Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1551 CVE-2025-7084
0.36%
57.6th 8.8 A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attacke
1552 CVE-2023-53885
0.36%
57.7th 7.2 Webutler v3.2 contains an arbitrary file upload vulnerability that allows authenticated administrato
1553 CVE-2025-29907
0.36%
57.6th 7.5 CVE-2025-29907 is a denial-of-service vulnerability in jsPDF library where attackers can pass malici
1554 CVE-2025-32107
0.36%
57.6th 8.0 This CVE describes an OS command injection vulnerability in Deco BE65 Pro mesh Wi-Fi systems that al
1555 CVE-2025-21292
0.36%
57.5th 8.8 This vulnerability allows attackers to elevate privileges on Windows systems by exploiting the Windo
1556 CVE-2025-21171
0.36%
57.5th 7.5 This .NET vulnerability allows remote attackers to execute arbitrary code on affected systems by exp
1557 CVE-2025-27553
0.36%
57.5th 7.5 This CVE describes a path traversal vulnerability in Apache Commons VFS where encoded '..' sequences
1558 CVE-2025-11889
0.36%
57.5th 7.2 The AIO Forms WordPress plugin allows authenticated administrators to upload arbitrary files due to
1559 CVE-2025-11967
0.36%
57.5th 7.2 The Mail Mint WordPress plugin allows authenticated administrators to upload arbitrary files due to
1560 CVE-2025-29964
0.36%
57.5th 8.8 A heap-based buffer overflow vulnerability in Windows Media allows remote attackers to execute arbit
1561 CVE-2025-5952
0.36%
57.4th 7.3 This critical vulnerability in Zend.To allows remote attackers to execute arbitrary operating system
1562 CVE-2025-48392
0.36%
57.5th 7.5 This vulnerability in Apache IoTDB is an uncontrolled resource consumption issue (CWE-400) that coul
1563 CVE-2025-66211
0.36%
57.5th 8.8 Coolify versions before 4.0.0-beta.451 contain an authenticated command injection vulnerability in P
1564 CVE-2025-66210
0.36%
57.5th 8.8 CVE-2025-66210 is an authenticated command injection vulnerability in Coolify's Database Import func
1565 CVE-2025-21378
0.36%
57.4th 7.8 This vulnerability in Windows CSC (Client Side Caching) Service allows local attackers to escalate p
1566 CVE-2025-21304
0.36%
57.4th 7.8 This is a use-after-free vulnerability in Microsoft's Desktop Window Manager (DWM) Core Library that
1567 CVE-2025-21281
0.36%
57.4th 7.8 This vulnerability in Microsoft COM for Windows allows attackers to gain elevated privileges on affe
1568 CVE-2025-21271
0.36%
57.4th 7.8 This vulnerability in the Windows Cloud Files Mini Filter Driver allows attackers to gain SYSTEM-lev
1569 CVE-2025-31678
0.36%
57.4th 8.2 This CVE describes a Missing Authorization vulnerability in Drupal AI that allows attackers to acces
1570 CVE-2025-20236
0.36%
57.3th 8.8 A vulnerability in Cisco Webex App's URL parser allows unauthenticated remote attackers to trick use
1571 CVE-2025-37091
0.36%
57.4th 7.2 A command injection vulnerability in HPE StoreOnce Software allows remote attackers to execute arbit
1572 CVE-2025-60424
0.36%
57.3th 7.6 This vulnerability allows attackers to bypass two-factor authentication in Nagios Fusion by brute-fo
1573 CVE-2024-55656
0.36%
57.3th 8.8 An integer overflow vulnerability in RedisBloom's CMS.INITBYDIM command allows authenticated Redis c
1574 CVE-2024-13606
0.36%
57.3th 7.5 The JS Help Desk WordPress plugin exposes sensitive support ticket attachments to unauthenticated at
1575 CVE-2024-13568
0.36%
57.3th 7.5 The Fluent Support WordPress plugin exposes sensitive ticket attachments to unauthenticated attacker
1576 CVE-2025-6102
0.36%
57.3th 8.8 This critical vulnerability in Wifi-soft UniBox Controller allows remote attackers to execute arbitr
1577 CVE-2025-7145
0.36%
57.3th 7.2 CVE-2025-7145 is an OS command injection vulnerability in ThreatSonar Anti-Ransomware that allows re
1578 CVE-2025-24381
0.35%
57.2th 8.8 Dell Unity storage systems version 5.4 and earlier contain an open redirect vulnerability that allow
1579 CVE-2025-6887
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC5 routers allows remote attackers to
1580 CVE-2025-5798
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC8 routers allows remote attackers to
1581 CVE-2025-5794
0.35%
57.3th 8.8 A critical buffer overflow vulnerability in Tenda AC5 routers allows remote attackers to execute arb
1582 CVE-2025-7423
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t
1583 CVE-2025-7421
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t
1584 CVE-2025-7420
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t
1585 CVE-2025-7418
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t
1586 CVE-2025-7416
0.35%
57.3th 8.8 A critical stack-based buffer overflow vulnerability exists in Tenda O3V2 routers running firmware v
1587 CVE-2025-13156
0.35%
57.2th 8.8 The Vitepos WordPress plugin allows authenticated users with subscriber-level access or higher to up
1588 CVE-2025-12161
0.35%
57.2th 8.8 The Smart Auto Upload Images WordPress plugin allows authenticated attackers with Contributor-level
1589 CVE-2025-58078
0.35%
57.2th 7.5 An unauthenticated remote attacker can exploit a relative path traversal vulnerability in Productivi
1590 CVE-2025-57457
0.35%
57.1th 8.8 This CVE describes an OS command injection vulnerability in the Curo UC300 admin panel where local a
1591 CVE-2025-24438
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1592 CVE-2025-24417
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1593 CVE-2025-24416
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1594 CVE-2025-24415
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1595 CVE-2025-24414
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1596 CVE-2025-24413
0.35%
57.1th 8.7 A stored cross-site scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1597 CVE-2025-24412
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1598 CVE-2025-24410
0.35%
57.1th 8.7 A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers
1599 CVE-2023-51316
0.35%
57.1th 7.5 This vulnerability allows attackers to abuse the 'Forgot Password' feature in PHPJabbers Bus Reserva
1600 CVE-2023-51314
0.35%
57.1th 7.5 This vulnerability allows attackers to send excessive password reset and email change requests to le

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free