Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5801 CVE-2024-49839
0.19%
41.1th 8.2 This vulnerability allows memory corruption during Wi-Fi management frame processing due to a mismat
5802 CVE-2024-46662
0.19%
41.1th 8.8 This command injection vulnerability in Fortinet FortiManager allows attackers to execute arbitrary
5803 CVE-2025-31497
0.19%
41.1th 7.5 TEIGarage's Document Conversion Service contains a critical XML External Entity (XXE) Injection vuln
5804 CVE-2025-2475
0.19%
41.1th 5.4 Mattermost fails to invalidate user cache when converting accounts to bots, allowing attackers to lo
5805 CVE-2024-58107
0.19%
41.1th 7.5 A buffer overflow vulnerability in the codec module could allow attackers to crash affected systems,
5806 CVE-2024-47619
0.19%
41.1th 7.5 This vulnerability in syslog-ng's TLS certificate validation allows improper wildcard matching patte
5807 CVE-2025-22481
0.19%
41.1th 8.8 A command injection vulnerability in QNAP operating systems allows authenticated remote attackers to
5808 CVE-2025-8417
0.19%
41.2th 8.1 This vulnerability allows unauthenticated attackers to execute arbitrary PHP code on WordPress serve
5809 CVE-2025-11692
0.19%
41.1th 5.3 The Zip Attachments plugin for WordPress has an authorization vulnerability that allows unauthentica
5810 CVE-2025-24052
0.19%
41.2th 7.8 This CVE addresses vulnerabilities in the third-party Agere Modem driver (ltmdm64.sys) that ships wi
5811 CVE-2025-10720
0.19%
41.1th 6.5 This vulnerability allows unauthenticated attackers to bypass password protection on private content
5812 CVE-2026-2260
0.19%
41.1th 7.2 This CVE describes a remote command injection vulnerability in D-Link DCS-931L IP cameras. Attackers
5813 CVE-2025-69222
0.19%
41.2th 9.1 LibreChat version 0.8.1-rc2 has a server-side request forgery (SSRF) vulnerability in its Actions fe
5814 CVE-2025-22153
0.19%
41th 7.9 A type confusion bug in CPython 3.11-3.13.1 when using try/except* statements allows bypassing Restr
5815 CVE-2024-13312
0.19%
41.1th 5.3 This CVE describes a Missing Authorization vulnerability in Drupal Open Social that allows forceful
5816 CVE-2024-13251
0.19%
41.1th 8.8 This vulnerability allows attackers to gain elevated privileges through incorrect privilege assignme
5817 CVE-2024-53935
0.19%
41.1th 6.5 This vulnerability allows any Android application without permissions to place phone calls without u
5818 CVE-2023-51339
0.19%
41th 6.5 This vulnerability allows attackers to send excessive password reset emails to legitimate users by e
5819 CVE-2024-8438
0.19%
41.1th 7.5 A path traversal vulnerability in modelscope/agentscope v0.0.4 allows attackers to read arbitrary fi
5820 CVE-2025-30117
0.19%
41.1th 7.3 This vulnerability allows unauthorized attackers to bypass pairing on Forvia Hella HELLA Driving Rec
5821 CVE-2025-25280
0.19%
41.1th 5.3 A buffer overflow vulnerability in Century Systems' FutureNet AS series industrial routers and FA se
5822 CVE-2025-32371
0.19%
41th 4.3 CVE-2025-32371 is a content spoofing vulnerability in DNN (DotNetNuke) CMS where attackers can craft
5823 CVE-2025-2853
0.19%
41.1th 6.5 This vulnerability in GitLab allows authenticated users to trigger a denial of service condition due
5824 CVE-2025-35010
0.19%
41.1th 7.1 This vulnerability allows authenticated attackers to execute arbitrary commands on Microhard BulletL
5825 CVE-2025-53536
0.19%
41th 8.1 This vulnerability in Roo Code allows attackers with prompt submission access to write malicious con
5826 CVE-2025-53149
0.19%
41.1th 7.8 This vulnerability is a heap-based buffer overflow in the Kernel Streaming WOW Thunk Service Driver
5827 CVE-2025-11391
0.19%
41.1th 9.8 The PPOM – Product Addons & Custom Fields for WooCommerce WordPress plugin has an arbitrary file u
5828 CVE-2025-11771
0.19%
41.1th 5.3 This vulnerability allows unauthenticated attackers to manipulate presale counters in WordPress site
5829 CVE-2025-12352
0.19%
41.1th 9.8 The Gravity Forms WordPress plugin allows unauthenticated attackers to upload arbitrary files due to
5830 CVE-2025-15116
0.19%
41.1th 3.7 A race condition vulnerability exists in OpenCart's Single-Use Coupon Handler component, allowing at
5831 CVE-2025-14156
0.19%
41.1th 9.8 This vulnerability allows unauthenticated attackers to create new user accounts with administrator p
5832 CVE-2021-47708
0.19%
41th N/A This SQL injection vulnerability in the COMMAX Smart Home System CDP-1020n allows attackers to bypas
5833 CVE-2025-15115
0.19%
41th 6.5 This authentication bypass vulnerability in Petlibro Smart Pet Feeder Platform allows unauthenticate
5834 CVE-2026-0719
0.19%
41th 8.6 This vulnerability in libsoup's NTLM authentication handling allows attackers to cause denial-of-ser
5835 CVE-2024-55511
0.19%
40.9th 7.8 A null pointer dereference vulnerability in Macrium Reflect backup software allows local attackers t
5836 CVE-2024-48893
0.19%
40.9th 6.8 This vulnerability allows authenticated attackers to inject malicious scripts into FortiSOAR playboo
5837 CVE-2024-6810
0.19%
41th 4.4 The Quiz Organizer WordPress plugin has a stored XSS vulnerability that allows authenticated adminis
5838 CVE-2025-25668
0.19%
41th 9.8 This CVE describes a stack overflow vulnerability in Tenda AC8V4 routers that allows remote code exe
5839 CVE-2025-25664
0.19%
41th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8V4 routers by explo
5840 CVE-2025-25287
0.19%
41th 4.7 Lakeus MediaWiki skin versions 1.0.8 through 1.3.0 are vulnerable to stored cross-site scripting (XS
5841 CVE-2025-1070
0.19%
40.9th 8.1 This vulnerability allows attackers to upload malicious files to affected Schneider Electric devices
5842 CVE-2025-29137
0.19%
41th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC7 routers by exploit
5843 CVE-2025-29031
0.19%
41th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC6 routers via a buff
5844 CVE-2025-29029
0.19%
41th 9.8 A buffer overflow vulnerability in Tenda AC6 routers allows attackers to execute arbitrary code by s
5845 CVE-2025-25565
0.19%
41th 9.8 SoftEther VPN 5.02.5187 contains a buffer overflow vulnerability in PtMakeCert and PtMakeCert2048 fu
5846 CVE-2025-28232
0.19%
40.9th 9.1 This vulnerability allows unauthenticated attackers to bypass authentication and access the admin pa
5847 CVE-2025-3533
0.19%
41th 4.3 This vulnerability allows attackers to inject malicious scripts via the 'Parent' parameter in YouDia
5848 CVE-2025-3304
0.19%
40.9th 6.3 This critical SQL injection vulnerability in Patient Record Management System 1.0 allows remote atta
5849 CVE-2025-3712
0.19%
40.9th 7.5 CVE-2025-3712 is a heap-based buffer overflow vulnerability in LCD KVM over IP Switch CL5708IM firmw
5850 CVE-2025-3740
0.19%
40.9th 8.8 This Local File Inclusion vulnerability in the School Management System for WordPress plugin allows

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free