Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 6451 | CVE-2025-31209 |
|
38.6th | 6.3 | An out-of-bounds read vulnerability in Apple operating systems allows attackers to disclose user inf | |
| 6452 | CVE-2024-13009 |
|
38.6th | 7.2 | This vulnerability in Eclipse Jetty allows incorrect buffer release during gzip decompression errors | |
| 6453 | CVE-2025-4270 |
|
38.5th | 5.3 | This vulnerability in TOTOLINK A720R routers allows remote attackers to access sensitive system conf | |
| 6454 | CVE-2025-30184 |
|
38.6th | 9.8 | CVE-2025-30184 allows unauthenticated attackers to bypass authentication and access the CyberData 01 | |
| 6455 | CVE-2025-8450 |
|
38.5th | 8.2 | An improper access control vulnerability in Fortra's FileCatalyst Workflow component allows unauthen | |
| 6456 | CVE-2025-8979 |
|
38.5th | 6.6 | This vulnerability in Tenda AC15 routers allows attackers to bypass firmware update authentication c | |
| 6457 | CVE-2023-7315 |
|
38.6th | 5.4 | Nagios XI versions before 5.11.3 contain a cross-site scripting vulnerability in the Graph Explorer | |
| 6458 | CVE-2023-7314 |
|
38.6th | 5.4 | Nagios XI versions before 5.11.3 contain a cross-site scripting vulnerability in the Bandwidth Repor | |
| 6459 | CVE-2023-7313 |
|
38.6th | 5.4 | Nagios XI versions before 5.11.3 contain a cross-site scripting vulnerability in the Bulk Modificati | |
| 6460 | CVE-2025-62868 |
|
38.5th | 8.1 | This CVE describes a PHP Local File Inclusion vulnerability in the Edge CPT WordPress plugin, allowi | |
| 6461 | CVE-2025-11023 |
|
38.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in ArkSigner's AcBakImzala software that | |
| 6462 | CVE-2025-62029 |
|
38.5th | 8.1 | This vulnerability allows attackers to include arbitrary local files through improper filename contr | |
| 6463 | CVE-2025-59564 |
|
38.5th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 6464 | CVE-2025-59555 |
|
38.5th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 6465 | CVE-2025-59246 |
|
38.6th | 9.8 | This critical vulnerability in Azure Entra ID (formerly Azure Active Directory) allows attackers to | |
| 6466 | CVE-2025-62014 |
|
38.5th | 8.1 | This vulnerability allows attackers to include and execute arbitrary PHP files on servers running th | |
| 6467 | CVE-2025-60198 |
|
38.5th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 6468 | CVE-2025-53252 |
|
38.5th | 9.8 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 6469 | CVE-2025-48290 |
|
38.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Kinsley WordPress theme. Attacker | |
| 6470 | CVE-2025-60262 |
|
38.5th | 9.8 | A vsftpd misconfiguration vulnerability in H3C wireless devices allows anonymous FTP uploads to be o | |
| 6471 | CVE-2026-24905 |
|
38.5th | 7.8 | CVE-2026-24905 is a command injection vulnerability in Inspektor Gadget's image building functionali | |
| 6472 | CVE-2024-42168 |
|
38.4th | 8.9 | HCL MyXalytics has an out-of-band resource load vulnerability where attackers can host malicious web | |
| 6473 | CVE-2024-13212 |
|
38.4th | 6.3 | This critical vulnerability in SingMR HouseRent 1.0 allows remote attackers to upload arbitrary file | |
| 6474 | CVE-2024-35532 |
|
38.4th | 9.1 | An XML External Entity (XXE) injection vulnerability in Intersec Geosafe-ea allows attackers to read | |
| 6475 | CVE-2024-37451 |
|
38.4th | 4.3 | This CSRF vulnerability in the Rara Theme Travel Agency WordPress theme allows attackers to trick au | |
| 6476 | CVE-2024-37435 |
|
38.4th | 4.3 | This CSRF vulnerability in the Rara Theme Perfect Portfolio WordPress theme allows attackers to tric | |
| 6477 | CVE-2024-37093 |
|
38.4th | 4.3 | A Cross-Site Request Forgery (CSRF) vulnerability in the MasterStudy LMS WordPress plugin allows att | |
| 6478 | CVE-2024-54169 |
|
38.4th | 6.5 | This vulnerability allows authenticated attackers to perform directory traversal attacks on IBM Enti | |
| 6479 | CVE-2023-34398 |
|
38.4th | 7.5 | A null pointer dereference vulnerability in the Boost library used by Mercedes-Benz NTG6 head units | |
| 6480 | CVE-2025-25197 |
|
38.4th | 5.4 | This Cross-Site Scripting (XSS) vulnerability in Silverstripe Elemental allows attackers to inject m | |
| 6481 | CVE-2025-25213 |
|
38.5th | 6.5 | This vulnerability allows clickjacking attacks on Wi-Fi AP UNIT 'AC-WPS-11ac series' devices. Attack | |
| 6482 | CVE-2025-3170 |
|
38.4th | 7.3 | A critical SQL injection vulnerability in Project Worlds Online Lawyer Management System 1.0 allows | |
| 6483 | CVE-2024-11267 |
|
38.4th | 8.8 | The JSP Store Locator WordPress plugin version 1.0 contains a SQL injection vulnerability due to ins | |
| 6484 | CVE-2023-31585 |
|
38.4th | 9.8 | Grocery-CMS-PHP-Restful-API v1.3 has an unrestricted file upload vulnerability in the /admin/add-cat | |
| 6485 | CVE-2025-6561 |
|
38.4th | 9.8 | Hunt Electronic HBF-09KD and HBF-16NK hybrid DVR models expose a system configuration file containin | |
| 6486 | CVE-2025-51005 |
|
38.4th | 7.5 | A heap buffer overflow vulnerability in tcpliveplay utility of tcpreplay 4.5.1 allows attackers to c | |
| 6487 | CVE-2025-27224 |
|
38.4th | 9.8 | This vulnerability allows unauthenticated attackers to upload malicious files to arbitrary locations | |
| 6488 | CVE-2025-63216 |
|
38.4th | 10.0 | This vulnerability allows attackers to bypass authentication on Itel DAB Gateway devices by reusing | |
| 6489 | CVE-2025-67729 |
|
38.4th | 8.8 | LMDeploy versions before 0.11.1 have an insecure deserialization vulnerability where torch.load() is | |
| 6490 | CVE-2025-63389 |
|
38.4th | 9.8 | A critical authentication bypass vulnerability in Ollama platform allows remote attackers to perform | |
| 6491 | CVE-2025-64053 |
|
38.4th | 7.5 | A buffer overflow vulnerability in Fanvil x210 VoIP phones running firmware 2.12.20 allows attackers | |
| 6492 | CVE-2023-6425 |
|
38.4th | 6.3 | This vulnerability allows attackers to inject malicious JavaScript into the BigProf Online Clinic Ma | |
| 6493 | CVE-2021-34668 |
|
38.4th | 6.4 | This vulnerability allows author-level users in WordPress to inject malicious JavaScript into folder | |
| 6494 | CVE-2025-24604 |
|
38.2th | 5.4 | This CVE describes a missing authorization vulnerability in the VForm WordPress plugin that allows a | |
| 6495 | CVE-2025-23761 |
|
38.2th | 5.4 | This CVE describes a missing authorization vulnerability in the Woo Tuner WordPress plugin that allo | |
| 6496 | CVE-2025-0311 |
|
38.3th | 6.4 | This stored XSS vulnerability in the Orbit Fox WordPress plugin allows authenticated attackers with | |
| 6497 | CVE-2023-47807 |
|
38.3th | 4.3 | This CVE describes a missing authorization vulnerability in the 10WebAnalytics WordPress plugin that | |
| 6498 | CVE-2022-41995 |
|
38.3th | 4.3 | This CVE describes a missing authorization vulnerability in the Gallery Images Ape WordPress plugin | |
| 6499 | CVE-2024-56255 |
|
38.3th | 4.3 | This CVE describes a Missing Authorization vulnerability in the AyeCode Connect WordPress plugin tha | |
| 6500 | CVE-2023-51300 |
|
38.3th | 6.1 | PHPJabbers Hotel Booking System v4.0 contains multiple cross-site scripting (XSS) vulnerabilities in |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free