Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
751 CVE-2023-46988
0.31%
54th 6.7 A path traversal vulnerability in ONLYOFFICE Document Server allows remote attackers to copy arbitra
752 CVE-2024-57439
0.31%
53.9th 4.9 This vulnerability in RuoYi v4.8.0 allows administrators to cause a Denial of Service (DoS) by dupli
753 CVE-2025-0476
0.31%
53.9th 4.3 Mattermost Mobile Apps versions up to 2.22.0 contain a vulnerability where specially crafted attachm
754 CVE-2024-58036
0.31%
53.8th 5.5 Net::Dropbox::API 1.9 and earlier for Perl uses non-cryptographically secure random number generatio
755 CVE-2024-50569
0.31%
53.7th 6.6 This OS command injection vulnerability in Fortinet FortiWeb allows attackers to execute arbitrary c
756 CVE-2025-31116
0.31%
53.8th 4.4 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Mobile Security Framework (
757 CVE-2025-2997
0.31%
53.7th 6.3 This critical vulnerability in Youkefu 4.2.0 allows remote attackers to perform server-side request
758 CVE-2025-31577
0.31%
53.7th 6.6 This vulnerability allows attackers to upload arbitrary files, including web shells, to Appointify W
759 CVE-2025-39538
0.31%
53.7th 6.6 This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se
760 CVE-2025-3587
0.31%
53.7th 6.3 This critical vulnerability in ZeroWdd/code-projects studentmanager 1.0 allows unauthorized access t
761 CVE-2025-3324
0.31%
53.7th 6.3 CVE-2025-3324 is a critical unrestricted file upload vulnerability in Nimrod 0.8's FileRestControlle
762 CVE-2024-32761
0.31%
53.7th 6.5 This CVE describes a data leak vulnerability in F5 BIG-IP Traffic Management Microkernels (TMMs) run
763 CVE-2025-22383
0.31%
53.6th 4.6 A cross-site scripting (XSS) vulnerability exists in Optimizely Configured Commerce's Contact Us fun
764 CVE-2025-21254
0.31%
53.7th 6.5 This vulnerability in Internet Connection Sharing (ICS) allows attackers to cause a denial of servic
765 CVE-2025-21212
0.31%
53.7th 6.5 This vulnerability in Internet Connection Sharing (ICS) allows attackers to cause a denial of servic
766 CVE-2024-6875
0.31%
53.6th 6.5 This vulnerability in Infinispan's REST compare API allows attackers to cause a buffer leak and out-
767 CVE-2025-29974
0.31%
53.7th 5.7 An integer underflow vulnerability in the Windows Kernel allows attackers on adjacent networks to re
768 CVE-2025-25740
0.31%
53.6th 5.5 This CVE describes a stack-based buffer overflow vulnerability in D-Link DIR-853 A1 routers via the
769 CVE-2024-50596
0.31%
53.6th 4.3 An integer underflow vulnerability in the HTTP server PUT request functionality of STMicroelectronic
770 CVE-2024-50594
0.31%
53.6th 4.3 An integer underflow vulnerability in STMicroelectronics X-CUBE-AZRTOS-WL HTTP server PUT request ha
771 CVE-2024-50384
0.31%
53.6th 6.5 A denial of service vulnerability in STMicroelectronics X-CUBE-AZRTOS-WL NetX Component HTTP server
772 CVE-2024-12041
0.31%
53.5th 5.3 This vulnerability allows unauthenticated attackers to access sensitive user information through the
773 CVE-2023-53157
0.31%
53.5th 5.3 The rosenpass crate for Rust versions before 0.2.1 contains a vulnerability where processing a speci
774 CVE-2025-1182
0.31%
53.4th 5.0 A critical memory corruption vulnerability in GNU Binutils' linker (ld) allows remote attackers to p
775 CVE-2025-49751
0.31%
53.3th 6.8 A missing synchronization vulnerability in Windows Hyper-V allows authenticated attackers on adjacen
776 CVE-2025-14087
0.31%
53.3th 5.6 A buffer-underflow vulnerability in GLib's GVariant parser allows remote attackers to cause heap cor
777 CVE-2025-46420
0.3%
53.2th 6.5 A memory leak vulnerability in libsoup's soup_header_parse_quality_list() function allows attackers
778 CVE-2025-29150
0.3%
53.3th 4.3 BlueCMS 1.6 contains an arbitrary file deletion vulnerability that allows attackers to delete files
779 CVE-2025-20088
0.3%
53.2th 6.5 Mattermost fails to properly validate post properties, allowing authenticated malicious users to cra
780 CVE-2025-21404
0.3%
53.1th 4.3 This vulnerability in Microsoft Edge allows attackers to spoof UI elements, potentially tricking use
781 CVE-2025-25065
0.3%
53.1th 5.3 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Zimbra Collaboration's RSS
782 CVE-2024-12020
0.3%
53.2th 6.1 This is a reflected cross-site scripting (XSS) vulnerability in LogicalDOC Enterprise's JSP files, a
783 CVE-2024-55597
0.3%
53.2th 5.5 This path traversal vulnerability in Fortinet FortiWeb web application firewalls allows attackers to
784 CVE-2024-41796
0.3%
53.1th 6.5 This vulnerability allows unauthenticated attackers to change the login password on SENTRON 7KT PAC1
785 CVE-2025-9603
0.3%
53.1th 6.3 This CVE describes a command injection vulnerability in Telesquare TLR-2005KSH routers version 1.2.4
786 CVE-2025-34504
0.3%
53.1th 6.1 KodExplorer 4.52 contains an open redirect vulnerability in the user login page. Attackers can manip
787 CVE-2025-20794
0.3%
53.2th 6.5 This vulnerability in MediaTek modems allows improper input validation to cause system crashes, lead
788 CVE-2025-3764
0.3%
53th 6.3 This critical vulnerability in SourceCodester Web-based Pharmacy Product Management System 1.0 allow
789 CVE-2025-5082
0.3%
53.1th 6.1 The WP Attachments WordPress plugin has a reflected cross-site scripting vulnerability in all versio
790 CVE-2025-9244
0.3%
53.1th 6.3 This CVE describes an OS command injection vulnerability in Linksys RE series range extenders. Attac
791 CVE-2024-12712
0.3%
52.9th 5.3 This vulnerability allows unauthenticated attackers to modify order statuses in WordPress sites usin
792 CVE-2025-39565
0.3%
52.9th 6.6 A PHP object injection vulnerability in Melapress Login Security WordPress plugin allows attackers t
793 CVE-2024-47261
0.3%
52.9th 4.3 This vulnerability allows attackers to upload files via the VAPIX API uploadoverlayimage.cgi endpoin
794 CVE-2025-20234
0.3%
52.9th 5.3 A memory overread vulnerability in ClamAV's Universal Disk Format (UDF) processing allows unauthenti
795 CVE-2025-11073
0.3%
52.9th 4.7 This vulnerability allows remote attackers to execute arbitrary commands on Keyfactor RG-EW5100BE de
796 CVE-2025-14891
0.3%
52.8th 6.4 This stored XSS vulnerability in the Customer Reviews for WooCommerce WordPress plugin allows attack
797 CVE-2024-54507
0.3%
52.8th 5.5 A type confusion vulnerability in Apple operating systems allows attackers with user privileges to r
798 CVE-2025-30692
0.3%
52.8th 6.5 This vulnerability in Oracle iSupplier Portal allows authenticated attackers with low privileges to
799 CVE-2025-5160
0.3%
52.8th 4.3 A path traversal vulnerability in H3C SecCenter SMP-E1114P02 allows attackers to access arbitrary fi
800 CVE-2025-2973
0.3%
52.7th 6.3 This critical vulnerability in College Management System 1.0 allows remote attackers to upload malic

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free