Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 6101 | CVE-2025-30794 |
|
40.2th | 7.1 | This reflected cross-site scripting (XSS) vulnerability in The Events Calendar Event Tickets WordPre | |
| 6102 | CVE-2025-30614 |
|
40.2th | 7.1 | This vulnerability allows attackers to inject malicious scripts into web pages generated by the Goog | |
| 6103 | CVE-2025-30607 |
|
40.2th | 7.1 | This vulnerability allows attackers to inject malicious scripts into web pages generated by the Quic | |
| 6104 | CVE-2025-30579 |
|
40.2th | 7.1 | This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users | |
| 6105 | CVE-2025-30559 |
|
40.2th | 7.1 | This stored cross-site scripting (XSS) vulnerability in the Kento WordPress Stats plugin allows atta | |
| 6106 | CVE-2025-30547 |
|
40.2th | 7.1 | This vulnerability allows attackers to inject malicious scripts into web pages generated by the WP C | |
| 6107 | CVE-2025-30520 |
|
40.2th | 7.1 | A reflected cross-site scripting (XSS) vulnerability in the Breezing Forms WordPress plugin allows a | |
| 6108 | CVE-2025-5280 |
|
40.1th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code or cause denial of service thro | |
| 6109 | CVE-2025-51401 |
|
40.1th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje | |
| 6110 | CVE-2025-51398 |
|
40.1th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje | |
| 6111 | CVE-2025-51396 |
|
40.1th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje | |
| 6112 | CVE-2025-8760 |
|
40.3th | 9.8 | A buffer overflow vulnerability in INSTAR IP camera firmware allows remote attackers to execute arbi | |
| 6113 | CVE-2025-10172 |
|
40.1th | 8.8 | A buffer overflow vulnerability in UTT 750W devices up to version 3.2.2-191225 allows remote attacke | |
| 6114 | CVE-2025-10171 |
|
40.1th | 8.8 | A buffer overflow vulnerability in UTT 1250GW devices allows remote attackers to execute arbitrary c | |
| 6115 | CVE-2025-10170 |
|
40.1th | 8.8 | A buffer overflow vulnerability in UTT 1200GW devices allows remote attackers to execute arbitrary c | |
| 6116 | CVE-2025-54104 |
|
40.1th | 6.7 | A type confusion vulnerability in Windows Defender Firewall Service allows authenticated attackers t | |
| 6117 | CVE-2025-53810 |
|
40.1th | 6.7 | This CVE describes a type confusion vulnerability in the Windows Defender Firewall Service that allo | |
| 6118 | CVE-2026-25894 |
|
40.1th | 9.8 | An insecure default configuration in FUXA web-based SCADA/HMI software allows unauthenticated remote | |
| 6119 | CVE-2025-65792 |
|
40.1th | 9.1 | DataGear v5.5.0 contains a path traversal vulnerability (CWE-22) that allows attackers to delete arb | |
| 6120 | CVE-2026-25858 |
|
40.1th | 9.8 | This vulnerability allows unauthenticated attackers to reset passwords for any user account by explo | |
| 6121 | CVE-2025-65882 |
|
40.1th | 9.8 | This vulnerability in openmptcprouter allows attackers to write arbitrary files or execute arbitrary | |
| 6122 | CVE-2024-49354 |
|
40th | 5.3 | IBM Concert versions 1.0.0 through 1.0.2 contain an API vulnerability that allows attackers to extra | |
| 6123 | CVE-2024-56828 |
|
40th | 9.8 | This CVE describes a file upload vulnerability in ChestnutCMS that allows attackers to upload arbitr | |
| 6124 | CVE-2025-0225 |
|
40.1th | 4.3 | This path traversal vulnerability in Tsinghua Unigroup Electronic Archives System allows attackers t | |
| 6125 | CVE-2025-26200 |
|
40th | 7.2 | This SQL injection vulnerability in SLIMS v9.6.1 allows remote attackers to execute arbitrary SQL co | |
| 6126 | CVE-2024-12511 |
|
40th | 7.6 | This vulnerability allows attackers with address book access to modify SMB/FTP settings on affected | |
| 6127 | CVE-2024-9230 |
|
40th | 5.9 | The PowerPress Podcasting plugin for WordPress before version 11.9.18 has a stored cross-site script | |
| 6128 | CVE-2025-5934 |
|
40th | 8.8 | A critical stack-based buffer overflow vulnerability in Netgear EX3700 devices allows remote attacke | |
| 6129 | CVE-2025-6994 |
|
40th | 9.8 | The Reveal Listing WordPress plugin allows unauthenticated attackers to register accounts with admin | |
| 6130 | CVE-2025-5954 |
|
40th | 9.8 | The Service Finder SMS System WordPress plugin allows unauthenticated attackers to register administ | |
| 6131 | CVE-2025-58745 |
|
40.1th | 9.9 | This vulnerability allows attackers to bypass MIME type validation and upload malicious PHP files di | |
| 6132 | CVE-2025-36894 |
|
40th | 7.5 | This vulnerability allows remote attackers to cause a denial of service (DoS) in affected systems wi | |
| 6133 | CVE-2025-49553 |
|
40.1th | 9.3 | Adobe Connect versions 12.9 and earlier contain a DOM-based Cross-Site Scripting vulnerability that | |
| 6134 | CVE-2025-54265 |
|
40th | 5.9 | Adobe Commerce (Magento) versions 2.4.9-alpha2 through 2.4.4-p15 and earlier contain an incorrect au | |
| 6135 | CVE-2025-65493 |
|
40th | 7.5 | A NULL pointer dereference vulnerability in OISM libcoap 4.3.5 allows remote attackers to cause deni | |
| 6136 | CVE-2025-12528 |
|
40th | 8.1 | The Pie Forms for WP WordPress plugin has an arbitrary file upload vulnerability that allows unauthe | |
| 6137 | CVE-2025-14038 |
|
40th | 7.0 | EDB Hybrid Manager contains an authentication bypass vulnerability in gRPC endpoints due to Istio Ga | |
| 6138 | CVE-2025-67721 |
|
40th | N/A | CVE-2025-67721 is a memory disclosure vulnerability in Aircompressor Java library where malformed Sn | |
| 6139 | CVE-2025-9611 |
|
40th | N/A | Microsoft Playwright MCP Server versions before 0.0.40 lack Origin header validation, enabling DNS r | |
| 6140 | CVE-2025-21268 |
|
40th | 4.3 | This vulnerability allows attackers to bypass the MapUrlToZone security feature in Microsoft Windows | |
| 6141 | CVE-2024-53931 |
|
39.9th | 9.1 | This vulnerability allows any Android application without permissions to place phone calls without u | |
| 6142 | CVE-2024-46622 |
|
39.9th | 9.8 | This CVE describes an escalation of privilege vulnerability in SecureAge Security Suite that allows | |
| 6143 | CVE-2025-1641 |
|
40th | 7.3 | This critical SQL injection vulnerability in Benner ModernaNet allows remote attackers to execute ar | |
| 6144 | CVE-2025-1640 |
|
40th | 7.3 | This critical SQL injection vulnerability in Benner ModernaNet allows attackers to execute arbitrary | |
| 6145 | CVE-2024-12629 |
|
40th | 4.1 | This CVE describes a prototype pollution vulnerability in Progress Telerik KendoReact components whe | |
| 6146 | CVE-2025-3001 |
|
39.9th | 5.3 | A critical memory corruption vulnerability in PyTorch's torch.lstm_cell function allows local attack | |
| 6147 | CVE-2025-32795 |
|
40th | 6.5 | This CVE describes an improper access control vulnerability in Dify, an open-source LLM app developm | |
| 6148 | CVE-2025-27571 |
|
40th | 4.3 | This vulnerability allows authenticated users to view metadata from archived channels even when the | |
| 6149 | CVE-2025-32111 |
|
39.9th | 8.7 | This CVE describes a GitHub Actions workflow vulnerability in acme.sh Docker images where the checko | |
| 6150 | CVE-2025-48069 |
|
39.9th | 6.6 | CVE-2025-48069 is a command injection vulnerability in ejson2env versions before 2.0.8 where insuffi |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free