Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1351 CVE-2025-1864
0.26%
49.1th 9.8 CVE-2025-1864 is a memory buffer overflow vulnerability in radare2, a reverse engineering framework.
1352 CVE-2025-3810
0.26%
49th 9.8 The WPBookit WordPress plugin has an authentication bypass vulnerability that allows unauthenticated
1353 CVE-2024-46484
0.26%
49.1th 9.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDne
1354 CVE-2025-0074
0.26%
49.1th 9.8 This critical vulnerability in Android's Bluetooth stack allows remote attackers to execute arbitrar
1355 CVE-2025-57631
0.26%
49.1th 9.8 A critical SQL injection vulnerability in TDuckCloud v5.1 allows remote attackers to execute arbitra
1356 CVE-2025-26966
0.26%
48.8th 9.8 This vulnerability allows unauthenticated attackers to bypass authentication in the PrivateContent W
1357 CVE-2025-27595
0.26%
48.9th 9.8 This vulnerability allows attackers to easily calculate matching passwords due to weak hashing algor
1358 CVE-2025-61455
0.26%
48.8th 9.8 CVE-2025-61455 is a critical SQL injection vulnerability in Bhabishya-123 E-commerce 1.0 that allows
1359 CVE-2025-21619
0.26%
48.7th 9.8 This SQL injection vulnerability in GLPI allows administrator users to execute arbitrary SQL command
1360 CVE-2025-51630
0.26%
48.7th 9.8 This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK N350RT routers by e
1361 CVE-2025-59157
0.26%
48.7th 9.9 CVE-2025-59157 is a command injection vulnerability in Coolify's Git Repository field during project
1362 CVE-2025-25343
0.26%
48.6th 9.8 CVE-2025-25343 is a critical buffer overflow vulnerability in Tenda AC6 router firmware that allows
1363 CVE-2025-10492
0.26%
48.6th 9.8 A Java deserialization vulnerability in Jaspersoft Library allows remote attackers to execute arbitr
1364 CVE-2026-25893
0.26%
48.6th 9.8 An authentication bypass vulnerability in FUXA web-based SCADA/HMI software allows unauthenticated r
1365 CVE-2025-49838
0.26%
48.5th 9.8 This vulnerability allows remote code execution through unsafe deserialization in GPT-SoVITS-WebUI.
1366 CVE-2025-11693
0.26%
48.6th 9.8 The Export WP Page to Static HTML & PDF WordPress plugin exposes authentication cookies in publicly
1367 CVE-2024-58299
0.26%
48.5th 9.8 PCMan FTP Server 2.0 contains a critical buffer overflow vulnerability in the 'pwd' command that all
1368 CVE-2024-9070
0.25%
48.4th 9.8 A deserialization vulnerability in BentoML's runner server allows attackers to execute arbitrary cod
1369 CVE-2021-47854
0.25%
48.3th 9.8 CVE-2021-47854 is a critical buffer overflow vulnerability in DD-WRT's UPnP service that allows remo
1370 CVE-2026-1019
0.25%
48.4th 9.8 The Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability
1371 CVE-2021-47772
0.25%
48.4th 9.8 CVE-2021-47772 is a critical buffer overflow vulnerability in 10-Strike Network Inventory Explorer P
1372 CVE-2023-53926
0.25%
48.3th 9.8 PHPJabbers Simple CMS 5.0 contains a SQL injection vulnerability in the 'column' parameter that allo
1373 CVE-2025-25530
0.25%
48.2th 9.8 A buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 allows attackers to cra
1374 CVE-2025-31095
0.25%
48.2th 9.8 CVE-2025-31095 is an authentication bypass vulnerability in the Material Dashboard WordPress plugin
1375 CVE-2025-3918
0.25%
48.2th 9.8 The Job Listings WordPress plugin versions 0.1 to 0.1.1 contain a privilege escalation vulnerability
1376 CVE-2025-66219
0.25%
48.2th 9.8 CVE-2025-66219 is a command injection vulnerability in willitmerge, a command-line tool for checking
1377 CVE-2026-1331
0.25%
48.2th 9.8 MeetingHub software from HAMASTAR Technology contains an unauthenticated arbitrary file upload vulne
1378 CVE-2024-58309
0.25%
48.1th 9.8 CVE-2024-58309 is an unauthenticated SQL injection vulnerability in xbtitFM 4.1.18 that allows remot
1379 CVE-2022-50922
0.25%
48.1th 9.8 Audio Conversion Wizard v2.01 contains a buffer overflow vulnerability that allows attackers to exec
1380 CVE-2024-39802
0.25%
48.1th 9.1 This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router
1381 CVE-2024-39770
0.25%
48.1th 9.1 This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router
1382 CVE-2024-39768
0.25%
48.1th 9.1 This CVE describes multiple buffer overflow vulnerabilities in the Wavlink AC3000 router's internet.
1383 CVE-2025-1107
0.25%
48.1th 9.9 CVE-2025-1107 is an unverified password change vulnerability in Janto software that allows unauthent
1384 CVE-2025-15194
0.25%
47.9th 9.8 A stack-based buffer overflow vulnerability in the hedwig.cgi HTTP header handler of D-Link DIR-600
1385 CVE-2022-44151
0.25%
48th 9.8 CVE-2022-44151 is a critical SQL injection vulnerability in Simple Inventory Management System v1.0'
1386 CVE-2024-45569
0.25%
47.9th 9.8 This vulnerability allows remote attackers to execute arbitrary code or cause denial of service by s
1387 CVE-2025-45343
0.25%
47.8th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda W18E routers by exploi
1388 CVE-2025-8895
0.25%
47.7th 9.8 The WP Webhooks WordPress plugin allows unauthenticated attackers to copy arbitrary files on the ser
1389 CVE-2025-24285
0.25%
47.8th 9.8 This CVE describes command injection vulnerabilities in UniFi Connect EV Station Lite that allow att
1390 CVE-2024-5743
0.25%
47.6th 9.8 This vulnerability in EveHome Eve Play allows attackers to exploit weak password hashing to execute
1391 CVE-2025-34256
0.25%
47.6th 9.8 This vulnerability allows remote unauthenticated attackers to forge JWT tokens using a hard-coded cr
1392 CVE-2025-46001
0.25%
47.6th 9.8 An arbitrary file upload vulnerability in Filemanager v2.3.0 allows attackers to upload malicious PH
1393 CVE-2025-9762
0.25%
47.6th 9.8 The Post By Email WordPress plugin allows unauthenticated attackers to upload arbitrary files due to
1394 CVE-2025-11948
0.25%
47.6th 9.8 CVE-2025-11948 is an unauthenticated arbitrary file upload vulnerability in Excellent Infotek's Docu
1395 CVE-2025-12870
0.25%
47.6th 9.8 CVE-2025-12870 is an authentication abuse vulnerability in a+HRD software developed by aEnrich that
1396 CVE-2024-49655
0.25%
47.5th 9.3 This SQL injection vulnerability in the ARPrice WordPress plugin allows attackers to execute arbitra
1397 CVE-2024-56284
0.25%
47.5th 9.3 This SQL injection vulnerability in SSL Wireless SMS Notification plugin allows attackers to execute
1398 CVE-2025-62645
0.25%
47.5th 9.9 This vulnerability allows remote authenticated attackers to obtain administrative tokens via a Graph
1399 CVE-2025-44655
0.24%
47.4th 9.8 This vulnerability in TOTOLink routers allows attackers to bypass FTP directory restrictions due to
1400 CVE-2021-47900
0.24%
47.4th 9.8 CVE-2021-47900 is a critical remote code execution vulnerability in Gila CMS that allows unauthentic

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free