Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 751 | CVE-2023-46988 |
|
54th | 6.7 | A path traversal vulnerability in ONLYOFFICE Document Server allows remote attackers to copy arbitra | |
| 752 | CVE-2024-57439 |
|
53.9th | 4.9 | This vulnerability in RuoYi v4.8.0 allows administrators to cause a Denial of Service (DoS) by dupli | |
| 753 | CVE-2025-0476 |
|
53.9th | 4.3 | Mattermost Mobile Apps versions up to 2.22.0 contain a vulnerability where specially crafted attachm | |
| 754 | CVE-2024-58036 |
|
53.8th | 5.5 | Net::Dropbox::API 1.9 and earlier for Perl uses non-cryptographically secure random number generatio | |
| 755 | CVE-2024-50569 |
|
53.7th | 6.6 | This OS command injection vulnerability in Fortinet FortiWeb allows attackers to execute arbitrary c | |
| 756 | CVE-2025-31116 |
|
53.8th | 4.4 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Mobile Security Framework ( | |
| 757 | CVE-2025-2997 |
|
53.7th | 6.3 | This critical vulnerability in Youkefu 4.2.0 allows remote attackers to perform server-side request | |
| 758 | CVE-2025-31577 |
|
53.7th | 6.6 | This vulnerability allows attackers to upload arbitrary files, including web shells, to Appointify W | |
| 759 | CVE-2025-39538 |
|
53.7th | 6.6 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 760 | CVE-2025-3587 |
|
53.7th | 6.3 | This critical vulnerability in ZeroWdd/code-projects studentmanager 1.0 allows unauthorized access t | |
| 761 | CVE-2025-3324 |
|
53.7th | 6.3 | CVE-2025-3324 is a critical unrestricted file upload vulnerability in Nimrod 0.8's FileRestControlle | |
| 762 | CVE-2024-32761 |
|
53.7th | 6.5 | This CVE describes a data leak vulnerability in F5 BIG-IP Traffic Management Microkernels (TMMs) run | |
| 763 | CVE-2025-22383 |
|
53.6th | 4.6 | A cross-site scripting (XSS) vulnerability exists in Optimizely Configured Commerce's Contact Us fun | |
| 764 | CVE-2025-21254 |
|
53.7th | 6.5 | This vulnerability in Internet Connection Sharing (ICS) allows attackers to cause a denial of servic | |
| 765 | CVE-2025-21212 |
|
53.7th | 6.5 | This vulnerability in Internet Connection Sharing (ICS) allows attackers to cause a denial of servic | |
| 766 | CVE-2024-6875 |
|
53.6th | 6.5 | This vulnerability in Infinispan's REST compare API allows attackers to cause a buffer leak and out- | |
| 767 | CVE-2025-29974 |
|
53.7th | 5.7 | An integer underflow vulnerability in the Windows Kernel allows attackers on adjacent networks to re | |
| 768 | CVE-2025-25740 |
|
53.6th | 5.5 | This CVE describes a stack-based buffer overflow vulnerability in D-Link DIR-853 A1 routers via the | |
| 769 | CVE-2024-50596 |
|
53.6th | 4.3 | An integer underflow vulnerability in the HTTP server PUT request functionality of STMicroelectronic | |
| 770 | CVE-2024-50594 |
|
53.6th | 4.3 | An integer underflow vulnerability in STMicroelectronics X-CUBE-AZRTOS-WL HTTP server PUT request ha | |
| 771 | CVE-2024-50384 |
|
53.6th | 6.5 | A denial of service vulnerability in STMicroelectronics X-CUBE-AZRTOS-WL NetX Component HTTP server | |
| 772 | CVE-2024-12041 |
|
53.5th | 5.3 | This vulnerability allows unauthenticated attackers to access sensitive user information through the | |
| 773 | CVE-2023-53157 |
|
53.5th | 5.3 | The rosenpass crate for Rust versions before 0.2.1 contains a vulnerability where processing a speci | |
| 774 | CVE-2025-1182 |
|
53.4th | 5.0 | A critical memory corruption vulnerability in GNU Binutils' linker (ld) allows remote attackers to p | |
| 775 | CVE-2025-49751 |
|
53.3th | 6.8 | A missing synchronization vulnerability in Windows Hyper-V allows authenticated attackers on adjacen | |
| 776 | CVE-2025-14087 |
|
53.3th | 5.6 | A buffer-underflow vulnerability in GLib's GVariant parser allows remote attackers to cause heap cor | |
| 777 | CVE-2025-46420 |
|
53.2th | 6.5 | A memory leak vulnerability in libsoup's soup_header_parse_quality_list() function allows attackers | |
| 778 | CVE-2025-29150 |
|
53.3th | 4.3 | BlueCMS 1.6 contains an arbitrary file deletion vulnerability that allows attackers to delete files | |
| 779 | CVE-2025-20088 |
|
53.2th | 6.5 | Mattermost fails to properly validate post properties, allowing authenticated malicious users to cra | |
| 780 | CVE-2025-21404 |
|
53.1th | 4.3 | This vulnerability in Microsoft Edge allows attackers to spoof UI elements, potentially tricking use | |
| 781 | CVE-2025-25065 |
|
53.1th | 5.3 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Zimbra Collaboration's RSS | |
| 782 | CVE-2024-12020 |
|
53.2th | 6.1 | This is a reflected cross-site scripting (XSS) vulnerability in LogicalDOC Enterprise's JSP files, a | |
| 783 | CVE-2024-55597 |
|
53.2th | 5.5 | This path traversal vulnerability in Fortinet FortiWeb web application firewalls allows attackers to | |
| 784 | CVE-2024-41796 |
|
53.1th | 6.5 | This vulnerability allows unauthenticated attackers to change the login password on SENTRON 7KT PAC1 | |
| 785 | CVE-2025-9603 |
|
53.1th | 6.3 | This CVE describes a command injection vulnerability in Telesquare TLR-2005KSH routers version 1.2.4 | |
| 786 | CVE-2025-34504 |
|
53.1th | 6.1 | KodExplorer 4.52 contains an open redirect vulnerability in the user login page. Attackers can manip | |
| 787 | CVE-2025-20794 |
|
53.2th | 6.5 | This vulnerability in MediaTek modems allows improper input validation to cause system crashes, lead | |
| 788 | CVE-2025-3764 |
|
53th | 6.3 | This critical vulnerability in SourceCodester Web-based Pharmacy Product Management System 1.0 allow | |
| 789 | CVE-2025-5082 |
|
53.1th | 6.1 | The WP Attachments WordPress plugin has a reflected cross-site scripting vulnerability in all versio | |
| 790 | CVE-2025-9244 |
|
53.1th | 6.3 | This CVE describes an OS command injection vulnerability in Linksys RE series range extenders. Attac | |
| 791 | CVE-2024-12712 |
|
52.9th | 5.3 | This vulnerability allows unauthenticated attackers to modify order statuses in WordPress sites usin | |
| 792 | CVE-2025-39565 |
|
52.9th | 6.6 | A PHP object injection vulnerability in Melapress Login Security WordPress plugin allows attackers t | |
| 793 | CVE-2024-47261 |
|
52.9th | 4.3 | This vulnerability allows attackers to upload files via the VAPIX API uploadoverlayimage.cgi endpoin | |
| 794 | CVE-2025-20234 |
|
52.9th | 5.3 | A memory overread vulnerability in ClamAV's Universal Disk Format (UDF) processing allows unauthenti | |
| 795 | CVE-2025-11073 |
|
52.9th | 4.7 | This vulnerability allows remote attackers to execute arbitrary commands on Keyfactor RG-EW5100BE de | |
| 796 | CVE-2025-14891 |
|
52.8th | 6.4 | This stored XSS vulnerability in the Customer Reviews for WooCommerce WordPress plugin allows attack | |
| 797 | CVE-2024-54507 |
|
52.8th | 5.5 | A type confusion vulnerability in Apple operating systems allows attackers with user privileges to r | |
| 798 | CVE-2025-30692 |
|
52.8th | 6.5 | This vulnerability in Oracle iSupplier Portal allows authenticated attackers with low privileges to | |
| 799 | CVE-2025-5160 |
|
52.8th | 4.3 | A path traversal vulnerability in H3C SecCenter SMP-E1114P02 allows attackers to access arbitrary fi | |
| 800 | CVE-2025-2973 |
|
52.7th | 6.3 | This critical vulnerability in College Management System 1.0 allows remote attackers to upload malic |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free