8.8 | This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers where attackers | |
| 198 | CVE-2024-57013 |
|
91.2th | 8.8 | This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers where attackers | |
| 199 | CVE-2024-57012 |
|
91.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 200 | CVE-2025-25231 |
|
91.1th | 7.5 | Omnissa Workspace ONE UEM contains a path traversal vulnerability in secondary context paths that al |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free