Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 6301 | CVE-2022-49710 |
|
16.1th | 5.5 | This CVE describes a memory access vulnerability in the Linux kernel's device mapper mirror logging | |
| 6302 | CVE-2022-49665 |
|
16th | 5.5 | This CVE describes a memory leak vulnerability in the Linux kernel's ThinkPad ACPI driver. When the | |
| 6303 | CVE-2022-49565 |
|
16th | 5.5 | This CVE describes a Linux kernel vulnerability where improper initialization order in the Performan | |
| 6304 | CVE-2022-49271 |
|
16.1th | 5.5 | A NULL pointer dereference vulnerability in the Linux kernel's CIFS/SMB2 implementation allows local | |
| 6305 | CVE-2022-49259 |
|
16.1th | 5.5 | This CVE describes a kernel-level race condition in the Linux block subsystem where a parent kobject | |
| 6306 | CVE-2022-49206 |
|
16.1th | 5.5 | This CVE describes a memory leak vulnerability in the Linux kernel's RDMA/mlx5 driver. When the seco | |
| 6307 | CVE-2022-49197 |
|
16.2th | 5.5 | This is a Linux kernel vulnerability in the netlink subsystem where an out-of-bounds shift occurs wh | |
| 6308 | CVE-2022-49175 |
|
16.2th | 5.5 | This CVE describes a race condition vulnerability in the Linux kernel's power management subsystem w | |
| 6309 | CVE-2022-49161 |
|
16th | 5.5 | This CVE describes a memory leak vulnerability in the Linux kernel's MediaTek ASoC driver. When the | |
| 6310 | CVE-2022-49139 |
|
16.1th | 5.5 | A NULL pointer dereference vulnerability in the Linux kernel's Bluetooth subsystem allows local atta | |
| 6311 | CVE-2022-49121 |
|
16.1th | 5.5 | This CVE describes a memory leak vulnerability in the Linux kernel's pm8001 SCSI driver where alloca | |
| 6312 | CVE-2022-49119 |
|
16.1th | 5.5 | This CVE describes a memory leak vulnerability in the Linux kernel's pm8001 SCSI driver. When firmwa | |
| 6313 | CVE-2022-49115 |
|
16.1th | 5.5 | This CVE-2022-49115 is a memory leak vulnerability in the Linux kernel's PCI endpoint subsystem caus | |
| 6314 | CVE-2022-49104 |
|
16.1th | 5.5 | This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's vchiq_core compone | |
| 6315 | CVE-2022-49077 |
|
16.2th | 5.5 | A Linux kernel vulnerability where mremap() with old_size=0 triggers unnecessary invalidate_range_st | |
| 6316 | CVE-2022-49074 |
|
16.1th | 5.5 | This CVE describes a bug in the Linux kernel's GICv3 interrupt controller driver where incorrect pol | |
| 6317 | CVE-2022-49072 |
|
16.1th | 5.5 | A race condition vulnerability in the Linux kernel's GPIO subsystem allows uninitialized interrupt r | |
| 6318 | CVE-2024-27137 |
|
16.1th | 5.3 | This vulnerability allows a local attacker to perform a man-in-the-middle attack on Apache Cassandra | |
| 6319 | CVE-2025-24210 |
|
16.1th | 5.5 | A logic error in image parsing across multiple Apple operating systems could lead to disclosure of u | |
| 6320 | CVE-2022-49743 |
|
16th | 5.5 | This CVE addresses a memory corruption vulnerability in the Linux kernel's OverlayFS filesystem impl | |
| 6321 | CVE-2021-26087 |
|
16.2th | 4.3 | This vulnerability allows attackers to inject malicious scripts into the FortiWLC web interface, whi | |
| 6322 | CVE-2025-25452 |
|
16.1th | 5.1 | This vulnerability allows remote attackers to bypass two-factor authentication and deactivate it in | |
| 6323 | CVE-2025-25450 |
|
16.1th | 5.1 | This vulnerability allows remote attackers to bypass two-factor authentication (2FA) in MyTaag softw | |
| 6324 | CVE-2025-28076 |
|
16.2th | 6.5 | Multiple SQL injection vulnerabilities in EasyVirt DCScope and CO2Scope allow authenticated attacker | |
| 6325 | CVE-2025-46545 |
|
16.1th | 4.4 | This vulnerability allows stored cross-site scripting (XSS) attacks in Sherpa Orchestrator version 1 | |
| 6326 | CVE-2024-22351 |
|
16.1th | 6.3 | IBM InfoSphere Information Server 11.7 fails to properly invalidate user sessions after logout, allo | |
| 6327 | CVE-2025-22125 |
|
16.2th | 5.5 | A vulnerability in the Linux kernel's RAID1 and RAID10 implementations causes incorrect handling of | |
| 6328 | CVE-2024-11129 |
|
16.2th | 6.3 | This vulnerability in GitLab EE allows attackers to perform targeted searches with sensitive keyword | |
| 6329 | CVE-2025-24375 |
|
16th | 5.0 | The Charmed MySQL K8s operator versions before revision 221 (Kubernetes) and revision 338 (machine o | |
| 6330 | CVE-2025-26654 |
|
16th | 6.8 | SAP Commerce Cloud (Public Cloud) has a vulnerability where HTTP port 80 cannot be fully disabled, o | |
| 6331 | CVE-2025-26401 |
|
16.2th | 6.5 | A weak password encoding vulnerability in JTEKT's HMI ViewJet C-more series allows local authenticat | |
| 6332 | CVE-2024-7487 |
|
16.2th | 5.8 | This vulnerability allows attackers to bypass app-native authentication in WSO2 Identity Server 7.0. | |
| 6333 | CVE-2025-48260 |
|
16.1th | 4.3 | This CVE describes a missing authorization vulnerability in the Ninja Team GDPR CCPA Compliance Supp | |
| 6334 | CVE-2024-8286 |
|
16th | 6.5 | This Cross-Site Request Forgery (CSRF) vulnerability in the WebToffee GDPR Cookie Consent WordPress | |
| 6335 | CVE-2023-34732 |
|
16.1th | 5.4 | This vulnerability in Flytxt NEON-dX allows attackers to perform brute force attacks against the cha | |
| 6336 | CVE-2025-43878 |
|
16.2th | 6.0 | This vulnerability allows authenticated attackers with Administrator or Resource Administrator roles | |
| 6337 | CVE-2025-47484 |
|
16.1th | 6.4 | This SSRF vulnerability in the Oliver Campion Display Remote Posts Block WordPress plugin allows att | |
| 6338 | CVE-2025-6865 |
|
16.2th | 4.3 | This Cross-Site Request Forgery (CSRF) vulnerability in DaiCuo CMS allows attackers to trick authent | |
| 6339 | CVE-2025-53097 |
|
16.1th | 5.9 | In Roo Code versions before 3.20.3, the AI agent's search_files tool could read sensitive files outs | |
| 6340 | CVE-2025-53266 |
|
16.1th | 4.3 | CVE-2025-53266 is a missing authorization vulnerability in the EdwardBock Cron Logger WordPress plug | |
| 6341 | CVE-2025-50009 |
|
16.1th | 5.4 | This CVE describes a Missing Authorization vulnerability in the Kata Plus WordPress plugin by Climax | |
| 6342 | CVE-2025-49998 |
|
16.1th | 5.4 | This CVE describes a missing authorization vulnerability in the WooCommerce Fortnox Integration plug | |
| 6343 | CVE-2025-49978 |
|
16.1th | 4.3 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the eyecix JobSearch | |
| 6344 | CVE-2025-6106 |
|
16.2th | 4.3 | This CSRF vulnerability in WukongCRM 9.0 allows attackers to trick authenticated administrators into | |
| 6345 | CVE-2025-5876 |
|
16th | 5.3 | This vulnerability allows remote attackers to bypass authentication on Lucky Technology LM-520 serie | |
| 6346 | CVE-2025-5872 |
|
16th | 5.3 | CVE-2025-5872 is an authentication bypass vulnerability in eGauge EG3000 Energy Monitor's Setting Ha | |
| 6347 | CVE-2025-24485 |
|
16th | 5.8 | An unauthenticated server-side request forgery vulnerability in MedDream PACS Premium allows attacke | |
| 6348 | CVE-2025-29630 |
|
16th | 6.6 | A vulnerability in Gardyn 4 allows remote attackers with the corresponding SSH private key to gain r | |
| 6349 | CVE-2025-53662 |
|
16.1th | 6.5 | The Jenkins IFTTT Build Notifier Plugin stores sensitive IFTTT Maker Channel Keys unencrypted in con | |
| 6350 | CVE-2025-53656 |
|
16.1th | 6.5 | The Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier stores sensitive credentials unencry |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free