Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8301 CVE-2026-24407
0.13%
33th 7.1 CVE-2026-24407 is an undefined behavior vulnerability in iccDEV's icSigCalcOp() function that allows
8302 CVE-2025-46066
0.13%
33.1th 9.9 A privilege escalation vulnerability in Automai Director v.25.2.0 allows remote attackers to gain el
8303 CVE-2025-67070
0.13%
33th 8.2 This vulnerability allows unauthenticated attackers to bypass multi-factor authentication during pas
8304 CVE-2025-66786
0.13%
33th 7.5 OpenAirInterface CN5G AMF versions up to v2.0.1 contain a logical error in JSON request processing t
8305 CVE-2025-67269
0.13%
33.1th 7.5 An integer underflow vulnerability in gpsd's NAVCOM packet parser causes a denial of service conditi
8306 CVE-2025-14998
0.13%
33th 9.8 The Branda WordPress plugin has an authentication bypass vulnerability that allows unauthenticated a
8307 CVE-2026-1685
0.13%
33.1th 3.7 This vulnerability in D-Link DIR-823X routers allows attackers to bypass authentication attempt limi
8308 CVE-2024-57036
0.13%
32.9th 8.1 This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK A810R routers b
8309 CVE-2024-23106
0.13%
33th 8.1 This vulnerability allows unauthenticated attackers to perform brute force attacks against the Forti
8310 CVE-2023-47692
0.13%
32.9th 4.3 This CVE describes a Missing Authorization vulnerability in Flothemes Flo Forms WordPress plugin tha
8311 CVE-2023-46612
0.13%
32.9th 4.3 This CVE describes a Missing Authorization vulnerability in the codedrafty Mediabay WordPress plugin
8312 CVE-2023-45110
0.13%
32.9th 4.3 This CVE describes a missing authorization vulnerability in the Bold Timeline Lite WordPress plugin
8313 CVE-2025-0728
0.13%
32.9th 7.5 An integer underflow vulnerability in NetX HTTP server functionality of Eclipse ThreadX NetX Duo all
8314 CVE-2025-0727
0.13%
32.9th 7.5 An integer underflow vulnerability in NetX HTTP server functionality of Eclipse ThreadX NetX Duo all
8315 CVE-2025-0726
0.13%
32.9th 7.5 A denial-of-service vulnerability in Eclipse ThreadX NetX Duo's HTTP server allows attackers to exha
8316 CVE-2023-51327
0.13%
32.9th 6.5 This vulnerability allows attackers to send excessive password reset emails to legitimate users by e
8317 CVE-2024-56473
0.13%
32.9th 5.3 IBM Aspera Shares versions 1.9.0 through 1.10.0 PL6 improperly validate 'Client-IP' headers, allowin
8318 CVE-2025-0510
0.13%
32.9th 6.5 Thunderbird email client displays incorrect sender addresses when emails use invalid group name synt
8319 CVE-2024-49838
0.13%
32.9th 8.2 This vulnerability allows attackers to read sensitive memory contents when parsing malformed OCI (Or
8320 CVE-2025-25709
0.13%
33th 7.5 A privilege escalation vulnerability in dtp.ae tNexus Airport View v2.8 allows remote attackers to g
8321 CVE-2024-45651
0.13%
33th 6.3 IBM Sterling Connect:Direct Web Services versions 6.1.0, 6.2.0, and 6.3.0 fail to properly invalidat
8322 CVE-2025-22089
0.13%
33th 5.5 A Linux kernel vulnerability in the RDMA subsystem allows exposure of hardware counters to non-initi
8323 CVE-2025-30653
0.13%
32.9th 6.5 An expired pointer dereference vulnerability in Juniper's Routing Protocol Daemon (rpd) allows adjac
8324 CVE-2025-30648
0.13%
32.9th 7.4 An unauthenticated adjacent attacker can send a malformed DHCP packet to crash the Juniper DHCP daem
8325 CVE-2025-30646
0.13%
32.9th 6.5 A signed-to-unsigned conversion error in Juniper's Layer 2 Control Protocol daemon (l2cpd) allows an
8326 CVE-2025-2513
0.13%
32.9th 6.4 The Smart Icons For WordPress plugin versions up to 1.0.4 contain a stored cross-site scripting vuln
8327 CVE-2025-31751
0.13%
32.9th 6.5 A Cross-Site Request Forgery (CSRF) vulnerability in the Breaking News WP WordPress plugin allows at
8328 CVE-2025-1907
0.13%
32.9th 9.8 Instantel Micromate devices have an unauthenticated configuration port that allows attackers to exec
8329 CVE-2025-5277
0.13%
32.9th 9.6 CVE-2025-5277 is a command injection vulnerability in aws-mcp-server that allows attackers to execut
8330 CVE-2025-41653
0.13%
33th 7.5 An unauthenticated remote attacker can cause denial-of-service by sending specially crafted HTTP req
8331 CVE-2025-4843
0.13%
32.9th 8.8 A critical stack-based buffer overflow vulnerability in D-Link DCS-932L IP cameras allows remote att
8332 CVE-2025-4841
0.13%
32.9th 8.8 A critical stack-based buffer overflow vulnerability exists in D-Link DCS-932L IP cameras running fi
8333 CVE-2025-26262
0.13%
32.9th 6.5 This vulnerability in Linux Malware Detect (LMD) allows attackers to escalate privileges and execute
8334 CVE-2025-46337
0.13%
33th 10.0 This is a critical SQL injection vulnerability in ADOdb PHP database library affecting PostgreSQL co
8335 CVE-2025-6169
0.13%
32.9th 9.8 CVE-2025-6169 is a critical SQL injection vulnerability in HAMASTAR Technology's WIMP website co-con
8336 CVE-2025-4138
0.13%
33th 7.5 This vulnerability in Python's tarfile module allows attackers to bypass extraction filters, enablin
8337 CVE-2025-30751
0.13%
32.9th 8.8 This vulnerability in Oracle Database allows attackers with low privileges (Create Session and Creat
8338 CVE-2025-9132
0.13%
33th 8.8 This vulnerability allows remote attackers to execute arbitrary code or cause denial of service thro
8339 CVE-2025-11091
0.13%
32.9th 8.8 A buffer overflow vulnerability exists in Tenda AC21 routers through firmware version 16.03.08.16. A
8340 CVE-2025-7040
0.13%
32.9th 8.2 The Cloud SAML SSO WordPress plugin has a missing capability check that allows unauthenticated attac
8341 CVE-2025-12285
0.13%
32.9th 9.8 CVE-2025-12285 is a missing initial password change vulnerability affecting BLU-IC2 and BLU-IC4 devi
8342 CVE-2025-61935
0.13%
32.9th 7.5 This vulnerability allows attackers to cause denial of service by sending specific requests to BIG-I
8343 CVE-2025-60016
0.13%
32.9th 7.5 This vulnerability in F5 BIG-IP systems causes a denial of service when specific ECC Brainpool curve
8344 CVE-2025-59778
0.13%
32.9th 7.5 This vulnerability in F5OS-C partition control plane allows undisclosed traffic to cause multiple co
8345 CVE-2025-59478
0.13%
32.9th 7.5 A vulnerability in BIG-IP AFM DoS protection profiles allows specially crafted requests to crash the
8346 CVE-2025-58096
0.13%
32.9th 7.5 A configuration-specific vulnerability in F5 BIG-IP systems where setting the tm.tcpudptxchecksum da
8347 CVE-2025-55036
0.13%
32.9th 7.5 A memory corruption vulnerability in BIG-IP SSL Orchestrator's explicit forward proxy when proxy con
8348 CVE-2025-54854
0.13%
32.9th 7.5 This vulnerability allows attackers to cause denial of service by sending specific traffic to BIG-IP
8349 CVE-2025-54479
0.13%
32.9th 7.5 This vulnerability in F5 BIG-IP systems allows remote attackers to cause denial of service by sendin
8350 CVE-2025-53521
0.13%
32.9th 7.5 This vulnerability in BIG-IP APM allows undisclosed traffic to cause TMM (Traffic Management Microke

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free