Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
401 CVE-2025-21356
1.83%
82.6th 7.8 This vulnerability allows remote code execution when a user opens a specially crafted Visio file. At
402 CVE-2013-10073
1.83%
82.6th 8.8 This vulnerability allows authenticated users with access to the Auto-Discovery tool in Nagios XI to
403 CVE-2025-21294
1.82%
82.5th 8.1 This vulnerability allows remote code execution via Microsoft Digest Authentication, enabling attack
404 CVE-2024-13453
1.81%
82.5th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug
405 CVE-2025-6851
1.79%
82.4th 7.2 The Broken Link Notifier WordPress plugin contains a Server-Side Request Forgery (SSRF) vulnerabilit
406 CVE-2025-1913
1.79%
82.4th 7.2 This vulnerability allows authenticated WordPress administrators to inject PHP objects via deseriali
407 CVE-2024-53868
1.77%
82.3th 7.5 Apache Traffic Server is vulnerable to HTTP request smuggling when processing malformed chunked mess
408 CVE-2025-21244
1.76%
82.3th 8.8 This is a remote code execution vulnerability in the Windows Telephony Service that allows attackers
409 CVE-2025-21243
1.76%
82.3th 8.8 This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on
410 CVE-2025-55749
1.76%
82.2th 7.5 This vulnerability in XWiki Jetty package (XJetty) exposes a context that allows static access to an
411 CVE-2025-24494
1.74%
82.2th 7.2 This path traversal vulnerability in Ixia/IxNetwork products allows device administrators to upload
412 CVE-2025-1448
1.74%
82.1th 7.3 This critical vulnerability in Synway SMG Gateway Management Software allows remote attackers to exe
413 CVE-2024-51229
1.73%
82.1th 8.8 This Cross-Site Scripting (XSS) vulnerability in LinZhaoguan pb-cms v2.0 allows remote attackers to
414 CVE-2025-13700
1.72%
82th 7.2 This vulnerability allows authenticated remote attackers to execute arbitrary operating system comma
415 CVE-2025-62204
1.71%
82th 8.0 This vulnerability allows an authenticated attacker to execute arbitrary code on Microsoft SharePoin
416 CVE-2025-1040
1.71%
82th 8.8 AutoGPT versions 0.3.4 and earlier contain a Server-Side Template Injection vulnerability that allow
417 CVE-2026-2152
1.7%
82th 7.2 This CVE describes a remote command injection vulnerability in D-Link DIR-615 routers through the we
418 CVE-2025-0492
1.7%
82th 7.5 A critical null pointer dereference vulnerability in D-Link DIR-823X routers allows remote attackers
419 CVE-2025-1971
1.7%
81.9th 7.2 This CVE describes a PHP Object Injection vulnerability in the Export and Import Users and Customers
420 CVE-2024-10633
1.69%
81.9th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug
421 CVE-2025-49718
1.69%
81.9th 7.5 This vulnerability in SQL Server involves improper initialization of resources, allowing unauthorize
422 CVE-2024-13184
1.67%
81.8th 7.5 This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks agai
423 CVE-2024-9950
1.67%
81.8th 7.8 An unauthenticated attacker can modify compliance scripts in Forescout SecureConnector v11.3.07.0109
424 CVE-2025-56127
1.66%
81.8th 8.8 This CVE describes an OS command injection vulnerability in Ruijie RG-BCR600W routers that allows at
425 CVE-2025-56117
1.66%
81.8th 8.8 This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attac
426 CVE-2025-56111
1.66%
81.8th 8.8 This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows att
427 CVE-2019-15690
1.66%
81.7th 8.8 CVE-2019-15690 is a heap buffer overflow vulnerability in LibVNCServer that allows remote attackers
428 CVE-2024-12035
1.66%
81.7th 8.8 The CS Framework WordPress plugin has an arbitrary file deletion vulnerability that allows authentic
429 CVE-2025-2257
1.66%
81.7th 7.2 This vulnerability allows authenticated attackers with administrator-level WordPress access to execu
430 CVE-2024-54780
1.66%
81.7th 8.8 This vulnerability allows authenticated attackers to execute arbitrary commands on pfSense firewalls
431 CVE-2024-54525
1.66%
81.7th 8.8 This vulnerability allows attackers to modify protected system files by restoring maliciously crafte
432 CVE-2025-30384
1.65%
81.7th 7.4 This vulnerability allows remote code execution on Microsoft SharePoint servers through deserializat
433 CVE-2025-4946
1.65%
81.7th 8.1 The Vikinger WordPress theme allows authenticated attackers with Subscriber-level access or higher t
434 CVE-2025-29635
1.64%
81.6th 8.8 A command injection vulnerability in D-Link DIR-823X routers allows authenticated attackers to execu
435 CVE-2024-53303
1.64%
81.6th 8.8 This vulnerability allows authenticated attackers to execute arbitrary code on LRQA Nettitude PoshC2
436 CVE-2025-21306
1.64%
81.6th 8.8 This is a heap-based buffer overflow vulnerability in Windows Telephony Service that allows remote a
437 CVE-2025-21291
1.64%
81.6th 8.8 This vulnerability in Windows DirectShow allows remote attackers to execute arbitrary code on affect
438 CVE-2025-21282
1.64%
81.6th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin
439 CVE-2025-21273
1.64%
81.6th 8.8 This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on
440 CVE-2025-21266
1.64%
81.6th 8.8 This is a heap-based buffer overflow vulnerability in Windows Telephony Service that allows remote a
441 CVE-2025-21252
1.64%
81.6th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin
442 CVE-2025-21250
1.64%
81.6th 8.8 This is a heap-based buffer overflow vulnerability in the Windows Telephony Service that allows remo
443 CVE-2025-21241
1.64%
81.6th 8.8 This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on
444 CVE-2025-21240
1.64%
81.6th 8.8 This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code wi
445 CVE-2025-60425
1.64%
81.6th 8.6 Nagios Fusion versions 2024R1.2 and 2024R2 fail to invalidate existing session tokens when enabling
446 CVE-2026-20963
1.63%
81.5th 8.8 This vulnerability allows an authorized attacker to execute arbitrary code on Microsoft SharePoint s
447 CVE-2024-57227
1.63%
81.5th 8.0 This CVE describes a command injection vulnerability in Linksys E7350 routers where an attacker can
448 CVE-2024-25699
1.62%
81.5th 8.5 An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows auth
449 CVE-2025-2105
1.61%
81.4th 8.1 The Jupiter X Core WordPress plugin is vulnerable to PHP object injection via deserialization of unt
450 CVE-2025-27743
1.6%
81.4th 7.8 CVE-2025-27743 is an untrusted search path vulnerability in Microsoft System Center that allows an a

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free