Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7151 | CVE-2025-41707 |
|
36.3th | 5.3 | This CVE describes a denial-of-service vulnerability in a websocket handler where an unauthenticated | |
| 7152 | CVE-2025-41706 |
|
36.3th | 5.3 | This CVE describes a denial-of-service vulnerability in a webserver where an unauthenticated remote | |
| 7153 | CVE-2025-35062 |
|
36.3th | 5.3 | Newforma Info Exchange (NIX) before version 2023.1 has a default configuration that allows anonymous | |
| 7154 | CVE-2025-43905 |
|
36.3th | 4.3 | This vulnerability allows low-privileged remote attackers to inject malicious arguments into command | |
| 7155 | CVE-2025-54153 |
|
36.3th | 8.8 | An SQL injection vulnerability in Qsync Central allows authenticated remote attackers to execute arb | |
| 7156 | CVE-2025-53595 |
|
36.3th | 8.8 | An SQL injection vulnerability in Qsync Central allows authenticated attackers to execute arbitrary | |
| 7157 | CVE-2025-52656 |
|
36.3th | 7.6 | CVE-2025-52656 is a mass assignment vulnerability in HCL MyXalytics 6.6 that allows attackers to mod | |
| 7158 | CVE-2024-56804 |
|
36.3th | 8.8 | This SQL injection vulnerability in QNAP Video Station allows authenticated attackers to execute arb | |
| 7159 | CVE-2025-62630 |
|
36.3th | 8.8 | This vulnerability allows attackers to upload malicious configuration files that bypass directory tr | |
| 7160 | CVE-2025-2296 |
|
36.3th | N/A | CVE-2025-2296 is an improper input validation vulnerability in EDK2 BIOS/UEFI firmware that allows l | |
| 7161 | CVE-2025-12386 |
|
36.3th | N/A | The Pix-Link LV-WR21Q access point has an authentication bypass vulnerability in its /goform/getHome | |
| 7162 | CVE-2024-13457 |
|
36.2th | 5.3 | The Event Tickets and Registration WordPress plugin has an Insecure Direct Object Reference vulnerab | |
| 7163 | CVE-2025-24530 |
|
36.2th | 6.4 | This is a cross-site scripting (XSS) vulnerability in phpMyAdmin's check tables feature. Attackers c | |
| 7164 | CVE-2023-37037 |
|
36.2th | 6.5 | This vulnerability allows network-adjacent attackers to crash the Mobile Management Entity (MME) in | |
| 7165 | CVE-2023-37033 |
|
36.2th | 6.5 | A null pointer dereference vulnerability in Magma's Mobile Management Entity (MME) allows network-ad | |
| 7166 | CVE-2023-37030 |
|
36.2th | 6.5 | A null pointer dereference vulnerability in Magma's Mobile Management Entity (MME) allows network-ad | |
| 7167 | CVE-2025-20630 |
|
36.2th | 6.5 | Mattermost Mobile versions up to 2.22.0 contain a type casting vulnerability where posts with attach | |
| 7168 | CVE-2024-13351 |
|
36.2th | 7.2 | This vulnerability allows authenticated WordPress users with contributor-level access or higher to i | |
| 7169 | CVE-2024-48886 |
|
36.2th | 9.0 | This vulnerability allows attackers to bypass weak authentication mechanisms in multiple Fortinet pr | |
| 7170 | CVE-2024-11497 |
|
36.1th | 8.8 | This vulnerability allows authenticated attackers to escalate privileges and gain root access on aff | |
| 7171 | CVE-2025-0336 |
|
36.2th | 6.3 | A critical SQL injection vulnerability in Codezips Project Management System 1.0 allows remote attac | |
| 7172 | CVE-2024-13104 |
|
36.2th | 5.3 | This vulnerability allows remote attackers to bypass authentication and access WiFi settings on affe | |
| 7173 | CVE-2025-0764 |
|
36.2th | 6.5 | The wpForo Forum WordPress plugin has an arbitrary file read vulnerability that allows authenticated | |
| 7174 | CVE-2025-26529 |
|
36.2th | 8.3 | This stored cross-site scripting (XSS) vulnerability in Moodle's site administration live log allows | |
| 7175 | CVE-2024-52902 |
|
36.2th | 8.8 | IBM Cognos Controller and IBM Controller client applications contain hard-coded database passwords i | |
| 7176 | CVE-2024-13691 |
|
36.2th | 6.5 | The Uncode WordPress theme has a vulnerability that allows authenticated attackers with Subscriber-l | |
| 7177 | CVE-2024-56132 |
|
36.2th | 8.4 | This CVE-2024-56132 is an OS command injection vulnerability in Progress LoadMaster that allows auth | |
| 7178 | CVE-2025-30353 |
|
36.2th | 8.6 | This vulnerability in Directus exposes sensitive data including environmental variables, API keys, a | |
| 7179 | CVE-2024-12295 |
|
36.1th | 8.8 | The BoomBox Theme Extensions WordPress plugin allows authenticated attackers with subscriber-level a | |
| 7180 | CVE-2024-13376 |
|
36.1th | 8.8 | The Industrial WordPress theme has a privilege escalation vulnerability that allows authenticated at | |
| 7181 | CVE-2025-27911 |
|
36.2th | 6.5 | This vulnerability in Datalust Seq allows attackers to bypass event body size limits by exploiting i | |
| 7182 | CVE-2025-24349 |
|
36.2th | 7.1 | This vulnerability allows authenticated low-privileged attackers to delete physical network interfac | |
| 7183 | CVE-2023-42404 |
|
36.2th | 4.9 | This vulnerability in OneVision Workspace allows attackers to execute arbitrary Java Expression Lang | |
| 7184 | CVE-2025-28354 |
|
36.2th | 6.5 | This vulnerability allows attackers to perform directory traversal attacks via crafted POST requests | |
| 7185 | CVE-2025-30690 |
|
36.2th | 7.2 | This vulnerability in Oracle Solaris 11's filesystem component allows a high-privileged attacker wit | |
| 7186 | CVE-2025-1500 |
|
36.1th | 5.5 | This vulnerability in IBM Maximo Application Suite 9.0 allows authenticated users to upload files wi | |
| 7187 | CVE-2025-6709 |
|
36.1th | 7.5 | MongoDB Server is vulnerable to denial of service when processing specific date values in JSON input | |
| 7188 | CVE-2025-20678 |
|
36.2th | 6.5 | This vulnerability in MediaTek's IMS service allows remote denial of service attacks when a user equ | |
| 7189 | CVE-2026-21531 |
|
36.2th | 9.8 | This critical vulnerability in Azure SDK allows remote code execution through deserialization of unt | |
| 7190 | CVE-2025-59474 |
|
36.2th | 5.3 | This vulnerability allows attackers without Overall/Read permission in Jenkins to list agent names t | |
| 7191 | CVE-2025-58162 |
|
36.2th | 6.5 | CVE-2025-58162 is an arbitrary file write vulnerability in MobSF version 4.4.0. Authenticated users | |
| 7192 | CVE-2025-57563 |
|
36.2th | 6.5 | This vulnerability allows unauthenticated attackers to read arbitrary files on systems running vulne | |
| 7193 | CVE-2025-36354 |
|
36.2th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary commands with limited privi | |
| 7194 | CVE-2025-15275 |
|
36.1th | 8.8 | A heap-based buffer overflow vulnerability in FontForge's SFD file parser allows remote attackers to | |
| 7195 | CVE-2025-67436 |
|
36.2th | 6.5 | CVE-2025-67436 is an authenticated remote code execution vulnerability in PluXml CMS 5.8.22. Attacke | |
| 7196 | CVE-2025-64447 |
|
36.2th | 8.1 | This vulnerability allows unauthenticated attackers to execute arbitrary operations on FortiWeb web | |
| 7197 | CVE-2025-64153 |
|
36.2th | 7.2 | This CVE describes an OS command injection vulnerability in Fortinet FortiExtender devices that allo | |
| 7198 | CVE-2025-26489 |
|
36.1th | 6.5 | This vulnerability allows remote authenticated users to send specially crafted XML payloads to the N | |
| 7199 | CVE-2026-20962 |
|
36.2th | 4.4 | This vulnerability involves uninitialized resource usage in Dynamic Root of Trust for Measurement (D | |
| 7200 | CVE-2024-57162 |
|
36th | 7.2 | Campcodes Cybercafe Management System v1.0 contains a SQL injection vulnerability in the view-user-d |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free