Weaponized vulnerabilities are growing and the dangerous ones are capable of remote execution and/or privilege escalation. Vulnerability scanners can access CVSS information and exploit databases to report on weaponization but they are not capable of disclosing the most dangerous and active ones.