Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 401 | CVE-2025-21356 |
|
82.6th | 7.8 | This vulnerability allows remote code execution when a user opens a specially crafted Visio file. At | |
| 402 | CVE-2013-10073 |
|
82.6th | 8.8 | This vulnerability allows authenticated users with access to the Auto-Discovery tool in Nagios XI to | |
| 403 | CVE-2025-21294 |
|
82.5th | 8.1 | This vulnerability allows remote code execution via Microsoft Digest Authentication, enabling attack | |
| 404 | CVE-2024-13453 |
|
82.5th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug | |
| 405 | CVE-2025-6851 |
|
82.4th | 7.2 | The Broken Link Notifier WordPress plugin contains a Server-Side Request Forgery (SSRF) vulnerabilit | |
| 406 | CVE-2025-1913 |
|
82.4th | 7.2 | This vulnerability allows authenticated WordPress administrators to inject PHP objects via deseriali | |
| 407 | CVE-2024-53868 |
|
82.3th | 7.5 | Apache Traffic Server is vulnerable to HTTP request smuggling when processing malformed chunked mess | |
| 408 | CVE-2025-21244 |
|
82.3th | 8.8 | This is a remote code execution vulnerability in the Windows Telephony Service that allows attackers | |
| 409 | CVE-2025-21243 |
|
82.3th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on | |
| 410 | CVE-2025-55749 |
|
82.2th | 7.5 | This vulnerability in XWiki Jetty package (XJetty) exposes a context that allows static access to an | |
| 411 | CVE-2025-24494 |
|
82.2th | 7.2 | This path traversal vulnerability in Ixia/IxNetwork products allows device administrators to upload | |
| 412 | CVE-2025-1448 |
|
82.1th | 7.3 | This critical vulnerability in Synway SMG Gateway Management Software allows remote attackers to exe | |
| 413 | CVE-2024-51229 |
|
82.1th | 8.8 | This Cross-Site Scripting (XSS) vulnerability in LinZhaoguan pb-cms v2.0 allows remote attackers to | |
| 414 | CVE-2025-13700 |
|
82th | 7.2 | This vulnerability allows authenticated remote attackers to execute arbitrary operating system comma | |
| 415 | CVE-2025-62204 |
|
82th | 8.0 | This vulnerability allows an authenticated attacker to execute arbitrary code on Microsoft SharePoin | |
| 416 | CVE-2025-1040 |
|
82th | 8.8 | AutoGPT versions 0.3.4 and earlier contain a Server-Side Template Injection vulnerability that allow | |
| 417 | CVE-2026-2152 |
|
82th | 7.2 | This CVE describes a remote command injection vulnerability in D-Link DIR-615 routers through the we | |
| 418 | CVE-2025-0492 |
|
82th | 7.5 | A critical null pointer dereference vulnerability in D-Link DIR-823X routers allows remote attackers | |
| 419 | CVE-2025-1971 |
|
81.9th | 7.2 | This CVE describes a PHP Object Injection vulnerability in the Export and Import Users and Customers | |
| 420 | CVE-2024-10633 |
|
81.9th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug | |
| 421 | CVE-2025-49718 |
|
81.9th | 7.5 | This vulnerability in SQL Server involves improper initialization of resources, allowing unauthorize | |
| 422 | CVE-2024-13184 |
|
81.8th | 7.5 | This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks agai | |
| 423 | CVE-2024-9950 |
|
81.8th | 7.8 | An unauthenticated attacker can modify compliance scripts in Forescout SecureConnector v11.3.07.0109 | |
| 424 | CVE-2025-56127 |
|
81.8th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-BCR600W routers that allows at | |
| 425 | CVE-2025-56117 |
|
81.8th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attac | |
| 426 | CVE-2025-56111 |
|
81.8th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie RG-BCR860 routers that allows att | |
| 427 | CVE-2019-15690 |
|
81.7th | 8.8 | CVE-2019-15690 is a heap buffer overflow vulnerability in LibVNCServer that allows remote attackers | |
| 428 | CVE-2024-12035 |
|
81.7th | 8.8 | The CS Framework WordPress plugin has an arbitrary file deletion vulnerability that allows authentic | |
| 429 | CVE-2025-2257 |
|
81.7th | 7.2 | This vulnerability allows authenticated attackers with administrator-level WordPress access to execu | |
| 430 | CVE-2024-54780 |
|
81.7th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary commands on pfSense firewalls | |
| 431 | CVE-2024-54525 |
|
81.7th | 8.8 | This vulnerability allows attackers to modify protected system files by restoring maliciously crafte | |
| 432 | CVE-2025-30384 |
|
81.7th | 7.4 | This vulnerability allows remote code execution on Microsoft SharePoint servers through deserializat | |
| 433 | CVE-2025-4946 |
|
81.7th | 8.1 | The Vikinger WordPress theme allows authenticated attackers with Subscriber-level access or higher t | |
| 434 | CVE-2025-29635 |
|
81.6th | 8.8 | A command injection vulnerability in D-Link DIR-823X routers allows authenticated attackers to execu | |
| 435 | CVE-2024-53303 |
|
81.6th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary code on LRQA Nettitude PoshC2 | |
| 436 | CVE-2025-21306 |
|
81.6th | 8.8 | This is a heap-based buffer overflow vulnerability in Windows Telephony Service that allows remote a | |
| 437 | CVE-2025-21291 |
|
81.6th | 8.8 | This vulnerability in Windows DirectShow allows remote attackers to execute arbitrary code on affect | |
| 438 | CVE-2025-21282 |
|
81.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 439 | CVE-2025-21273 |
|
81.6th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on | |
| 440 | CVE-2025-21266 |
|
81.6th | 8.8 | This is a heap-based buffer overflow vulnerability in Windows Telephony Service that allows remote a | |
| 441 | CVE-2025-21252 |
|
81.6th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 442 | CVE-2025-21250 |
|
81.6th | 8.8 | This is a heap-based buffer overflow vulnerability in the Windows Telephony Service that allows remo | |
| 443 | CVE-2025-21241 |
|
81.6th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on | |
| 444 | CVE-2025-21240 |
|
81.6th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code wi | |
| 445 | CVE-2025-60425 |
|
81.6th | 8.6 | Nagios Fusion versions 2024R1.2 and 2024R2 fail to invalidate existing session tokens when enabling | |
| 446 | CVE-2026-20963 |
|
81.5th | 8.8 | This vulnerability allows an authorized attacker to execute arbitrary code on Microsoft SharePoint s | |
| 447 | CVE-2024-57227 |
|
81.5th | 8.0 | This CVE describes a command injection vulnerability in Linksys E7350 routers where an attacker can | |
| 448 | CVE-2024-25699 |
|
81.5th | 8.5 | An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows auth | |
| 449 | CVE-2025-2105 |
|
81.4th | 8.1 | The Jupiter X Core WordPress plugin is vulnerable to PHP object injection via deserialization of unt | |
| 450 | CVE-2025-27743 |
|
81.4th | 7.8 | CVE-2025-27743 is an untrusted search path vulnerability in Microsoft System Center that allows an a |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free