Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3201 | CVE-2025-11522 |
|
58.6th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication and take over any user | |
| 3202 | CVE-2021-4471 |
|
58.6th | N/A | TG8 Firewall exposes the /data/ directory via HTTP without authentication, allowing remote attackers | |
| 3203 | CVE-2024-12264 |
|
58.6th | 9.8 | This vulnerability allows unauthenticated attackers to create administrative user accounts on WordPr | |
| 3204 | CVE-2024-12402 |
|
58.6th | 9.8 | This vulnerability allows unauthenticated attackers to change any WordPress user's password, includi | |
| 3205 | CVE-2025-30465 |
|
58.6th | 9.8 | This CVE describes a permissions bypass vulnerability in Apple's Shortcuts app across multiple macOS | |
| 3206 | CVE-2024-10361 |
|
58.5th | 9.1 | This vulnerability allows attackers to delete arbitrary files on servers running vulnerable versions | |
| 3207 | CVE-2025-1932 |
|
58.6th | 8.1 | A memory corruption vulnerability in Firefox and Thunderbird's XSLT processor could allow attackers | |
| 3208 | CVE-2025-4139 |
|
58.5th | 8.8 | A critical buffer overflow vulnerability in Netgear EX6120's fwAcosCgiInbound function allows remote | |
| 3209 | CVE-2025-32931 |
|
58.6th | 9.1 | CVE-2025-32931 is an authenticated remote code execution vulnerability in DevDojo Voyager that allow | |
| 3210 | CVE-2025-11018 |
|
58.5th | 5.3 | This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl | |
| 3211 | CVE-2025-10709 |
|
58.5th | 5.3 | This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl | |
| 3212 | CVE-2025-10708 |
|
58.5th | 5.3 | This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl | |
| 3213 | CVE-2024-50859 |
|
58.5th | 4.8 | This vulnerability allows attackers to execute malicious JavaScript in victims' browsers when they u | |
| 3214 | CVE-2024-13537 |
|
58.5th | 5.3 | The C9 Blocks WordPress plugin contains a publicly accessible file (composer-setup.php) that disclos | |
| 3215 | CVE-2025-4135 |
|
58.5th | 6.3 | This CVE describes a critical command injection vulnerability in Netgear WG302v2 wireless access poi | |
| 3216 | CVE-2025-5619 |
|
58.5th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda CH22 routers allows remote attackers t | |
| 3217 | CVE-2025-29523 |
|
58.5th | 7.2 | This CVE describes a command injection vulnerability in D-Link DSL-7740C routers that allows attacke | |
| 3218 | CVE-2025-43984 |
|
58.5th | 9.8 | This vulnerability allows remote unauthenticated attackers to execute arbitrary operating system com | |
| 3219 | CVE-2025-10230 |
|
58.5th | 10.0 | This critical vulnerability in Samba allows unauthenticated remote attackers to execute arbitrary co | |
| 3220 | CVE-2024-9132 |
|
58.4th | 8.1 | This vulnerability allows administrators to configure insecure captive portal scripts in Arista EOS | |
| 3221 | CVE-2025-0999 |
|
58.5th | 8.8 | A heap buffer overflow vulnerability in Chrome's V8 JavaScript engine allows remote attackers to pot | |
| 3222 | CVE-2025-31685 |
|
58.4th | 9.1 | This CVE describes a Missing Authorization vulnerability in Drupal Open Social that allows Forceful | |
| 3223 | CVE-2024-13567 |
|
58.4th | 7.5 | This vulnerability allows unauthenticated attackers to access sensitive files stored in the Awesome | |
| 3224 | CVE-2025-59259 |
|
58.4th | 6.5 | This vulnerability in Windows Local Session Manager allows authenticated attackers to cause denial o | |
| 3225 | CVE-2025-59257 |
|
58.4th | 6.5 | This vulnerability in Windows Local Session Manager allows authenticated attackers to send specially | |
| 3226 | CVE-2023-45760 |
|
58.4th | 4.3 | This CVE describes a Missing Authorization vulnerability in the wpDiscuz WordPress plugin that allow | |
| 3227 | CVE-2025-1403 |
|
58.4th | 8.6 | This vulnerability allows remote attackers to cause denial of service by sending maliciously crafted | |
| 3228 | CVE-2025-7806 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 3229 | CVE-2025-7805 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 3230 | CVE-2025-7794 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 3231 | CVE-2025-7792 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 3232 | CVE-2025-7549 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers | |
| 3233 | CVE-2025-7544 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC1206 routers allows remote attackers | |
| 3234 | CVE-2025-9483 |
|
58.4th | 8.8 | A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac | |
| 3235 | CVE-2025-9358 |
|
58.4th | 8.8 | A stack-based buffer overflow vulnerability in Linksys WiFi range extenders allows remote attackers | |
| 3236 | CVE-2025-9355 |
|
58.4th | 8.8 | A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac | |
| 3237 | CVE-2025-9023 |
|
58.4th | 8.8 | A buffer overflow vulnerability in Tenda AC7 and AC18 routers allows remote attackers to execute arb | |
| 3238 | CVE-2025-9791 |
|
58.4th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC20 routers via a sta | |
| 3239 | CVE-2025-15257 |
|
58.4th | 7.3 | This CVE describes a command injection vulnerability in the Edimax BR-6208AC router's web configurat | |
| 3240 | CVE-2025-3874 |
|
58.3th | 6.5 | The WordPress Simple Shopping Cart plugin has an Insecure Direct Object Reference vulnerability that | |
| 3241 | CVE-2020-0919 |
|
58.3th | 7.8 | This vulnerability allows attackers to load unsigned binaries in Microsoft Remote Desktop App for Ma | |
| 3242 | CVE-2025-52385 |
|
58.3th | 9.8 | This critical vulnerability in Studio 3T allows remote attackers to execute arbitrary code on affect | |
| 3243 | CVE-2025-0568 |
|
58.2th | 7.5 | This vulnerability allows remote attackers to cause denial-of-service on Sante PACS Server by sendin | |
| 3244 | CVE-2025-26530 |
|
58.2th | 8.3 | This reflected cross-site scripting (XSS) vulnerability in Moodle's question bank filter allows atta | |
| 3245 | CVE-2024-13600 |
|
58.3th | 7.5 | This vulnerability allows unauthenticated attackers to access sensitive file attachments from WordPr | |
| 3246 | CVE-2025-1514 |
|
58.3th | 7.3 | This vulnerability in the Active Products Tables for WooCommerce WordPress plugin allows unauthentic | |
| 3247 | CVE-2024-53388 |
|
58.3th | 8.8 | A DOM Clobbering vulnerability in Mavo v0.3.2 allows attackers to inject malicious HTML elements tha | |
| 3248 | CVE-2025-39550 |
|
58.3th | 9.8 | CVE-2025-39550 is a PHP object injection vulnerability in the Shahjahan Jewel FluentCommunity WordPr | |
| 3249 | CVE-2025-32658 |
|
58.3th | 9.8 | This vulnerability allows attackers to execute arbitrary code on WordPress sites running the vulnera | |
| 3250 | CVE-2025-32572 |
|
58.3th | 9.8 | CVE-2025-32572 is a PHP object injection vulnerability in the Kata Plus WordPress plugin that allows |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free