Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1951 | CVE-2025-54386 |
|
70.7th | 9.8 | A path traversal vulnerability in Traefik's WASM plugin installation mechanism allows attackers to o | |
| 1952 | CVE-2025-34271 |
|
70.7th | 9.8 | Nagios Log Server versions before 2024R2.0.2 transmit cluster credentials over unencrypted channels | |
| 1953 | CVE-2025-21410 |
|
70.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Rout | |
| 1954 | CVE-2025-21407 |
|
70.6th | 8.8 | CVE-2025-21407 is a heap-based buffer overflow vulnerability in Windows Telephony Service that allow | |
| 1955 | CVE-2025-21406 |
|
70.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 1956 | CVE-2025-21201 |
|
70.6th | 8.8 | This vulnerability in Windows Telephony Server allows remote attackers to execute arbitrary code on | |
| 1957 | CVE-2025-21190 |
|
70.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 1958 | CVE-2025-24249 |
|
70.6th | 9.8 | This CVE describes a macOS sandbox bypass vulnerability that allows malicious applications to check | |
| 1959 | CVE-2025-24207 |
|
70.6th | 9.8 | This CVE describes a macOS permissions vulnerability where malicious applications can enable iCloud | |
| 1960 | CVE-2025-24181 |
|
70.6th | 9.8 | A permissions vulnerability in macOS allows applications to bypass security restrictions and access | |
| 1961 | CVE-2025-21338 |
|
70.6th | 7.8 | This CVE describes a GDI+ remote code execution vulnerability that allows attackers to execute arbit | |
| 1962 | CVE-2025-3098 |
|
70.6th | 6.1 | The Video Url WordPress plugin up to version 1.0.0.3 contains a reflected cross-site scripting vulne | |
| 1963 | CVE-2025-5439 |
|
70.5th | 6.3 | A critical OS command injection vulnerability in Linksys RE series WiFi extenders allows remote atta | |
| 1964 | CVE-2025-0928 |
|
70.6th | 8.8 | This vulnerability allows any authenticated Juju controller user to upload malicious agent binaries | |
| 1965 | CVE-2024-11437 |
|
70.5th | 4.9 | The Timeline Designer WordPress plugin contains an SQL injection vulnerability that allows unauthent | |
| 1966 | CVE-2025-23011 |
|
70.5th | 8.8 | Fedora Repository 3.8.1 contains a path traversal vulnerability (Zip Slip) that allows authenticated | |
| 1967 | CVE-2025-24983 |
|
70.5th | 7.0 | KEV | This is a use-after-free vulnerability in the Windows Win32 Kernel Subsystem that allows an authenti |
| 1968 | CVE-2025-14884 |
|
70.5th | 7.2 | This CVE describes a command injection vulnerability in the firmware update service of D-Link DIR-60 | |
| 1969 | CVE-2025-2270 |
|
70.4th | 8.1 | This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the Cou | |
| 1970 | CVE-2025-29070 |
|
70.4th | 7.5 | A heap buffer overflow vulnerability exists in the smooth2() function of lcms2-2.16's cmsgamma.c fil | |
| 1971 | CVE-2025-3029 |
|
70.4th | 7.3 | This vulnerability allows attackers to craft URLs with specific Unicode characters that hide the tru | |
| 1972 | CVE-2025-6441 |
|
70.4th | 9.8 | This vulnerability allows unauthenticated attackers to generate login tokens for arbitrary WordPress | |
| 1973 | CVE-2024-10908 |
|
70.4th | 6.1 | An open redirect vulnerability in lm-sys/fastchat v0.2.36 allows attackers to redirect users to mali | |
| 1974 | CVE-2024-13911 |
|
70.4th | 7.2 | The Database Backup and check Tables Automated With Scheduler 2024 WordPress plugin exposes sensitiv | |
| 1975 | CVE-2025-6187 |
|
70.4th | 9.8 | The bSecure WordPress plugin versions 1.3.7 through 1.7.9 have an authentication bypass vulnerabilit | |
| 1976 | CVE-2025-24178 |
|
70.4th | 9.8 | This vulnerability allows a malicious app to escape its sandbox restrictions on affected Apple opera | |
| 1977 | CVE-2025-2708 |
|
70.4th | 5.4 | This critical vulnerability in zhijiantianya ruoyi-vue-pro 2.4.1 allows remote attackers to perform | |
| 1978 | CVE-2025-24064 |
|
70.4th | 8.1 | This is a use-after-free vulnerability in DNS Server that allows unauthorized attackers to execute a | |
| 1979 | CVE-2025-14174 |
|
70.4th | 8.8 | KEV | This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost N |
| 1980 | CVE-2024-55629 |
|
70.4th | 7.5 | This vulnerability in Suricata allows attackers to evade detection by using TCP urgent data (out-of- | |
| 1981 | CVE-2025-29230 |
|
70.3th | 8.6 | This CVE describes a command injection vulnerability in Linksys E5600 routers that allows attackers | |
| 1982 | CVE-2025-59370 |
|
70.3th | N/A | A command injection vulnerability in bwdpi allows authenticated remote attackers to execute arbitrar | |
| 1983 | CVE-2018-9373 |
|
70.3th | 8.8 | CVE-2018-9373 is a critical vulnerability in MediaTek's WLAN driver that allows remote attackers to | |
| 1984 | CVE-2024-56883 |
|
70.3th | 8.1 | Sage DPW versions before 2024_12_001 have an improper access control vulnerability where server-side | |
| 1985 | CVE-2025-24195 |
|
70.2th | 9.8 | An integer overflow vulnerability in macOS allows local users to elevate privileges by exploiting im | |
| 1986 | CVE-2025-29331 |
|
70.2th | 9.8 | A critical vulnerability in MHSanaei 3x-ui management panel allows remote attackers to execute arbit | |
| 1987 | CVE-2024-50566 |
|
70.2th | 7.2 | This CVE describes an OS command injection vulnerability in Fortinet FortiManager and FortiManager C | |
| 1988 | CVE-2025-30165 |
|
70.2th | 8.0 | This vulnerability allows remote code execution in multi-node vLLM deployments using the V0 engine. | |
| 1989 | CVE-2025-27739 |
|
70.1th | 7.8 | This Windows kernel vulnerability allows an authenticated attacker to exploit untrusted pointer dere | |
| 1990 | CVE-2025-27728 |
|
70.1th | 7.8 | CVE-2025-27728 is an out-of-bounds read vulnerability in Windows Kernel-Mode Drivers that allows aut | |
| 1991 | CVE-2025-27490 |
|
70.1th | 7.8 | A heap-based buffer overflow vulnerability in Windows Bluetooth Service allows authenticated attacke | |
| 1992 | CVE-2024-13690 |
|
70.1th | 7.2 | The WP Church Donation plugin for WordPress has a stored cross-site scripting vulnerability that all | |
| 1993 | CVE-2025-6197 |
|
70.1th | 4.2 | This CVE describes an open redirect vulnerability in Grafana OSS organization switching functionalit | |
| 1994 | CVE-2026-1548 |
|
70.1th | 6.3 | This vulnerability allows remote attackers to execute arbitrary commands on Totolink A7000R routers | |
| 1995 | CVE-2025-24167 |
|
70.1th | 9.8 | This vulnerability in Apple's Safari browser and related operating systems allows attackers to misre | |
| 1996 | CVE-2025-45238 |
|
70.1th | 9.1 | FoxCMS v1.2.5 contains an arbitrary file deletion vulnerability in the delRestoreSerie method that a | |
| 1997 | CVE-2025-45800 |
|
70.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK A950RG routers | |
| 1998 | CVE-2025-10585 |
|
70.1th | 9.8 | KEV | A type confusion vulnerability in Chrome's V8 JavaScript engine allows attackers to trigger heap cor |
| 1999 | CVE-2025-26678 |
|
70.1th | 8.4 | CVE-2025-26678 is an improper access control vulnerability in Windows Defender Application Control ( | |
| 2000 | CVE-2025-50989 |
|
70.1th | 9.1 | CVE-2025-50989 is an authenticated command injection vulnerability in OPNsense firewall software tha |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free