Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6151 CVE-2025-21799
0.05%
16.4th 5.5 A Linux kernel vulnerability in the TI AM65x CPSW Ethernet driver allows improper IRQ handling when
6152 CVE-2025-21781
0.05%
16.4th 5.5 A race condition vulnerability in the Linux kernel's batman-adv module causes kernel panic during ne
6153 CVE-2025-21779
0.05%
16.4th 5.5 A NULL pointer dereference vulnerability in the Linux kernel's KVM hypervisor allows a malicious gue
6154 CVE-2025-21748
0.05%
16.5th 5.5 This CVE describes an integer overflow vulnerability in the ksmbd (kernel SMB server) module of the
6155 CVE-2025-21736
0.05%
16.4th 5.5 This CVE describes an integer overflow vulnerability in the nilfs2 filesystem's fiemap function in t
6156 CVE-2022-49636
0.05%
16.3th 5.5 A memory leak vulnerability in the Linux kernel's VLAN implementation allows attackers to cause deni
6157 CVE-2025-25993
0.05%
16.4th 5.1 This SQL injection vulnerability in FeMiner wms 1.0 allows remote attackers to extract sensitive dat
6158 CVE-2025-25991
0.05%
16.4th 5.1 A SQL injection vulnerability in HooskCMS v1.7.1 allows remote attackers to extract sensitive databa
6159 CVE-2022-35202
0.05%
16.5th 5.1 This vulnerability allows remote attackers to download the Java keystore containing SAML signing pri
6160 CVE-2025-1211
0.05%
16.5th 6.5 This SSRF vulnerability in hackney versions before 1.21.0 allows attackers to bypass URL parsing and
6161 CVE-2025-0508
0.05%
16.5th 5.9 This CVE describes an MD5 hash collision vulnerability in AWS SageMaker Python SDK's workflow compon
6162 CVE-2024-8057
0.05%
16.5th 4.3 In Danswer AI version 0.4.1, unauthenticated attackers can sign up as basic users and create credent
6163 CVE-2025-21866
0.05%
16.4th 5.5 A memory management vulnerability in the Linux kernel's PowerPC code patching subsystem incorrectly
6164 CVE-2024-54026
0.05%
16.3th 4.3 This SQL injection vulnerability in Fortinet FortiSandbox allows attackers to execute unauthorized S
6165 CVE-2024-58058
0.05%
16.4th 5.5 This CVE describes a null pointer dereference vulnerability in the Linux kernel's UBIFS filesystem i
6166 CVE-2024-58052
0.05%
16.4th 5.5 This CVE describes a NULL pointer dereference vulnerability in the AMD GPU driver for Linux kernel.
6167 CVE-2025-1695
0.05%
16.3th 5.3 This vulnerability in NGINX Unit with the Java Language Module allows remote attackers to send speci
6168 CVE-2025-4064
0.05%
16.3th 5.3 CVE-2025-4064 is an improper access control vulnerability in ScriptAndTools Online-Travling-System 1
6169 CVE-2025-4035
0.05%
16.5th 4.3 A vulnerability in libsoup allows malicious websites to bypass public suffix protections and set coo
6170 CVE-2025-5374
0.05%
16.6th 6.3 A critical SQL injection vulnerability exists in PHPGurukul Online Birth Certificate System 2.0, spe
6171 CVE-2025-4431
0.05%
16.5th 4.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to mo
6172 CVE-2025-4429
0.05%
16.4th 6.1 The Gearside Developer Dashboard WordPress plugin (versions up to 1.0.72) contains a reflected cross
6173 CVE-2025-4692
0.05%
16.6th 6.8 Attackers can craft malicious JSON Web Tokens (JWTs) to escalate privileges on the ABUP Cloud Update
6174 CVE-2025-4221
0.05%
16.6th 6.4 The Animated Buttons WordPress plugin has a stored XSS vulnerability in its 'auto-downloader' shortc
6175 CVE-2025-4217
0.05%
16.6th 6.4 The WP YouTube Video Optimizer WordPress plugin has a stored XSS vulnerability that allows authentic
6176 CVE-2025-3750
0.05%
16.4th 6.4 The Network Posts Extended WordPress plugin has a stored XSS vulnerability in the 'post_height' para
6177 CVE-2025-3715
0.05%
16.4th 6.4 The Bold Page Builder WordPress plugin has a stored XSS vulnerability that allows authenticated atta
6178 CVE-2025-4589
0.05%
16.6th 6.4 The Bon Toolkit WordPress plugin has a stored XSS vulnerability in its 'bt-map' shortcode that allow
6179 CVE-2025-3769
0.05%
16.5th 5.3 This vulnerability allows unauthenticated attackers to access appointment details including customer
6180 CVE-2025-22448
0.05%
16.4th 6.1 Insecure inherited permissions in Intel Simics Package Manager before version 1.12.0 allow authentic
6181 CVE-2025-4171
0.05%
16.6th 6.4 This stored XSS vulnerability in the WZ Followed Posts WordPress plugin allows authenticated attacke
6182 CVE-2025-4220
0.05%
16.6th 6.4 The Xavin's List Subpages WordPress plugin has a stored XSS vulnerability in its 'xls' shortcode tha
6183 CVE-2025-3860
0.05%
16.4th 6.4 The CarDealerPress WordPress plugin has a stored XSS vulnerability in the 'saleclass' parameter that
6184 CVE-2025-4172
0.05%
16.6th 6.4 The VerticalResponse Newsletter Widget WordPress plugin has a stored cross-site scripting vulnerabil
6185 CVE-2025-4168
0.05%
16.6th 6.4 The Subpage List WordPress plugin has a stored XSS vulnerability that allows authenticated attackers
6186 CVE-2025-4100
0.05%
16.6th 6.4 The Nautic Pages WordPress plugin has a stored XSS vulnerability in its 'np_marinetraffic_map' short
6187 CVE-2025-3521
0.05%
16.6th 6.4 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i
6188 CVE-2024-56915
0.05%
16.5th 6.5 This vulnerability allows attackers to inject malicious scripts into Netbox's RSS feed widget, which
6189 CVE-2025-44206
0.05%
16.5th 4.6 This CVE describes a Cross-Site Scripting (XSS) vulnerability in Hexagon HxGN OnCall Dispatch Advant
6190 CVE-2025-6476
0.05%
16.6th 4.3 This vulnerability in SourceCodester Gym Management System 1.0 allows attackers to perform Cross-Sit
6191 CVE-2025-49234
0.05%
16.6th 6.5 This CVE describes a Missing Authorization vulnerability in the WP Dummy Content Generator WordPress
6192 CVE-2025-6006
0.05%
16.5th 4.7 This critical SQL injection vulnerability in kiCode111 like-girl 5.2.0 allows remote attackers to ex
6193 CVE-2026-1602
0.05%
16.3th 6.5 This SQL injection vulnerability in Ivanti Endpoint Manager allows authenticated attackers to read a
6194 CVE-2025-7450
0.05%
16.5th 5.4 This critical vulnerability in gorobbs allows remote attackers to perform path traversal attacks via
6195 CVE-2025-42970
0.05%
16.5th 5.8 CVE-2025-42970 is a path traversal vulnerability in SAPCAR archive extraction tool that allows attac
6196 CVE-2025-55624
0.05%
16.3th 5.3 This CVE describes an intent redirection vulnerability in Reolink mobile app version 4.54.0.4.202505
6197 CVE-2025-55229
0.05%
16.5th 5.3 This vulnerability allows attackers to spoof digital certificates in Windows systems by exploiting i
6198 CVE-2023-43683
0.05%
16.4th 6.5 A stack buffer out-of-bounds access vulnerability exists in Malwarebytes and Nebula products due to
6199 CVE-2025-48807
0.05%
16.3th 6.7 This vulnerability in Windows Hyper-V allows an authorized attacker to bypass communication channel
6200 CVE-2025-8656
0.05%
16.4th 6.8 This vulnerability allows physically present attackers to downgrade the software on Kenwood DMX958XR

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free