Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5051 | CVE-2024-11173 |
|
45.2th | 6.5 | An unhandled exception vulnerability in LibreChat allows attackers to crash the server, causing deni | |
| 5052 | CVE-2024-13776 |
|
45.1th | 8.1 | The ZoomSounds WordPress plugin has an authorization vulnerability that allows authenticated users w | |
| 5053 | CVE-2025-9089 |
|
45.2th | 8.8 | A stack-based buffer overflow vulnerability in Tenda AC20 routers allows remote attackers to execute | |
| 5054 | CVE-2025-9087 |
|
45.2th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC20 routers via a sta | |
| 5055 | CVE-2025-6553 |
|
45.2th | 9.8 | The Ovatheme Events Manager WordPress plugin allows unauthenticated attackers to upload arbitrary fi | |
| 5056 | CVE-2025-10726 |
|
45.2th | 9.1 | The WPRecovery WordPress plugin contains an unauthenticated SQL injection vulnerability that allows | |
| 5057 | CVE-2025-0401 |
|
45.1th | 5.3 | This critical path traversal vulnerability in the Reggie 1.0 application allows attackers to access | |
| 5058 | CVE-2024-35365 |
|
45th | 8.8 | CVE-2024-35365 is a double-free vulnerability in FFmpeg's audio stream initialization function that | |
| 5059 | CVE-2024-56038 |
|
45.1th | 7.1 | This reflected cross-site scripting (XSS) vulnerability in the SendSMS WordPress plugin allows attac | |
| 5060 | CVE-2023-51336 |
|
45.1th | 8.8 | CVE-2023-51336 is a CSV injection vulnerability in PHPJabbers Meeting Room Booking System v1.0 that | |
| 5061 | CVE-2023-51333 |
|
45.1th | 8.8 | PHPJabbers Cinema Booking System v1.0 has a CSV injection vulnerability that allows attackers to exe | |
| 5062 | CVE-2024-37361 |
|
45.1th | 9.9 | This vulnerability allows remote attackers to execute arbitrary code on Hitachi Vantara Pentaho Busi | |
| 5063 | CVE-2025-24661 |
|
45.1th | 8.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 5064 | CVE-2025-27095 |
|
45.1th | 4.3 | This vulnerability allows attackers with low-privileged JumpServer accounts to manipulate Kubernetes | |
| 5065 | CVE-2024-12391 |
|
45.1th | 6.5 | This vulnerability allows attackers to cause a denial of service by providing specially crafted regu | |
| 5066 | CVE-2025-26921 |
|
45.1th | 8.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 5067 | CVE-2025-26967 |
|
45.1th | 8.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 5068 | CVE-2025-1791 |
|
45th | 6.3 | CVE-2025-1791 is a critical unrestricted file upload vulnerability in Zorlan SkyCaiji 2.9 that allow | |
| 5069 | CVE-2025-39583 |
|
45.1th | 7.1 | This CVE describes a Missing Authorization vulnerability in the BERTHA AI WordPress plugin that allo | |
| 5070 | CVE-2025-3298 |
|
45.1th | 4.3 | This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to bypass access contr | |
| 5071 | CVE-2025-31487 |
|
45.1th | 7.7 | This vulnerability allows authenticated XWiki users to exploit the JIRA macro to read arbitrary loca | |
| 5072 | CVE-2025-23254 |
|
45.1th | 8.8 | This vulnerability in NVIDIA TensorRT-LLM allows attackers with local access to the TRTLLM server to | |
| 5073 | CVE-2025-33050 |
|
45.1th | 7.5 | A protection mechanism failure in Windows DHCP Server allows unauthorized attackers to cause denial | |
| 5074 | CVE-2025-6260 |
|
45.1th | 9.8 | This vulnerability allows unauthenticated attackers to reset user credentials on affected thermostat | |
| 5075 | CVE-2025-52376 |
|
45.1th | 9.8 | This authentication bypass vulnerability in Nexxt Solutions NCM-X1800 Mesh Router firmware allows at | |
| 5076 | CVE-2025-9254 |
|
45th | 9.8 | CVE-2025-9254 is a critical authentication bypass vulnerability in WebITR software developed by Unio | |
| 5077 | CVE-2024-13996 |
|
45th | 9.8 | Nagios XI versions before 2024R1.1.3 fail to invalidate existing user sessions when passwords are ch | |
| 5078 | CVE-2025-34334 |
|
45.1th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary commands with SYSTEM privileg | |
| 5079 | CVE-2026-23837 |
|
45th | 9.8 | CVE-2026-23837 is an authentication bypass vulnerability in MyTube that allows unauthenticated attac | |
| 5080 | CVE-2025-13371 |
|
45.1th | 8.6 | The MoneySpace WordPress plugin exposes full payment card details including CVV codes to unauthentic | |
| 5081 | CVE-2025-55204 |
|
45.1th | 8.8 | Muffon music streaming client versions before 2.3.0 have a one-click remote code execution vulnerabi | |
| 5082 | CVE-2024-50698 |
|
44.9th | 9.8 | A heap-based buffer overflow vulnerability in SunGrow WiNet-SV200 MQTT message processing allows att | |
| 5083 | CVE-2024-13594 |
|
44.9th | 6.5 | The Simple Downloads List WordPress plugin contains a SQL injection vulnerability in the 'neofix_sdl | |
| 5084 | CVE-2018-25108 |
|
45th | 7.5 | CVE-2018-25108 allows unauthenticated remote attackers to cause a denial-of-service (DoS) in affecte | |
| 5085 | CVE-2025-22210 |
|
44.9th | 7.2 | This SQL injection vulnerability in Hikashop for Joomla allows authenticated administrators to execu | |
| 5086 | CVE-2025-0995 |
|
44.9th | 8.8 | This is a use-after-free vulnerability in Chrome's V8 JavaScript engine that allows remote attackers | |
| 5087 | CVE-2025-43928 |
|
44.9th | 5.8 | Infodraw Media Relay Service 7.1.0.0 contains a path traversal vulnerability in its web server on po | |
| 5088 | CVE-2025-4392 |
|
44.9th | 7.2 | The Shared Files WordPress plugin allows unauthenticated attackers to upload HTML files containing m | |
| 5089 | CVE-2025-8169 |
|
45th | 8.8 | A critical buffer overflow vulnerability in D-Link DIR-513 routers allows remote attackers to execut | |
| 5090 | CVE-2026-21881 |
|
44.9th | 9.1 | This critical authentication bypass vulnerability in Kanboard allows attackers to impersonate any us | |
| 5091 | CVE-2025-24030 |
|
44.8th | 7.1 | This CVE allows authenticated Kubernetes cluster users to perform path traversal attacks against Env | |
| 5092 | CVE-2024-57540 |
|
44.9th | 6.5 | A buffer overflow vulnerability exists in Linksys E8450 routers where the 'action' field is copied t | |
| 5093 | CVE-2023-28362 |
|
44.9th | 4.0 | This vulnerability in Ruby on Rails allows attackers to inject malicious characters into redirect UR | |
| 5094 | CVE-2025-23187 |
|
44.8th | 5.3 | This vulnerability allows unauthenticated attackers to generate technical metadata in SAP systems vi | |
| 5095 | CVE-2024-57067 |
|
44.8th | 7.5 | CVE-2024-57067 is a prototype pollution vulnerability in dot-qs v0.2.0's lib.parse function that all | |
| 5096 | CVE-2024-57066 |
|
44.8th | 7.5 | This vulnerability allows attackers to perform prototype pollution in the lib.deep function of @ndho | |
| 5097 | CVE-2024-57064 |
|
44.8th | 7.5 | A prototype pollution vulnerability in the lib.setValue function of @syncfusion/ej2-spreadsheet vers | |
| 5098 | CVE-2024-13617 |
|
44.9th | 8.6 | The aoa-downloadable WordPress plugin through version 0.1.0 contains a path traversal vulnerability | |
| 5099 | CVE-2025-30474 |
|
44.8th | 5.0 | Apache Commons VFS versions before 2.10.0 can leak FTP passwords in error messages when file operati | |
| 5100 | CVE-2024-10831 |
|
44.8th | 9.1 | This vulnerability allows attackers to upload arbitrary files to any location on the server by explo |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free