Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
901 CVE-2025-14884
0.66%
70.5th 7.2 This CVE describes a command injection vulnerability in the firmware update service of D-Link DIR-60
902 CVE-2025-2270
0.65%
70.4th 8.1 This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the Cou
903 CVE-2025-29070
0.65%
70.4th 7.5 A heap buffer overflow vulnerability exists in the smooth2() function of lcms2-2.16's cmsgamma.c fil
904 CVE-2025-3029
0.65%
70.4th 7.3 This vulnerability allows attackers to craft URLs with specific Unicode characters that hide the tru
905 CVE-2024-13911
0.65%
70.4th 7.2 The Database Backup and check Tables Automated With Scheduler 2024 WordPress plugin exposes sensitiv
906 CVE-2025-24064
0.65%
70.4th 8.1 This is a use-after-free vulnerability in DNS Server that allows unauthorized attackers to execute a
907 CVE-2025-14174
0.65%
70.4th 8.8 KEV This vulnerability allows remote attackers to perform out-of-bounds memory access in ANGLE (Almost N
908 CVE-2024-55629
0.65%
70.4th 7.5 This vulnerability in Suricata allows attackers to evade detection by using TCP urgent data (out-of-
909 CVE-2025-29230
0.65%
70.3th 8.6 This CVE describes a command injection vulnerability in Linksys E5600 routers that allows attackers
910 CVE-2018-9373
0.65%
70.3th 8.8 CVE-2018-9373 is a critical vulnerability in MediaTek's WLAN driver that allows remote attackers to
911 CVE-2024-56883
0.65%
70.3th 8.1 Sage DPW versions before 2024_12_001 have an improper access control vulnerability where server-side
912 CVE-2024-50566
0.64%
70.2th 7.2 This CVE describes an OS command injection vulnerability in Fortinet FortiManager and FortiManager C
913 CVE-2025-30165
0.64%
70.2th 8.0 This vulnerability allows remote code execution in multi-node vLLM deployments using the V0 engine.
914 CVE-2025-27739
0.64%
70.1th 7.8 This Windows kernel vulnerability allows an authenticated attacker to exploit untrusted pointer dere
915 CVE-2025-27728
0.64%
70.1th 7.8 CVE-2025-27728 is an out-of-bounds read vulnerability in Windows Kernel-Mode Drivers that allows aut
916 CVE-2025-27490
0.64%
70.1th 7.8 A heap-based buffer overflow vulnerability in Windows Bluetooth Service allows authenticated attacke
917 CVE-2024-13690
0.64%
70.1th 7.2 The WP Church Donation plugin for WordPress has a stored cross-site scripting vulnerability that all
918 CVE-2025-26678
0.64%
70.1th 8.4 CVE-2025-26678 is an improper access control vulnerability in Windows Defender Application Control (
919 CVE-2025-29802
0.64%
70th 7.3 This vulnerability allows an authenticated attacker with local access to a system running Visual Stu
920 CVE-2025-27533
0.64%
70th 7.5 This vulnerability in Apache ActiveMQ allows attackers to cause denial of service by sending special
921 CVE-2025-29033
0.64%
70th 7.3 This vulnerability in BambooHR Build allows remote attackers to perform privilege escalation through
922 CVE-2025-6021
0.64%
70th 7.5 This CVE describes an integer overflow vulnerability in libxml2's xmlBuildQName function that can ca
923 CVE-2024-9439
0.64%
69.9th 8.8 SuperAGI's latest version contains a critical remote code execution vulnerability in the agent templ
924 CVE-2025-21402
0.64%
69.9th 7.8 This vulnerability in Microsoft Office OneNote allows remote attackers to execute arbitrary code on
925 CVE-2025-2773
0.64%
69.9th 7.2 This vulnerability allows authenticated remote attackers to execute arbitrary commands on BEC Techno
926 CVE-2025-25205
0.63%
69.9th 8.2 A vulnerability in Audiobookshelf versions 2.17.0 through 2.19.0 allows unauthenticated attackers to
927 CVE-2025-61920
0.63%
69.9th 7.5 This vulnerability in Authlib allows remote attackers to craft malicious JWT tokens with extremely l
928 CVE-2025-13661
0.63%
69.8th 7.1 CVE-2025-13661 is a path traversal vulnerability in Ivanti Endpoint Manager that allows authenticate
929 CVE-2025-2370
0.63%
69.8th 8.8 A critical stack-based buffer overflow vulnerability in TOTOLINK EX1800T WiFi extenders allows remot
930 CVE-2025-3820
0.63%
69.8th 8.8 A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote atta
931 CVE-2025-63655
0.63%
69.8th 7.5 This vulnerability allows attackers to crash Monkey web servers by sending specially crafted HTTP re
932 CVE-2024-13473
0.63%
69.7th 7.5 This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a
933 CVE-2022-50793
0.63%
69.7th 8.8 This vulnerability allows authenticated attackers to execute arbitrary system commands on SOUND4 IMP
934 CVE-2025-1565
0.63%
69.7th 7.5 The Mayosis Core WordPress plugin contains an arbitrary file read vulnerability in all versions up t
935 CVE-2025-3199
0.63%
69.7th 7.3 This CVE describes an improper authorization vulnerability in the ruoyi-ai software up to version 2.
936 CVE-2025-6685
0.63%
69.7th 8.8 This vulnerability allows authenticated remote attackers to escalate privileges on ATEN eco DC insta
937 CVE-2025-3802
0.62%
69.6th 8.8 A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote atta
938 CVE-2025-0255
0.62%
69.5th 7.2 CVE-2025-0255 is an OS command injection vulnerability in HCL DevOps Deploy/Launch that allows authe
939 CVE-2025-29795
0.62%
69.5th 7.8 This vulnerability in Microsoft Edge allows an authorized attacker to exploit improper link resoluti
940 CVE-2025-49141
0.62%
69.5th 8.5 CVE-2025-49141 is an OS command injection vulnerability in HAX CMS PHP's gitImportSite functionality
941 CVE-2025-0187
0.62%
69.4th 7.5 A Denial of Service vulnerability in gradio-app/gradio version 0.39.1 allows attackers to crash serv
942 CVE-2025-24306
0.62%
69.4th 7.2 This CVE describes an OS command injection vulnerability in +F FS010M devices that allows authentica
943 CVE-2025-21326
0.62%
69.4th 7.8 This CVE describes a remote code execution vulnerability in Internet Explorer that allows attackers
944 CVE-2025-0724
0.62%
69.4th 8.8 The ProfileGrid WordPress plugin is vulnerable to PHP object injection via deserialization of untrus
945 CVE-2025-60691
0.62%
69.4th 8.8 A stack-based buffer overflow vulnerability in Linksys E1200 v2 routers allows remote attackers to e
946 CVE-2025-60690
0.62%
69.4th 8.8 A stack-based buffer overflow vulnerability in Linksys E1200 v2 routers allows remote attackers to e
947 CVE-2024-9131
0.61%
69.3th 7.2 This CVE allows administrators to execute arbitrary commands through command injection in Arista pro
948 CVE-2024-57357
0.61%
69.3th 8.0 This vulnerability allows remote attackers to execute arbitrary code on TP-Link TL-WPA8630 powerline
949 CVE-2024-13723
0.61%
69.3th 7.2 CVE-2024-13723 is a remote code execution vulnerability in the NagVis component of Checkmk. Authenti
950 CVE-2024-58283
0.61%
69.3th 8.8 This vulnerability allows authenticated attackers to upload malicious PHP files through the Elfinder

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free