Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5851 CVE-2025-12335
0.06%
17.4th 4.3 This vulnerability allows attackers to inject malicious scripts into the supplier_update.php page of
5852 CVE-2025-12334
0.06%
17.4th 4.3 This vulnerability allows attackers to inject malicious scripts into the product name, description,
5853 CVE-2025-12333
0.06%
17.4th 4.3 This vulnerability in code-projects E-Commerce Website 1.0 allows attackers to inject malicious scri
5854 CVE-2025-12201
0.06%
17.3th 4.7 This vulnerability allows remote attackers to upload arbitrary files through the image parameter in
5855 CVE-2025-31997
0.06%
17.3th 4.2 HCL Unica Centralized Offer Management has an Insecure Direct Object Reference (IDOR) vulnerability
5856 CVE-2025-0608
0.06%
17.3th 5.5 This CVE describes an open redirect vulnerability in Logo Software Inc.'s Logo Cloud platform that a
5857 CVE-2025-60796
0.06%
17.4th 6.1 phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities where use
5858 CVE-2025-60708
0.06%
17.4th 6.5 CVE-2025-60708 is an untrusted pointer dereference vulnerability in the Storvsp.sys driver that allo
5859 CVE-2025-60706
0.06%
17.4th 5.5 This vulnerability allows an authorized attacker with local access to a Windows Hyper-V host to read
5860 CVE-2025-59513
0.06%
17.4th 5.5 This vulnerability allows an authorized attacker to read memory outside the intended buffer in Windo
5861 CVE-2025-64179
0.06%
17.4th 5.3 This vulnerability in lakeFS allows unauthenticated access to the /api/v1/usage-report/summary endpo
5862 CVE-2025-20377
0.06%
17.2th 4.3 An authenticated information disclosure vulnerability in Cisco Unified Intelligence Center allows lo
5863 CVE-2025-36091
0.06%
17.4th 4.3 This vulnerability in IBM Cloud Pak for Business Automation allows authenticated users to assign inv
5864 CVE-2025-15154
0.06%
17.4th 5.3 This vulnerability in PbootCMS allows attackers to spoof IP addresses by manipulating the X-Forwarde
5865 CVE-2025-60070
0.06%
17.3th 6.5 This CVE describes a code injection vulnerability in the Molla WordPress theme that allows attackers
5866 CVE-2025-60068
0.06%
17.3th 6.5 This CVE describes a code injection vulnerability in the Javo Core WordPress plugin that allows atta
5867 CVE-2025-64633
0.06%
17.3th 5.3 This is a cross-site scripting (XSS) vulnerability in the Norebro Extra WordPress plugin that allows
5868 CVE-2025-13891
0.06%
17.3th 6.5 This vulnerability allows authenticated WordPress users with Author-level permissions or higher to p
5869 CVE-2025-64702
0.06%
17.3th 5.3 quic-go versions 0.56.0 and below are vulnerable to memory exhaustion attacks through HTTP/3 QPACK h
5870 CVE-2025-56429
0.06%
17.3th 6.1 This Cross-Site Scripting (XSS) vulnerability in FearlessCMS allows attackers to inject malicious sc
5871 CVE-2025-63068
0.06%
17.3th 5.3 This vulnerability allows attackers to inject malicious scripts into web pages using the Contact For
5872 CVE-2025-64056
0.06%
17.4th 4.3 An unauthenticated file upload vulnerability in Fanvil x210 V2 IP phones allows attackers on the loc
5873 CVE-2025-12826
0.06%
17.5th 4.8 The Custom Post Type UI WordPress plugin has an authorization bypass vulnerability that allows authe
5874 CVE-2025-66307
0.06%
17.3th 6.5 This vulnerability in Grav's admin plugin allows attackers to enumerate valid usernames and discover
5875 CVE-2026-1549
0.06%
17.4th 4.3 This CVE describes a path traversal vulnerability in jishenghua jshERP's PluginController component.
5876 CVE-2026-23960
0.06%
17.4th 5.4 This stored cross-site scripting (XSS) vulnerability in Argo Workflows allows workflow authors to in
5877 CVE-2021-47870
0.06%
17.4th 5.4 This stored XSS vulnerability in GetSimple CMS My SMTP Contact Plugin allows attackers to inject mal
5878 CVE-2026-20821
0.06%
17.5th 6.2 This Windows Remote Procedure Call vulnerability allows unauthorized local attackers to access sensi
5879 CVE-2026-20818
0.06%
17.5th 6.2 This vulnerability allows sensitive information to be written to log files in the Windows Kernel, po
5880 CVE-2026-22693
0.06%
17.4th 5.3 A null pointer dereference vulnerability in HarfBuzz text shaping engine allows attackers to cause a
5881 CVE-2026-25543
0.06%
17.3th 6.1 HtmlSanitizer versions before 9.0.892 and 9.1.893-beta fail to sanitize content within template tags
5882 CVE-2026-24933
0.06%
17.4th 5.9 This vulnerability allows unauthenticated remote attackers to perform Man-in-the-Middle attacks by i
5883 CVE-2024-31906
0.06%
17.2th 6.2 IBM Automation Decision Services 23.0.2 stores web pages locally in a way that allows other users on
5884 CVE-2025-23227
0.06%
17th 6.4 IBM Tivoli Application Dependency Discovery Manager versions 7.3.0.0 through 7.3.0.11 contain a stor
5885 CVE-2024-51457
0.06%
17th 4.4 This CVE describes a cross-site scripting (XSS) vulnerability in IBM Robotic Process Automation for
5886 CVE-2024-57940
0.06%
17th 5.5 A denial-of-service vulnerability in the Linux kernel's exFAT filesystem driver where a corrupted fi
5887 CVE-2024-12328
0.06%
17.2th 6.4 The MAS Elementor WordPress plugin allows authenticated attackers with Author-level access or higher
5888 CVE-2022-49654
0.06%
17th 5.5 A vulnerability in the Linux kernel's Qualcomm Atheros QCA8K Ethernet switch driver causes network d
5889 CVE-2022-49510
0.06%
17th 5.5 This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's OMAP DRM driver. A
5890 CVE-2022-49417
0.06%
17th 5.5 A NULL pointer dereference vulnerability in the iwlwifi driver's MEI component in the Linux kernel c
5891 CVE-2022-49408
0.06%
17th 5.5 A memory leak vulnerability in the Linux kernel's ext4 filesystem driver allows attackers to cause k
5892 CVE-2022-49333
0.06%
17th 5.5 A race condition vulnerability in the Linux kernel's mlx5 driver where mlx5_get_next_phys_dev() is c
5893 CVE-2022-49306
0.06%
17th 5.5 This CVE addresses a resource leak vulnerability in the Linux kernel's USB DWC3 host controller driv
5894 CVE-2024-28776
0.06%
17th 5.4 This cross-site scripting (XSS) vulnerability in IBM Cognos Controller allows attackers to inject ma
5895 CVE-2025-24889
0.06%
16.9th 4.5 A path traversal vulnerability in SecureDrop Client allows attackers with existing code execution in
5896 CVE-2024-57959
0.06%
17th 6.1 A Use-After-Free vulnerability in the display module allows attackers to exploit memory corruption a
5897 CVE-2024-38318
0.06%
17.2th 4.8 IBM Aspera Shares versions 1.9.0 through 1.10.0 PL6 are vulnerable to HTML injection, allowing attac
5898 CVE-2025-24097
0.06%
17.1th 5.0 A permissions vulnerability in Apple operating systems allows applications to read arbitrary file me
5899 CVE-2025-2688
0.06%
17.1th 4.3 This vulnerability in TOTOLINK A3000RU routers allows improper access to the Syslog configuration fi
5900 CVE-2024-10445
0.06%
16.9th 4.3 This CVE describes an improper certificate validation vulnerability in Synology BeeStation OS and Di

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free