Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8051 CVE-2025-11651
0.14%
33.8th 8.8 This is a remote buffer overflow vulnerability in UTT 进取 518G routers that allows attackers to e
8052 CVE-2025-11528
0.14%
33.8th 8.8 This vulnerability in Tenda AC7 routers allows remote attackers to execute arbitrary code via a stac
8053 CVE-2025-11524
0.14%
33.8th 8.8 A stack-based buffer overflow vulnerability in Tenda AC7 routers allows remote attackers to execute
8054 CVE-2025-11387
0.14%
33.8th 8.8 A stack-based buffer overflow vulnerability exists in Tenda AC15 routers via the /goform/fast_settin
8055 CVE-2025-11386
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC15 routers via a sta
8056 CVE-2025-11356
0.14%
33.8th 8.8 A buffer overflow vulnerability in Tenda AC23 routers allows remote attackers to execute arbitrary c
8057 CVE-2025-11328
0.14%
33.8th 8.8 This vulnerability in Tenda AC18 routers allows remote attackers to execute arbitrary code via a sta
8058 CVE-2025-11326
0.14%
33.8th 8.8 This CVE describes a stack-based buffer overflow vulnerability in Tenda AC18 routers through manipul
8059 CVE-2025-11325
0.14%
33.8th 8.8 A stack-based buffer overflow vulnerability exists in Tenda AC18 routers via the /goform/fast_settin
8060 CVE-2025-11324
0.14%
33.8th 8.8 A stack-based buffer overflow vulnerability exists in Tenda AC18 routers via the /goform/setNotUpgra
8061 CVE-2025-11323
0.14%
33.8th 8.8 A buffer overflow vulnerability in the UTT 1250GW router's web interface allows remote attackers to
8062 CVE-2025-11305
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on UTT HiPER 840G routers throu
8063 CVE-2025-11299
0.14%
33.8th 8.8 A buffer overflow vulnerability in Belkin F9K1015 routers allows remote attackers to execute arbitra
8064 CVE-2025-11295
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Belkin F9K1015 routers via a
8065 CVE-2025-11293
0.14%
33.8th 8.8 A buffer overflow vulnerability in Belkin F9K1015 routers allows remote attackers to execute arbitra
8066 CVE-2025-65499
0.14%
33.9th 4.3 An array index error in OISM libcoap's TLS verification callback allows remote attackers to cause de
8067 CVE-2025-12438
0.14%
33.7th 8.8 This CVE describes a use-after-free vulnerability in the Ozone component of Google Chrome on Linux a
8068 CVE-2025-12437
0.14%
33.7th 7.5 This CVE describes a use-after-free vulnerability in Google Chrome's PageInfo component that could a
8069 CVE-2025-11756
0.14%
33.7th 8.8 A use-after-free vulnerability in Google Chrome's Safe Browsing feature allows attackers who have al
8070 CVE-2025-15092
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on UTT 进取 512W devices thro
8071 CVE-2025-15091
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on UTT 进取 512W devices thro
8072 CVE-2025-15090
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on affected UTT 进取 512W dev
8073 CVE-2025-15089
0.14%
33.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on UTT 进取 512W devices via
8074 CVE-2025-15047
0.14%
33.9th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by sendi
8075 CVE-2025-15046
0.14%
33.9th 9.8 This is a critical stack-based buffer overflow vulnerability in Tenda WH450 routers that allows remo
8076 CVE-2025-15045
0.14%
33.9th 9.8 A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execut
8077 CVE-2025-15044
0.14%
33.9th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by explo
8078 CVE-2025-15010
0.14%
33.9th 9.8 A stack-based buffer overflow vulnerability exists in Tenda WH450 routers version 1.0.0.18, specific
8079 CVE-2025-15007
0.14%
33.9th 9.8 A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execut
8080 CVE-2025-15006
0.14%
33.9th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by explo
8081 CVE-2025-14954
0.14%
33.9th 3.7 This vulnerability in Open5GS allows remote attackers to trigger reachable assertions in PFCP (Packe
8082 CVE-2025-14665
0.14%
33.9th 9.8 A remote stack-based buffer overflow vulnerability in Tenda WH450 routers allows attackers to execut
8083 CVE-2025-14044
0.14%
33.8th 8.1 The Visitor Logic Lite WordPress plugin up to version 1.0.3 contains a PHP object injection vulnerab
8084 CVE-2025-13638
0.14%
33.7th 8.8 This CVE describes a use-after-free vulnerability in Chrome's Media Stream component that could allo
8085 CVE-2025-13633
0.14%
33.7th 8.8 This is a use-after-free vulnerability in Google Chrome's Digital Credentials feature that allows he
8086 CVE-2025-63535
0.14%
33.9th 9.6 This SQL injection vulnerability in Blood Bank Management System 1.0 allows attackers to inject mali
8087 CVE-2025-63532
0.14%
33.9th 9.6 A SQL injection vulnerability in Blood Bank Management System 1.0 allows attackers to inject malicio
8088 CVE-2026-24009
0.14%
33.8th 8.1 This vulnerability allows remote code execution through malicious YAML input in docling-core library
8089 CVE-2025-65805
0.14%
33.9th 7.5 OpenAirInterface CN5G AMF versions up to v2.1.9 have a buffer overflow vulnerability when processing
8090 CVE-2024-11641
0.14%
33.7th 8.8 This CSRF vulnerability in the VikBooking WordPress plugin allows attackers to trick administrators
8091 CVE-2025-23195
0.14%
33.7th 7.5 An XML External Entity (XXE) vulnerability in Apache Ambari/Oozie allows attackers to inject malicio
8092 CVE-2024-50858
0.14%
33.7th 8.8 GestioIP v3.5.7 contains CSRF vulnerabilities in multiple endpoints that allow attackers to trick au
8093 CVE-2024-12202
0.14%
33.6th 8.8 The Croma Music WordPress plugin has a privilege escalation vulnerability that allows authenticated
8094 CVE-2024-45550
0.14%
33.7th 7.8 This vulnerability allows memory corruption through IOCTL calls to the MCDM driver, potentially lead
8095 CVE-2024-45546
0.14%
33.7th 7.8 This vulnerability allows memory corruption when processing FIPS encryption/decryption IOCTL calls f
8096 CVE-2024-45542
0.14%
33.7th 7.8 This vulnerability allows memory corruption when a user-space application makes a specific IOCTL cal
8097 CVE-2024-45541
0.14%
33.7th 7.8 This vulnerability allows user-space applications to trigger memory corruption through an IOCTL call
8098 CVE-2025-25204
0.14%
33.7th 6.3 A bug in GitHub's CLI tool `gh` causes the `gh attestation verify` command to incorrectly return a z
8099 CVE-2025-29980
0.14%
33.7th 9.8 A critical SQL injection vulnerability in eTRAKiT.net release 3.2.1.77 allows remote unauthenticated
8100 CVE-2024-7768
0.14%
33.6th 7.5 A denial-of-service vulnerability in h2o-3's ImportFiles endpoint allows attackers to recursively ca

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β€” making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free