Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
451 CVE-2020-36858
0.5%
65.6th 5.4 This cross-site scripting (XSS) vulnerability in Nagios Log Server allows attackers to inject malici
452 CVE-2018-25121
0.5%
65.6th 5.4 Nagios XI versions before 5.4.13 contain a cross-site scripting (XSS) vulnerability in the Views pag
453 CVE-2018-25119
0.5%
65.6th 6.1 This cross-site scripting vulnerability in Nagios Fusion allows attackers to inject malicious script
454 CVE-2017-20209
0.5%
65.6th 6.1 This cross-site scripting vulnerability in Nagios Fusion allows attackers to inject malicious script
455 CVE-2016-15053
0.5%
65.6th 5.4 Nagios XI versions before 5.2.4 contain a cross-site scripting vulnerability in the 'My Reports' lis
456 CVE-2016-15052
0.5%
65.6th 5.4 Nagios XI versions before 5.2.4 contain a cross-site scripting vulnerability in the Menu System of t
457 CVE-2016-15049
0.5%
65.6th 5.4 Nagios Log Server versions before 1.4.2 contain a cross-site scripting vulnerability in the Dashboar
458 CVE-2011-10040
0.5%
65.6th 5.4 This cross-site scripting (XSS) vulnerability in Nagios XI allows attackers to inject malicious scri
459 CVE-2011-10039
0.5%
65.6th 5.4 This cross-site scripting (XSS) vulnerability in Nagios XI allows attackers to inject malicious scri
460 CVE-2011-10038
0.5%
65.6th 5.4 This cross-site scripting vulnerability in Nagios XI allows attackers to inject malicious scripts in
461 CVE-2021-47698
0.5%
65.6th 5.4 Nagios XI versions before 5.8.7 contain a cross-site scripting vulnerability in the Core UI's Views
462 CVE-2024-13231
0.5%
65.3th 5.3 The WordPress Portfolio Builder plugin has an authorization bypass vulnerability that allows unauthe
463 CVE-2025-24157
0.5%
65.3th 5.6 This CVE describes a buffer overflow vulnerability in macOS kernel memory handling that could allow
464 CVE-2025-21225
0.5%
65.3th 5.9 This vulnerability in Windows Remote Desktop Gateway allows attackers to cause a denial of service b
465 CVE-2025-1800
0.5%
65.2th 6.3 This critical vulnerability in D-Link DAR-7000 allows remote attackers to execute arbitrary commands
466 CVE-2025-4635
0.5%
65.2th 6.6 This vulnerability allows an authenticated administrator in the web portal to manipulate the Diagnos
467 CVE-2025-5000
0.49%
65.1th 6.3 A critical command injection vulnerability in Linksys FGW3000 routers allows remote attackers to exe
468 CVE-2025-29788
0.49%
65th 6.5 The Sylius PayPal Plugin vulnerability allows users to manipulate payment amounts by changing cart q
469 CVE-2025-29908
0.49%
64.9th 5.3 This vulnerability allows remote attackers to cause a Hash DoS attack by initiating QUIC connections
470 CVE-2025-27735
0.49%
64.9th 6.0 This vulnerability allows an authorized attacker with local access to bypass security features in Wi
471 CVE-2025-29957
0.49%
64.9th 6.2 This vulnerability in Windows Deployment Services allows an unauthorized attacker to cause a denial
472 CVE-2025-11750
0.49%
64.9th 5.3 This vulnerability allows attackers to determine whether specific user accounts exist in langgenius/
473 CVE-2025-69820
0.49%
64.9th 6.0 A directory traversal vulnerability in Beam beta9 v0.1.521 allows remote attackers to access sensiti
474 CVE-2025-2751
0.49%
64.8th 4.3 This vulnerability in Assimp's CSM file handler allows remote attackers to trigger an out-of-bounds
475 CVE-2025-44176
0.48%
64.5th 6.5 This vulnerability allows remote attackers to execute arbitrary code on Tenda FH451 routers running
476 CVE-2025-20275
0.48%
64.5th 5.3 This vulnerability allows unauthenticated attackers to execute arbitrary code on Cisco Unified CCX E
477 CVE-2023-7312
0.48%
64.4th 4.8 Nagios Fusion versions before 4.2.0 contain a stored cross-site scripting vulnerability in email set
478 CVE-2024-13520
0.48%
64.3th 5.3 This vulnerability allows unauthenticated attackers to modify gift voucher values, expiration dates,
479 CVE-2025-3015
0.48%
64.3th 6.3 This critical vulnerability in Assimp's ASE file handler allows remote attackers to trigger out-of-b
480 CVE-2025-2804
0.48%
64.3th 6.1 This reflected cross-site scripting vulnerability in the tagDiv Composer WordPress plugin allows una
481 CVE-2025-2269
0.48%
64.3th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'image_id' p
482 CVE-2024-52892
0.47%
64.2th 6.1 IBM Jazz for Service Management versions 1.1.3 through 1.1.3.23 contain a cross-site scripting (XSS)
483 CVE-2024-12086
0.47%
64.2th 6.1 This rsync vulnerability allows a malicious server to read arbitrary files from a client's machine d
484 CVE-2025-2714
0.47%
64th 4.3 This vulnerability in JoomlaUX JUX Real Estate 3.4.0 allows attackers to inject malicious scripts vi
485 CVE-2025-21185
0.47%
64th 6.5 This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected system
486 CVE-2025-22599
0.47%
64th 6.5 A reflected cross-site scripting (XSS) vulnerability exists in WeGIA's home.php endpoint via the msg
487 CVE-2025-30737
0.47%
64th 5.7 This vulnerability in Oracle Smart View for Office allows high-privileged attackers with network acc
488 CVE-2025-2993
0.47%
63.9th 5.3 This critical vulnerability in Tenda FH1202 routers allows improper access controls through manipula
489 CVE-2024-11356
0.47%
63.9th 6.1 The tourmaster WordPress plugin before version 5.3.4 contains a cross-site scripting (XSS) vulnerabi
490 CVE-2025-1414
0.46%
63.6th 6.5 CVE-2025-1414 is a memory safety vulnerability in Firefox that could allow attackers to corrupt memo
491 CVE-2025-25616
0.46%
63.6th 4.3 Unifiedtransform 2.0 has an access control vulnerability that allows students to modify exam rules t
492 CVE-2024-12177
0.46%
63.4th 6.1 The Ai Image Alt Text Generator for WP WordPress plugin contains a reflected cross-site scripting (X
493 CVE-2025-0860
0.46%
63.4th 6.1 The VR-Frases WordPress plugin is vulnerable to Reflected Cross-Site Scripting (XSS) that allows una
494 CVE-2024-13739
0.46%
63.4th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'to' paramet
495 CVE-2025-2077
0.46%
63.4th 6.1 The Simple Amazon Affiliate WordPress plugin has a reflected cross-site scripting (XSS) vulnerabilit
496 CVE-2025-27188
0.46%
63.4th 4.3 CVE-2025-27188 is an improper authorization vulnerability in Adobe Commerce that allows attackers to
497 CVE-2025-31827
0.46%
63.4th 4.9 This path traversal vulnerability in the Fonto WordPress plugin allows attackers to download arbitra
498 CVE-2024-13693
0.46%
63.3th 5.3 The Enfold WordPress theme has an authorization bypass vulnerability that allows unauthenticated att
499 CVE-2021-47727
0.45%
63.3th 5.3 Selea Targa IP OCR-ANPR cameras contain an unauthenticated vulnerability that allows remote attacker
500 CVE-2024-13698
0.45%
63.2th 6.5 The Jobify WordPress theme has missing capability checks that allow unauthenticated attackers to mak

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free