Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8051 | CVE-2025-11651 |
|
33.8th | 8.8 | This is a remote buffer overflow vulnerability in UTT θΏε 518G routers that allows attackers to e | |
| 8052 | CVE-2025-11528 |
|
33.8th | 8.8 | This vulnerability in Tenda AC7 routers allows remote attackers to execute arbitrary code via a stac | |
| 8053 | CVE-2025-11524 |
|
33.8th | 8.8 | A stack-based buffer overflow vulnerability in Tenda AC7 routers allows remote attackers to execute | |
| 8054 | CVE-2025-11387 |
|
33.8th | 8.8 | A stack-based buffer overflow vulnerability exists in Tenda AC15 routers via the /goform/fast_settin | |
| 8055 | CVE-2025-11386 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC15 routers via a sta | |
| 8056 | CVE-2025-11356 |
|
33.8th | 8.8 | A buffer overflow vulnerability in Tenda AC23 routers allows remote attackers to execute arbitrary c | |
| 8057 | CVE-2025-11328 |
|
33.8th | 8.8 | This vulnerability in Tenda AC18 routers allows remote attackers to execute arbitrary code via a sta | |
| 8058 | CVE-2025-11326 |
|
33.8th | 8.8 | This CVE describes a stack-based buffer overflow vulnerability in Tenda AC18 routers through manipul | |
| 8059 | CVE-2025-11325 |
|
33.8th | 8.8 | A stack-based buffer overflow vulnerability exists in Tenda AC18 routers via the /goform/fast_settin | |
| 8060 | CVE-2025-11324 |
|
33.8th | 8.8 | A stack-based buffer overflow vulnerability exists in Tenda AC18 routers via the /goform/setNotUpgra | |
| 8061 | CVE-2025-11323 |
|
33.8th | 8.8 | A buffer overflow vulnerability in the UTT 1250GW router's web interface allows remote attackers to | |
| 8062 | CVE-2025-11305 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on UTT HiPER 840G routers throu | |
| 8063 | CVE-2025-11299 |
|
33.8th | 8.8 | A buffer overflow vulnerability in Belkin F9K1015 routers allows remote attackers to execute arbitra | |
| 8064 | CVE-2025-11295 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Belkin F9K1015 routers via a | |
| 8065 | CVE-2025-11293 |
|
33.8th | 8.8 | A buffer overflow vulnerability in Belkin F9K1015 routers allows remote attackers to execute arbitra | |
| 8066 | CVE-2025-65499 |
|
33.9th | 4.3 | An array index error in OISM libcoap's TLS verification callback allows remote attackers to cause de | |
| 8067 | CVE-2025-12438 |
|
33.7th | 8.8 | This CVE describes a use-after-free vulnerability in the Ozone component of Google Chrome on Linux a | |
| 8068 | CVE-2025-12437 |
|
33.7th | 7.5 | This CVE describes a use-after-free vulnerability in Google Chrome's PageInfo component that could a | |
| 8069 | CVE-2025-11756 |
|
33.7th | 8.8 | A use-after-free vulnerability in Google Chrome's Safe Browsing feature allows attackers who have al | |
| 8070 | CVE-2025-15092 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on UTT θΏε 512W devices thro | |
| 8071 | CVE-2025-15091 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on UTT θΏε 512W devices thro | |
| 8072 | CVE-2025-15090 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on affected UTT θΏε 512W dev | |
| 8073 | CVE-2025-15089 |
|
33.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on UTT θΏε 512W devices via | |
| 8074 | CVE-2025-15047 |
|
33.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by sendi | |
| 8075 | CVE-2025-15046 |
|
33.9th | 9.8 | This is a critical stack-based buffer overflow vulnerability in Tenda WH450 routers that allows remo | |
| 8076 | CVE-2025-15045 |
|
33.9th | 9.8 | A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execut | |
| 8077 | CVE-2025-15044 |
|
33.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by explo | |
| 8078 | CVE-2025-15010 |
|
33.9th | 9.8 | A stack-based buffer overflow vulnerability exists in Tenda WH450 routers version 1.0.0.18, specific | |
| 8079 | CVE-2025-15007 |
|
33.9th | 9.8 | A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execut | |
| 8080 | CVE-2025-15006 |
|
33.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by explo | |
| 8081 | CVE-2025-14954 |
|
33.9th | 3.7 | This vulnerability in Open5GS allows remote attackers to trigger reachable assertions in PFCP (Packe | |
| 8082 | CVE-2025-14665 |
|
33.9th | 9.8 | A remote stack-based buffer overflow vulnerability in Tenda WH450 routers allows attackers to execut | |
| 8083 | CVE-2025-14044 |
|
33.8th | 8.1 | The Visitor Logic Lite WordPress plugin up to version 1.0.3 contains a PHP object injection vulnerab | |
| 8084 | CVE-2025-13638 |
|
33.7th | 8.8 | This CVE describes a use-after-free vulnerability in Chrome's Media Stream component that could allo | |
| 8085 | CVE-2025-13633 |
|
33.7th | 8.8 | This is a use-after-free vulnerability in Google Chrome's Digital Credentials feature that allows he | |
| 8086 | CVE-2025-63535 |
|
33.9th | 9.6 | This SQL injection vulnerability in Blood Bank Management System 1.0 allows attackers to inject mali | |
| 8087 | CVE-2025-63532 |
|
33.9th | 9.6 | A SQL injection vulnerability in Blood Bank Management System 1.0 allows attackers to inject malicio | |
| 8088 | CVE-2026-24009 |
|
33.8th | 8.1 | This vulnerability allows remote code execution through malicious YAML input in docling-core library | |
| 8089 | CVE-2025-65805 |
|
33.9th | 7.5 | OpenAirInterface CN5G AMF versions up to v2.1.9 have a buffer overflow vulnerability when processing | |
| 8090 | CVE-2024-11641 |
|
33.7th | 8.8 | This CSRF vulnerability in the VikBooking WordPress plugin allows attackers to trick administrators | |
| 8091 | CVE-2025-23195 |
|
33.7th | 7.5 | An XML External Entity (XXE) vulnerability in Apache Ambari/Oozie allows attackers to inject malicio | |
| 8092 | CVE-2024-50858 |
|
33.7th | 8.8 | GestioIP v3.5.7 contains CSRF vulnerabilities in multiple endpoints that allow attackers to trick au | |
| 8093 | CVE-2024-12202 |
|
33.6th | 8.8 | The Croma Music WordPress plugin has a privilege escalation vulnerability that allows authenticated | |
| 8094 | CVE-2024-45550 |
|
33.7th | 7.8 | This vulnerability allows memory corruption through IOCTL calls to the MCDM driver, potentially lead | |
| 8095 | CVE-2024-45546 |
|
33.7th | 7.8 | This vulnerability allows memory corruption when processing FIPS encryption/decryption IOCTL calls f | |
| 8096 | CVE-2024-45542 |
|
33.7th | 7.8 | This vulnerability allows memory corruption when a user-space application makes a specific IOCTL cal | |
| 8097 | CVE-2024-45541 |
|
33.7th | 7.8 | This vulnerability allows user-space applications to trigger memory corruption through an IOCTL call | |
| 8098 | CVE-2025-25204 |
|
33.7th | 6.3 | A bug in GitHub's CLI tool `gh` causes the `gh attestation verify` command to incorrectly return a z | |
| 8099 | CVE-2025-29980 |
|
33.7th | 9.8 | A critical SQL injection vulnerability in eTRAKiT.net release 3.2.1.77 allows remote unauthenticated | |
| 8100 | CVE-2024-7768 |
|
33.6th | 7.5 | A denial-of-service vulnerability in h2o-3's ImportFiles endpoint allows attackers to recursively ca |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free