Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5151 CVE-2024-13189
0.22%
44.6th 7.3 CVE-2024-13189 is a critical permission vulnerability in ZeroWdd myblog 1.0 that allows remote attac
5152 CVE-2025-1682
0.22%
44.6th 8.8 The Cardealer WordPress theme allows authenticated attackers with subscriber-level access to escalat
5153 CVE-2024-57175
0.22%
44.6th 5.4 A stored cross-site scripting (XSS) vulnerability in PHPGURUKUL Online Birth Certificate System v1.0
5154 CVE-2025-30291
0.22%
44.6th 5.5 This CVE describes an information exposure vulnerability in Adobe ColdFusion that allows low-privile
5155 CVE-2025-3074
0.22%
44.6th 5.4 This vulnerability allows attackers to spoof download UI elements in Google Chrome, tricking users i
5156 CVE-2025-3072
0.22%
44.6th 5.4 This vulnerability allows attackers to spoof UI elements in Chrome's Custom Tabs feature by tricking
5157 CVE-2025-46813
0.22%
44.5th 5.8 This CVE describes a data leak vulnerability in Discourse where unauthenticated users could view pri
5158 CVE-2025-48026
0.22%
44.5th 7.5 An unauthenticated path traversal vulnerability in Mitel OpenScape Xpressions WebApl component allow
5159 CVE-2025-33070
0.22%
44.6th 8.1 CVE-2025-33070 is a privilege escalation vulnerability in Windows Netlogon service where uninitializ
5160 CVE-2025-5853
0.22%
44.6th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC6 routers allows remote attackers to
5161 CVE-2025-5572
0.22%
44.5th 8.8 A critical stack-based buffer overflow vulnerability in D-Link DCS-932L IP cameras allows remote att
5162 CVE-2025-10773
0.22%
44.6th 8.8 A stack-based buffer overflow vulnerability in the B-Link BL-AC2100 router's web management interfac
5163 CVE-2025-58447
0.22%
44.6th 9.8 CVE-2025-58447 is a critical heap-based buffer overflow vulnerability in rAthena MMORPG server's log
5164 CVE-2025-13483
0.22%
44.6th N/A SiRcom SMART Alert (SiSA) has an authentication bypass vulnerability that allows unauthenticated att
5165 CVE-2026-23838
0.22%
44.5th N/A Tandoor Recipes' default NixOS configuration exposes the SQLite database file externally when using
5166 CVE-2024-55227
0.22%
44.4th 9.0 This CVE describes a cross-site scripting (XSS) vulnerability in Dolibarr's Events/Agenda module tha
5167 CVE-2025-2887
0.22%
44.5th 4.5 This vulnerability in the tough library allows clients to fetch target files from incorrect sources
5168 CVE-2025-2885
0.22%
44.5th 4.5 This vulnerability in the tough library allows attackers to supply arbitrary version numbers in root
5169 CVE-2025-29181
0.22%
44.4th 7.2 FOXCMS versions up to 1.25 contain a SQL injection vulnerability in the admin panel's field manageme
5170 CVE-2025-31221
0.22%
44.5th 7.5 This CVE describes an integer overflow vulnerability in multiple Apple operating systems that could
5171 CVE-2025-20282
0.22%
44.4th 10.0 This critical vulnerability in Cisco ISE and ISE-PIC allows unauthenticated remote attackers to uplo
5172 CVE-2025-24853
0.22%
44.4th 7.5 CVE-2025-24853 is a cross-site scripting (XSS) vulnerability in Apache JSPWiki that allows attackers
5173 CVE-2025-53506
0.22%
44.4th 7.5 This vulnerability allows an attacker to cause a denial-of-service (DoS) condition in Apache Tomcat
5174 CVE-2025-12104
0.22%
44.5th 9.8 This vulnerability involves outdated UI dependencies in BLU-IC2 and BLU-IC4 devices that could allow
5175 CVE-2025-10742
0.22%
44.5th 9.8 The Truelysell Core WordPress plugin allows unauthenticated attackers to change user passwords, incl
5176 CVE-2025-11444
0.22%
44.5th 8.8 A buffer overflow vulnerability in TOTOLINK N600R routers allows remote attackers to execute arbitra
5177 CVE-2025-13615
0.22%
44.5th 9.8 This vulnerability in the StreamTube Core WordPress plugin allows unauthenticated attackers to chang
5178 CVE-2025-42892
0.22%
44.5th 6.8 This CVE describes an OS command injection vulnerability in SAP Business Connector that allows authe
5179 CVE-2025-69601
0.22%
44.5th 6.5 A directory traversal vulnerability in 66biolinks v44.0.0 allows attackers to write files outside in
5180 CVE-2025-14463
0.22%
44.4th 5.3 The Payment Button for PayPal WordPress plugin has an authentication bypass vulnerability that allow
5181 CVE-2021-47816
0.22%
44.5th 8.8 Thecus N4800Eco NAS Server Control Panel contains a command injection vulnerability that allows auth
5182 CVE-2025-63560
0.22%
44.5th 7.5 A vulnerability in KiloView Dual Channel 4k HDMI & 3G-SDI HEVC Video Encoder firmware allows remote
5183 CVE-2025-27301
0.22%
44.4th 7.2 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
5184 CVE-2025-27300
0.22%
44.4th 7.2 This vulnerability in the giuliopanda ADFO WordPress plugin allows attackers to inject malicious obj
5185 CVE-2025-2562
0.22%
44.4th 5.4 This vulnerability in Devolutions Remote Desktop Manager allows authenticated users to use stored pa
5186 CVE-2024-13835
0.22%
44.4th 7.2 The Post Meta Data Manager WordPress plugin allows authenticated attackers with Administrator access
5187 CVE-2025-26885
0.22%
44.4th 7.2 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
5188 CVE-2025-21597
0.22%
44.4th 5.3 An unauthenticated, logically adjacent BGP peer can cause a denial of service by triggering a crash
5189 CVE-2025-5063
0.22%
44.4th 8.8 This is a use-after-free vulnerability in Chrome's compositing engine that allows remote attackers t
5190 CVE-2025-5158
0.22%
44.4th 4.3 This CVE describes a path traversal vulnerability in H3C SecCenter SMP-E1114P02 that allows attacker
5191 CVE-2025-6751
0.22%
44.4th 8.8 A critical buffer overflow vulnerability in Linksys E8450 routers allows remote attackers to execute
5192 CVE-2025-9146
0.22%
44.4th 6.6 A cryptographic vulnerability in Linksys E5600 routers allows remote attackers to potentially compro
5193 CVE-2025-60153
0.22%
44.4th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the WordPress Subscribe To Unlock plu
5194 CVE-2025-60150
0.22%
44.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
5195 CVE-2025-60126
0.22%
44.4th 8.8 This CVE describes a PHP Local File Inclusion vulnerability in the WordPress Testimonial Slider plug
5196 CVE-2025-59588
0.22%
44.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
5197 CVE-2025-58973
0.22%
44.4th 7.5 This vulnerability allows attackers to include local PHP files through improper filename control in
5198 CVE-2025-57925
0.22%
44.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
5199 CVE-2025-53450
0.22%
44.4th 7.5 This vulnerability allows attackers to include local files on the server through improper input vali
5200 CVE-2025-34273
0.22%
44.4th 6.5 Nagios Log Server versions before 2024R2.0.3 have an authorization flaw that lets non-admin users de

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free