Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1451 | CVE-2025-27428 |
|
59.3th | 7.7 | This directory traversal vulnerability in SAP Solution Manager allows authorized attackers to read f | |
| 1452 | CVE-2025-27829 |
|
59.3th | 7.3 | A vulnerability in Stormshield Network Security (SNS) firewalls allows attackers to disrupt multicas | |
| 1453 | CVE-2025-34322 |
|
59.3th | 7.2 | Nagios Log Server versions before 2026R1.0.1 contain an authenticated command injection vulnerabilit | |
| 1454 | CVE-2025-5527 |
|
59.2th | 8.8 | This critical vulnerability in Tenda RX3 routers allows remote attackers to execute arbitrary code v | |
| 1455 | CVE-2025-21611 |
|
59.2th | 8.8 | tgstation-server versions before 6.12.3 have an authorization bypass vulnerability where role permis | |
| 1456 | CVE-2024-6851 |
|
59.2th | 7.5 | This vulnerability allows arbitrary file deletion on systems running the aim tracking server. An att | |
| 1457 | CVE-2025-31175 |
|
59.1th | 8.4 | A deserialization mismatch vulnerability in the DSoftBus module allows attackers to manipulate seria | |
| 1458 | CVE-2025-4102 |
|
59.2th | 7.2 | The Beaver Builder Plugin (Starter Version) for WordPress has a vulnerability allowing authenticated | |
| 1459 | CVE-2025-6086 |
|
59.2th | 7.2 | The CSV Me WordPress plugin allows authenticated attackers with Administrator privileges to upload a | |
| 1460 | CVE-2025-3234 |
|
59.2th | 7.2 | The File Manager Pro – Filester WordPress plugin allows authenticated attackers with Administrator | |
| 1461 | CVE-2025-57403 |
|
59.2th | 7.5 | Cola Dnslog v1.3.2 has a directory traversal vulnerability in TXT record processing that allows atta | |
| 1462 | CVE-2025-21235 |
|
59.1th | 7.8 | This vulnerability in Windows PrintWorkflowUserSvc allows attackers to elevate privileges from a sta | |
| 1463 | CVE-2025-21234 |
|
59.1th | 7.8 | This vulnerability allows attackers to elevate privileges on Windows systems by exploiting the Print | |
| 1464 | CVE-2025-26413 |
|
59th | 7.5 | An improper input validation vulnerability in Apache Kvrocks allows attackers to crash the server by | |
| 1465 | CVE-2025-7910 |
|
59th | 8.8 | A critical stack-based buffer overflow vulnerability in D-Link DIR-513 routers allows remote attacke | |
| 1466 | CVE-2025-31717 |
|
59th | 7.5 | This vulnerability in modem firmware allows remote attackers to cause a system crash through imprope | |
| 1467 | CVE-2025-11287 |
|
59th | 7.3 | CVE-2025-11287 is an authentication bypass vulnerability in samanhappy MCPHub's SSE service that all | |
| 1468 | CVE-2025-24137 |
|
59th | 8.0 | This CVE describes a type confusion vulnerability in Apple operating systems that could allow a remo | |
| 1469 | CVE-2025-24061 |
|
59th | 7.8 | This vulnerability allows local attackers to bypass Windows Mark of the Web (MOTW) security protecti | |
| 1470 | CVE-2025-7645 |
|
58.9th | 8.1 | The Extensions For CF7 WordPress plugin has an arbitrary file deletion vulnerability that allows una | |
| 1471 | CVE-2025-1930 |
|
58.9th | 8.8 | A use-after-free vulnerability in Firefox and Thunderbird on Windows allows a compromised content pr | |
| 1472 | CVE-2025-30724 |
|
58.9th | 7.5 | An unauthenticated vulnerability in Oracle BI Publisher's XML Services allows remote attackers to ac | |
| 1473 | CVE-2025-4413 |
|
58.9th | 8.8 | The Pixabay Images WordPress plugin allows authenticated attackers with Author-level access or highe | |
| 1474 | CVE-2025-12903 |
|
58.9th | 7.5 | This vulnerability allows unauthenticated attackers to bypass authorization and retrieve payment met | |
| 1475 | CVE-2025-32034 |
|
58.8th | 7.5 | A denial-of-service vulnerability in Apollo Router Core allows attackers to craft GraphQL queries wi | |
| 1476 | CVE-2025-32032 |
|
58.8th | 7.5 | A denial-of-service vulnerability in Apollo Router allows attackers to craft GraphQL queries with de | |
| 1477 | CVE-2025-4354 |
|
58.8th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda DAP-1520 routers allows remote attacke | |
| 1478 | CVE-2025-49083 |
|
58.8th | 7.2 | CVE-2025-49083 is a deserialization vulnerability in Absolute Secure Access management console that | |
| 1479 | CVE-2025-63951 |
|
58.7th | 7.5 | This CVE describes an insecure deserialization vulnerability in the MiczFlor RPi-Jukebox-RFID projec | |
| 1480 | CVE-2025-63950 |
|
58.7th | 7.5 | An insecure deserialization vulnerability in Twittodon's download.php script allows remote, unauthen | |
| 1481 | CVE-2025-15502 |
|
58.6th | 7.3 | This CVE describes a remote command injection vulnerability in Sangfor Operation and Maintenance Man | |
| 1482 | CVE-2025-1039 |
|
58.6th | 7.2 | The Lenix Elementor Leads addon plugin for WordPress has a stored XSS vulnerability in URL form fiel | |
| 1483 | CVE-2024-54291 |
|
58.6th | 8.6 | This path traversal vulnerability in the PluginPass WordPress plugin allows attackers to manipulate | |
| 1484 | CVE-2024-11283 |
|
58.6th | 7.5 | The WP JobHunt plugin for WordPress has an authentication bypass vulnerability that allows unauthent | |
| 1485 | CVE-2025-24056 |
|
58.6th | 8.8 | A heap-based buffer overflow vulnerability in Windows Telephony Server allows remote attackers to ex | |
| 1486 | CVE-2025-32633 |
|
58.6th | 8.6 | This path traversal vulnerability in the neoslab Database Toolset WordPress plugin allows attackers | |
| 1487 | CVE-2025-32631 |
|
58.6th | 8.6 | This path traversal vulnerability in Oxygen MyData for WooCommerce allows attackers to delete arbitr | |
| 1488 | CVE-2025-1932 |
|
58.6th | 8.1 | A memory corruption vulnerability in Firefox and Thunderbird's XSLT processor could allow attackers | |
| 1489 | CVE-2025-4139 |
|
58.5th | 8.8 | A critical buffer overflow vulnerability in Netgear EX6120's fwAcosCgiInbound function allows remote | |
| 1490 | CVE-2025-5619 |
|
58.5th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda CH22 routers allows remote attackers t | |
| 1491 | CVE-2025-29523 |
|
58.5th | 7.2 | This CVE describes a command injection vulnerability in D-Link DSL-7740C routers that allows attacke | |
| 1492 | CVE-2024-9132 |
|
58.4th | 8.1 | This vulnerability allows administrators to configure insecure captive portal scripts in Arista EOS | |
| 1493 | CVE-2025-0999 |
|
58.5th | 8.8 | A heap buffer overflow vulnerability in Chrome's V8 JavaScript engine allows remote attackers to pot | |
| 1494 | CVE-2024-13567 |
|
58.4th | 7.5 | This vulnerability allows unauthenticated attackers to access sensitive files stored in the Awesome | |
| 1495 | CVE-2025-1403 |
|
58.4th | 8.6 | This vulnerability allows remote attackers to cause denial of service by sending maliciously crafted | |
| 1496 | CVE-2025-7806 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 1497 | CVE-2025-7805 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 1498 | CVE-2025-7794 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 1499 | CVE-2025-7792 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers | |
| 1500 | CVE-2025-7549 |
|
58.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free