Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1351 | CVE-2025-1864 |
|
49.1th | 9.8 | CVE-2025-1864 is a memory buffer overflow vulnerability in radare2, a reverse engineering framework. | |
| 1352 | CVE-2025-3810 |
|
49th | 9.8 | The WPBookit WordPress plugin has an authentication bypass vulnerability that allows unauthenticated | |
| 1353 | CVE-2024-46484 |
|
49.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDne | |
| 1354 | CVE-2025-0074 |
|
49.1th | 9.8 | This critical vulnerability in Android's Bluetooth stack allows remote attackers to execute arbitrar | |
| 1355 | CVE-2025-57631 |
|
49.1th | 9.8 | A critical SQL injection vulnerability in TDuckCloud v5.1 allows remote attackers to execute arbitra | |
| 1356 | CVE-2025-26966 |
|
48.8th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication in the PrivateContent W | |
| 1357 | CVE-2025-27595 |
|
48.9th | 9.8 | This vulnerability allows attackers to easily calculate matching passwords due to weak hashing algor | |
| 1358 | CVE-2025-61455 |
|
48.8th | 9.8 | CVE-2025-61455 is a critical SQL injection vulnerability in Bhabishya-123 E-commerce 1.0 that allows | |
| 1359 | CVE-2025-21619 |
|
48.7th | 9.8 | This SQL injection vulnerability in GLPI allows administrator users to execute arbitrary SQL command | |
| 1360 | CVE-2025-51630 |
|
48.7th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK N350RT routers by e | |
| 1361 | CVE-2025-59157 |
|
48.7th | 9.9 | CVE-2025-59157 is a command injection vulnerability in Coolify's Git Repository field during project | |
| 1362 | CVE-2025-25343 |
|
48.6th | 9.8 | CVE-2025-25343 is a critical buffer overflow vulnerability in Tenda AC6 router firmware that allows | |
| 1363 | CVE-2025-10492 |
|
48.6th | 9.8 | A Java deserialization vulnerability in Jaspersoft Library allows remote attackers to execute arbitr | |
| 1364 | CVE-2026-25893 |
|
48.6th | 9.8 | An authentication bypass vulnerability in FUXA web-based SCADA/HMI software allows unauthenticated r | |
| 1365 | CVE-2025-49838 |
|
48.5th | 9.8 | This vulnerability allows remote code execution through unsafe deserialization in GPT-SoVITS-WebUI. | |
| 1366 | CVE-2025-11693 |
|
48.6th | 9.8 | The Export WP Page to Static HTML & PDF WordPress plugin exposes authentication cookies in publicly | |
| 1367 | CVE-2024-58299 |
|
48.5th | 9.8 | PCMan FTP Server 2.0 contains a critical buffer overflow vulnerability in the 'pwd' command that all | |
| 1368 | CVE-2024-9070 |
|
48.4th | 9.8 | A deserialization vulnerability in BentoML's runner server allows attackers to execute arbitrary cod | |
| 1369 | CVE-2021-47854 |
|
48.3th | 9.8 | CVE-2021-47854 is a critical buffer overflow vulnerability in DD-WRT's UPnP service that allows remo | |
| 1370 | CVE-2026-1019 |
|
48.4th | 9.8 | The Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability | |
| 1371 | CVE-2021-47772 |
|
48.4th | 9.8 | CVE-2021-47772 is a critical buffer overflow vulnerability in 10-Strike Network Inventory Explorer P | |
| 1372 | CVE-2023-53926 |
|
48.3th | 9.8 | PHPJabbers Simple CMS 5.0 contains a SQL injection vulnerability in the 'column' parameter that allo | |
| 1373 | CVE-2025-25530 |
|
48.2th | 9.8 | A buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 allows attackers to cra | |
| 1374 | CVE-2025-31095 |
|
48.2th | 9.8 | CVE-2025-31095 is an authentication bypass vulnerability in the Material Dashboard WordPress plugin | |
| 1375 | CVE-2025-3918 |
|
48.2th | 9.8 | The Job Listings WordPress plugin versions 0.1 to 0.1.1 contain a privilege escalation vulnerability | |
| 1376 | CVE-2025-66219 |
|
48.2th | 9.8 | CVE-2025-66219 is a command injection vulnerability in willitmerge, a command-line tool for checking | |
| 1377 | CVE-2026-1331 |
|
48.2th | 9.8 | MeetingHub software from HAMASTAR Technology contains an unauthenticated arbitrary file upload vulne | |
| 1378 | CVE-2024-58309 |
|
48.1th | 9.8 | CVE-2024-58309 is an unauthenticated SQL injection vulnerability in xbtitFM 4.1.18 that allows remot | |
| 1379 | CVE-2022-50922 |
|
48.1th | 9.8 | Audio Conversion Wizard v2.01 contains a buffer overflow vulnerability that allows attackers to exec | |
| 1380 | CVE-2024-39802 |
|
48.1th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router | |
| 1381 | CVE-2024-39770 |
|
48.1th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router | |
| 1382 | CVE-2024-39768 |
|
48.1th | 9.1 | This CVE describes multiple buffer overflow vulnerabilities in the Wavlink AC3000 router's internet. | |
| 1383 | CVE-2025-1107 |
|
48.1th | 9.9 | CVE-2025-1107 is an unverified password change vulnerability in Janto software that allows unauthent | |
| 1384 | CVE-2025-15194 |
|
47.9th | 9.8 | A stack-based buffer overflow vulnerability in the hedwig.cgi HTTP header handler of D-Link DIR-600 | |
| 1385 | CVE-2022-44151 |
|
48th | 9.8 | CVE-2022-44151 is a critical SQL injection vulnerability in Simple Inventory Management System v1.0' | |
| 1386 | CVE-2024-45569 |
|
47.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code or cause denial of service by s | |
| 1387 | CVE-2025-45343 |
|
47.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda W18E routers by exploi | |
| 1388 | CVE-2025-8895 |
|
47.7th | 9.8 | The WP Webhooks WordPress plugin allows unauthenticated attackers to copy arbitrary files on the ser | |
| 1389 | CVE-2025-24285 |
|
47.8th | 9.8 | This CVE describes command injection vulnerabilities in UniFi Connect EV Station Lite that allow att | |
| 1390 | CVE-2024-5743 |
|
47.6th | 9.8 | This vulnerability in EveHome Eve Play allows attackers to exploit weak password hashing to execute | |
| 1391 | CVE-2025-34256 |
|
47.6th | 9.8 | This vulnerability allows remote unauthenticated attackers to forge JWT tokens using a hard-coded cr | |
| 1392 | CVE-2025-46001 |
|
47.6th | 9.8 | An arbitrary file upload vulnerability in Filemanager v2.3.0 allows attackers to upload malicious PH | |
| 1393 | CVE-2025-9762 |
|
47.6th | 9.8 | The Post By Email WordPress plugin allows unauthenticated attackers to upload arbitrary files due to | |
| 1394 | CVE-2025-11948 |
|
47.6th | 9.8 | CVE-2025-11948 is an unauthenticated arbitrary file upload vulnerability in Excellent Infotek's Docu | |
| 1395 | CVE-2025-12870 |
|
47.6th | 9.8 | CVE-2025-12870 is an authentication abuse vulnerability in a+HRD software developed by aEnrich that | |
| 1396 | CVE-2024-49655 |
|
47.5th | 9.3 | This SQL injection vulnerability in the ARPrice WordPress plugin allows attackers to execute arbitra | |
| 1397 | CVE-2024-56284 |
|
47.5th | 9.3 | This SQL injection vulnerability in SSL Wireless SMS Notification plugin allows attackers to execute | |
| 1398 | CVE-2025-62645 |
|
47.5th | 9.9 | This vulnerability allows remote authenticated attackers to obtain administrative tokens via a Graph | |
| 1399 | CVE-2025-44655 |
|
47.4th | 9.8 | This vulnerability in TOTOLink routers allows attackers to bypass FTP directory restrictions due to | |
| 1400 | CVE-2021-47900 |
|
47.4th | 9.8 | CVE-2021-47900 is a critical remote code execution vulnerability in Gila CMS that allows unauthentic |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free