Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1551 | CVE-2025-7084 |
|
57.6th | 8.8 | A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attacke | |
| 1552 | CVE-2023-53885 |
|
57.7th | 7.2 | Webutler v3.2 contains an arbitrary file upload vulnerability that allows authenticated administrato | |
| 1553 | CVE-2025-29907 |
|
57.6th | 7.5 | CVE-2025-29907 is a denial-of-service vulnerability in jsPDF library where attackers can pass malici | |
| 1554 | CVE-2025-32107 |
|
57.6th | 8.0 | This CVE describes an OS command injection vulnerability in Deco BE65 Pro mesh Wi-Fi systems that al | |
| 1555 | CVE-2025-21292 |
|
57.5th | 8.8 | This vulnerability allows attackers to elevate privileges on Windows systems by exploiting the Windo | |
| 1556 | CVE-2025-21171 |
|
57.5th | 7.5 | This .NET vulnerability allows remote attackers to execute arbitrary code on affected systems by exp | |
| 1557 | CVE-2025-27553 |
|
57.5th | 7.5 | This CVE describes a path traversal vulnerability in Apache Commons VFS where encoded '..' sequences | |
| 1558 | CVE-2025-11889 |
|
57.5th | 7.2 | The AIO Forms WordPress plugin allows authenticated administrators to upload arbitrary files due to | |
| 1559 | CVE-2025-11967 |
|
57.5th | 7.2 | The Mail Mint WordPress plugin allows authenticated administrators to upload arbitrary files due to | |
| 1560 | CVE-2025-29964 |
|
57.5th | 8.8 | A heap-based buffer overflow vulnerability in Windows Media allows remote attackers to execute arbit | |
| 1561 | CVE-2025-5952 |
|
57.4th | 7.3 | This critical vulnerability in Zend.To allows remote attackers to execute arbitrary operating system | |
| 1562 | CVE-2025-48392 |
|
57.5th | 7.5 | This vulnerability in Apache IoTDB is an uncontrolled resource consumption issue (CWE-400) that coul | |
| 1563 | CVE-2025-66211 |
|
57.5th | 8.8 | Coolify versions before 4.0.0-beta.451 contain an authenticated command injection vulnerability in P | |
| 1564 | CVE-2025-66210 |
|
57.5th | 8.8 | CVE-2025-66210 is an authenticated command injection vulnerability in Coolify's Database Import func | |
| 1565 | CVE-2025-21378 |
|
57.4th | 7.8 | This vulnerability in Windows CSC (Client Side Caching) Service allows local attackers to escalate p | |
| 1566 | CVE-2025-21304 |
|
57.4th | 7.8 | This is a use-after-free vulnerability in Microsoft's Desktop Window Manager (DWM) Core Library that | |
| 1567 | CVE-2025-21281 |
|
57.4th | 7.8 | This vulnerability in Microsoft COM for Windows allows attackers to gain elevated privileges on affe | |
| 1568 | CVE-2025-21271 |
|
57.4th | 7.8 | This vulnerability in the Windows Cloud Files Mini Filter Driver allows attackers to gain SYSTEM-lev | |
| 1569 | CVE-2025-31678 |
|
57.4th | 8.2 | This CVE describes a Missing Authorization vulnerability in Drupal AI that allows attackers to acces | |
| 1570 | CVE-2025-20236 |
|
57.3th | 8.8 | A vulnerability in Cisco Webex App's URL parser allows unauthenticated remote attackers to trick use | |
| 1571 | CVE-2025-37091 |
|
57.4th | 7.2 | A command injection vulnerability in HPE StoreOnce Software allows remote attackers to execute arbit | |
| 1572 | CVE-2025-60424 |
|
57.3th | 7.6 | This vulnerability allows attackers to bypass two-factor authentication in Nagios Fusion by brute-fo | |
| 1573 | CVE-2024-55656 |
|
57.3th | 8.8 | An integer overflow vulnerability in RedisBloom's CMS.INITBYDIM command allows authenticated Redis c | |
| 1574 | CVE-2024-13606 |
|
57.3th | 7.5 | The JS Help Desk WordPress plugin exposes sensitive support ticket attachments to unauthenticated at | |
| 1575 | CVE-2024-13568 |
|
57.3th | 7.5 | The Fluent Support WordPress plugin exposes sensitive ticket attachments to unauthenticated attacker | |
| 1576 | CVE-2025-6102 |
|
57.3th | 8.8 | This critical vulnerability in Wifi-soft UniBox Controller allows remote attackers to execute arbitr | |
| 1577 | CVE-2025-7145 |
|
57.3th | 7.2 | CVE-2025-7145 is an OS command injection vulnerability in ThreatSonar Anti-Ransomware that allows re | |
| 1578 | CVE-2025-24381 |
|
57.2th | 8.8 | Dell Unity storage systems version 5.4 and earlier contain an open redirect vulnerability that allow | |
| 1579 | CVE-2025-6887 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC5 routers allows remote attackers to | |
| 1580 | CVE-2025-5798 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC8 routers allows remote attackers to | |
| 1581 | CVE-2025-5794 |
|
57.3th | 8.8 | A critical buffer overflow vulnerability in Tenda AC5 routers allows remote attackers to execute arb | |
| 1582 | CVE-2025-7423 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t | |
| 1583 | CVE-2025-7421 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t | |
| 1584 | CVE-2025-7420 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t | |
| 1585 | CVE-2025-7418 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda O3V2 routers allows remote attackers t | |
| 1586 | CVE-2025-7416 |
|
57.3th | 8.8 | A critical stack-based buffer overflow vulnerability exists in Tenda O3V2 routers running firmware v | |
| 1587 | CVE-2025-13156 |
|
57.2th | 8.8 | The Vitepos WordPress plugin allows authenticated users with subscriber-level access or higher to up | |
| 1588 | CVE-2025-12161 |
|
57.2th | 8.8 | The Smart Auto Upload Images WordPress plugin allows authenticated attackers with Contributor-level | |
| 1589 | CVE-2025-58078 |
|
57.2th | 7.5 | An unauthenticated remote attacker can exploit a relative path traversal vulnerability in Productivi | |
| 1590 | CVE-2025-57457 |
|
57.1th | 8.8 | This CVE describes an OS command injection vulnerability in the Curo UC300 admin panel where local a | |
| 1591 | CVE-2025-24438 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1592 | CVE-2025-24417 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1593 | CVE-2025-24416 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1594 | CVE-2025-24415 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1595 | CVE-2025-24414 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1596 | CVE-2025-24413 |
|
57.1th | 8.7 | A stored cross-site scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1597 | CVE-2025-24412 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1598 | CVE-2025-24410 |
|
57.1th | 8.7 | A stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows low-privileged attackers | |
| 1599 | CVE-2023-51316 |
|
57.1th | 7.5 | This vulnerability allows attackers to abuse the 'Forgot Password' feature in PHPJabbers Bus Reserva | |
| 1600 | CVE-2023-51314 |
|
57.1th | 7.5 | This vulnerability allows attackers to send excessive password reset and email change requests to le |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free