Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5501 CVE-2026-25857
0.21%
42.7th 8.8 This CVE describes an OS command injection vulnerability in Tenda G300-F router firmware that allows
5502 CVE-2025-22218
0.21%
42.5th 8.5 VMware Aria Operations for Logs contains an information disclosure vulnerability where authenticated
5503 CVE-2024-48310
0.21%
42.5th 7.5 AutoLib Software Systems OPAC v20.10 contains hardcoded API keys in its source code, allowing attack
5504 CVE-2025-21618
0.21%
42.5th 7.5 NiceGUI versions before 2.9.1 have an authentication bypass vulnerability where logging in from one
5505 CVE-2024-43768
0.21%
42.5th 7.8 CVE-2024-43768 is an integer overflow vulnerability in Skia's SkDeflate.cpp that allows out-of-bound
5506 CVE-2024-12013
0.21%
42.5th 7.6 The 130.8005 TCP/IP Gateway with firmware version 12h exposes an FTP server with default admin crede
5507 CVE-2024-46923
0.21%
42.5th 7.5 A missing null pointer check in the Xclipse GPU driver for Samsung Exynos mobile processors allows a
5508 CVE-2024-50600
0.21%
42.5th 7.5 This vulnerability allows attackers to send malformed messages through the Wi-Fi driver to Samsung E
5509 CVE-2024-52924
0.21%
42.5th 7.5 This vulnerability in Samsung Exynos processors allows attackers to execute arbitrary code by sendin
5510 CVE-2024-52923
0.21%
42.5th 7.5 A boundary check vulnerability in Samsung's NRMM component for multiple Exynos processors allows den
5511 CVE-2024-53027
0.21%
42.4th 7.5 This vulnerability in Qualcomm components allows a denial-of-service attack when processing country
5512 CVE-2025-46348
0.21%
42.5th 10.0 CVE-2025-46348 is an authentication bypass vulnerability in YesWiki that allows unauthenticated atta
5513 CVE-2025-30732
0.21%
42.4th 6.1 An unauthenticated attacker can exploit this vulnerability in Oracle Application Object Library via
5514 CVE-2025-3590
0.21%
42.5th 6.3 CVE-2025-3590 is a critical remote deserialization vulnerability in Adianti Framework up to version
5515 CVE-2025-2160
0.21%
42.5th 8.1 Pega Platform versions 8.4.3 through Infinity 24.2.1 contain a cross-site scripting (XSS) vulnerabil
5516 CVE-2025-4555
0.21%
42.5th 9.8 The Okcat Parking Management Platform web management interface lacks authentication controls, allowi
5517 CVE-2025-2158
0.21%
42.5th 8.8 This vulnerability allows authenticated attackers with Contributor-level access or higher to perform
5518 CVE-2025-10910
0.21%
42.5th N/A This vulnerability allows remote attackers to hijack Govee smart devices by binding them to their ow
5519 CVE-2025-66448
0.21%
42.4th 7.1 This vulnerability in vLLM allows remote code execution when loading model configurations containing
5520 CVE-2026-1413
0.21%
42.4th 6.3 This CVE describes a command injection vulnerability in Sangfor Operation and Maintenance Security M
5521 CVE-2024-57546
0.2%
42.4th 7.5 This vulnerability in CMSimple v5.16 allows remote attackers to perform Server-Side Request Forgery
5522 CVE-2025-21549
0.2%
42.3th 7.5 This vulnerability allows unauthenticated attackers to cause a denial of service (DoS) on Oracle Web
5523 CVE-2025-21545
0.2%
42.3th 7.5 This vulnerability allows unauthenticated attackers to cause denial of service (DoS) attacks against
5524 CVE-2024-57703
0.2%
42.4th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8v4 routers by explo
5525 CVE-2024-13258
0.2%
42.4th 9.8 This vulnerability allows attackers to bypass authorization controls in Drupal's REST & JSON API Aut
5526 CVE-2024-13239
0.2%
42.4th 9.8 A weak authentication vulnerability in Drupal's Two-factor Authentication (TFA) module allows attack
5527 CVE-2025-21347
0.2%
42.4th 6.0 This vulnerability in Windows Deployment Services allows attackers to cause a denial of service by s
5528 CVE-2025-24198
0.2%
42.4th 6.6 This vulnerability allows an attacker with physical access to a locked Apple device to use Siri to a
5529 CVE-2025-3006
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul e-Diary Management System 1.0 allows attacke
5530 CVE-2025-2846
0.2%
42.4th 7.3 This critical SQL injection vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers
5531 CVE-2024-55965
0.2%
42.4th 6.5 Appsmith versions before 1.51 have an incorrect access control vulnerability where users with 'App V
5532 CVE-2025-2736
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Old Age Home Management System allows attack
5533 CVE-2025-3827
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac
5534 CVE-2025-3819
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac
5535 CVE-2025-3797
0.2%
42.4th 4.7 This critical SQL injection vulnerability in SeaCMS allows remote attackers to execute arbitrary SQL
5536 CVE-2025-3792
0.2%
42.4th 4.7 This critical SQL injection vulnerability in SeaCMS allows remote attackers to execute arbitrary SQL
5537 CVE-2025-3689
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac
5538 CVE-2025-27732
0.2%
42.3th 7.0 This vulnerability allows an authorized attacker with local access to exploit improper memory lockin
5539 CVE-2025-26665
0.2%
42.3th 7.0 This vulnerability in Windows upnphost.dll allows local attackers with valid credentials to access i
5540 CVE-2025-3384
0.2%
42.4th 7.3 This critical SQL injection vulnerability in 1000 Projects Human Resource Management System 1.0 allo
5541 CVE-2025-3370
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows remot
5542 CVE-2025-3350
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Old Age Home Management System allows attack
5543 CVE-2025-3316
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac
5544 CVE-2025-3314
0.2%
42.4th 7.3 This critical SQL injection vulnerability in SourceCodester Apartment Visitor Management System 1.0
5545 CVE-2025-3312
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac
5546 CVE-2025-3309
0.2%
42.4th 7.3 CVE-2025-3309 is a critical SQL injection vulnerability in the Blood Bank Management System 1.0 that
5547 CVE-2025-3307
0.2%
42.4th 7.3 This critical SQL injection vulnerability in Blood Bank Management System 1.0 allows remote attacker
5548 CVE-2025-3306
0.2%
42.4th 7.3 This critical SQL injection vulnerability in Blood Bank Management System 1.0 allows remote attacker
5549 CVE-2025-3258
0.2%
42.4th 7.3 A critical SQL injection vulnerability exists in PHPGurukul Old Age Home Management System 1.0 throu
5550 CVE-2025-3239
0.2%
42.4th 7.3 This critical SQL injection vulnerability in PHPGurukul Online Fire Reporting System 1.2 allows remo

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free