Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5751 CVE-2025-6098
0.2%
41.4th 9.8 This critical vulnerability in UTT 进取 750W devices allows remote attackers to execute arbitrary
5752 CVE-2025-54493
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
5753 CVE-2025-54491
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
5754 CVE-2025-54489
0.2%
41.4th 9.8 A stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary code execut
5755 CVE-2025-54487
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
5756 CVE-2025-54485
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
5757 CVE-2025-54483
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER file parser allows arbitrar
5758 CVE-2025-54481
0.2%
41.4th 9.8 A stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary code execut
5759 CVE-2025-54462
0.2%
41.4th 9.8 A heap-based buffer overflow vulnerability in libbiosig's Nex file parser allows arbitrary code exec
5760 CVE-2025-53853
0.2%
41.4th 9.8 A heap-based buffer overflow vulnerability in libbiosig's ISHNE parsing allows arbitrary code execut
5761 CVE-2025-48005
0.2%
41.4th 9.8 A heap-based buffer overflow vulnerability in libbiosig's RHS2000 file parser allows arbitrary code
5762 CVE-2025-53716
0.2%
41.3th 6.5 A null pointer dereference vulnerability in Windows LSASS allows authenticated attackers to cause a
5763 CVE-2025-56074
0.2%
41.4th 9.8 A SQL injection vulnerability in PHPGurukul Park Ticketing Management System v2.0 allows remote atta
5764 CVE-2025-62162
0.2%
41.3th 7.5 A vulnerability in cel-rust allows attackers to cause denial of service by sending specially crafted
5765 CVE-2025-66255
0.2%
41.3th 9.8 This vulnerability allows unauthenticated attackers to upload malicious firmware files to Mozart FM
5766 CVE-2025-43401
0.2%
41.3th 7.5 This CVE describes a denial-of-service vulnerability in macOS that was addressed through improved in
5767 CVE-2024-27708
0.2%
41.4th 9.6 This CVE describes an iframe injection vulnerability in MyNET v.26.06 and earlier that allows remote
5768 CVE-2024-58277
0.2%
41.3th N/A This vulnerability in R Radio Network FM Transmitter 1.07 allows unauthenticated attackers to retrie
5769 CVE-2025-23028
0.19%
41.2th 5.3 A denial of service vulnerability in Cilium allows attackers to crash Cilium agents by sending craft
5770 CVE-2024-11271
0.19%
41.2th 8.8 The WordPress WebinarPress plugin has a missing capability check vulnerability that allows authentic
5771 CVE-2024-57378
0.19%
41.3th 7.3 CVE-2024-57378 is a broken access control vulnerability in Wazuh SIEM 4.8.2 that allows unauthorized
5772 CVE-2025-0556
0.19%
41.2th 8.8 This vulnerability allows local network attackers to intercept unencrypted communication between Tel
5773 CVE-2025-2952
0.19%
41.3th 6.3 CVE-2025-2952 is a critical unrestricted file upload vulnerability in Bluestar Micro Mall 1.0 that a
5774 CVE-2024-11638
0.19%
41.3th 8.8 The Gtbabel WordPress plugin before version 6.6.9 contains a server-side request forgery (SSRF) vuln
5775 CVE-2025-1309
0.19%
41.3th 8.8 The UiPress Lite WordPress plugin has a privilege escalation vulnerability that allows authenticated
5776 CVE-2025-24949
0.19%
41.2th 6.5 CVE-2025-24949 is an authentication bypass vulnerability in JotUrl 2.0 that allows attackers to chan
5777 CVE-2025-22277
0.19%
41.3th 8.8 This CVE describes an authentication bypass vulnerability in the Vitepos WordPress plugin that allow
5778 CVE-2025-3909
0.19%
41.3th 8.1 This vulnerability in Thunderbird allows attackers to execute JavaScript in the file:/// context by
5779 CVE-2025-4453
0.19%
41.3th 6.3 This CVE describes a critical command injection vulnerability in D-Link DIR-619L routers. Attackers
5780 CVE-2025-4445
0.19%
41.3th 6.3 This critical vulnerability in D-Link DIR-605L routers allows remote attackers to execute arbitrary
5781 CVE-2025-46565
0.19%
41.3th 5.3 This vulnerability in Vite allows attackers to bypass file access restrictions and read sensitive fi
5782 CVE-2025-53104
0.19%
41.2th 9.1 A command injection vulnerability in gluestack-ui's GitHub Actions workflow allowed attackers to exe
5783 CVE-2025-11661
0.19%
41.3th 7.3 CVE-2025-11661 is an authentication bypass vulnerability in ProjectsAndPrograms School Management Sy
5784 CVE-2025-63220
0.19%
41.2th 7.2 The Sound4 FIRST web-based management interface has a critical vulnerability that allows remote code
5785 CVE-2025-64129
0.19%
41.2th 7.6 Zenitel TCIV-3+ devices contain an out-of-bounds write vulnerability that allows remote attackers to
5786 CVE-2025-63215
0.19%
41.2th 7.2 The Sound4 IMPACT web management interface has a critical vulnerability allowing remote code executi
5787 CVE-2025-64076
0.19%
41.2th 7.5 Two vulnerabilities in cbor2's C extension allow remote attackers to cause denial of service through
5788 CVE-2021-47785
0.19%
41.3th 9.8 Ether MP3 CD Burner 1.3.8 contains a buffer overflow vulnerability in the registration name field th
5789 CVE-2025-65287
0.19%
41.3th 4.3 An unauthenticated directory traversal vulnerability in SNMP Web Pro 1.1 allows remote attackers to
5790 CVE-2026-2063
0.19%
41.3th 4.7 This CVE describes an OS command injection vulnerability in D-Link DIR-823X routers. Attackers can e
5791 CVE-2025-34171
0.19%
41.2th 5.3 CasaOS versions up to 0.4.15 expose unauthenticated endpoints that allow remote attackers to retriev
5792 CVE-2025-67187
0.19%
41.3th 9.8 A stack-based buffer overflow vulnerability in TOTOLINK A950RG routers allows remote attackers to ex
5793 CVE-2026-24729
0.19%
41.3th N/A This vulnerability allows remote attackers to upload malicious class files to Interinfo DreamMaker s
5794 CVE-2025-48782
0.19%
41.3th 9.8 This vulnerability allows remote attackers to upload malicious files to the Soar Cloud HRD Human Res
5795 CVE-2024-45653
0.19%
41.2th 4.3 IBM Sterling Connect:Direct Web Services versions 6.0-6.3 expose sensitive IP address information to
5796 CVE-2024-12398
0.19%
41.1th 8.8 An authenticated user with limited privileges can escalate to administrator level on affected Zyxel
5797 CVE-2024-13210
0.19%
41.1th 4.7 This vulnerability allows remote attackers to upload arbitrary files to the donglight bookstore e-co
5798 CVE-2024-13201
0.19%
41.1th 4.7 This vulnerability allows remote attackers to upload arbitrary files without restrictions in the Spr
5799 CVE-2024-36047
0.19%
41.1th 9.8 Infoblox NIOS has an improper input validation vulnerability that could allow attackers to execute a
5800 CVE-2025-21188
0.19%
41.1th 6.0 This vulnerability in Azure Network Watcher VM Extension allows authenticated users with VM-level ac

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β€” making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free