Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1851 | CVE-2024-57030 |
|
71.5th | 8.1 | Wegia versions below 3.2.0 contain a cross-site scripting vulnerability in the employee documents pa | |
| 1852 | CVE-2025-26320 |
|
71.6th | 6.5 | CVE-2025-26320 is an OS command injection vulnerability in t0mer BroadlinkManager v5.9.1 that allows | |
| 1853 | CVE-2022-50789 |
|
71.5th | 7.8 | This is a command injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco systems up to version 2.x | |
| 1854 | CVE-2025-2959 |
|
71.5th | 6.5 | This vulnerability in TRENDnet TEW-410APB wireless access points allows local network attackers to c | |
| 1855 | CVE-2024-13946 |
|
71.5th | 6.8 | This vulnerability allows attackers to execute arbitrary code by planting malicious DLL files that t | |
| 1856 | CVE-2025-30452 |
|
71.5th | 9.8 | This CVE describes a critical input validation vulnerability in macOS that could allow attackers to | |
| 1857 | CVE-2025-30424 |
|
71.5th | 9.8 | A data exposure vulnerability in macOS Messages allows user contact information to leak into system | |
| 1858 | CVE-2025-24273 |
|
71.5th | 9.8 | This CVE describes a critical out-of-bounds write vulnerability in macOS kernel memory that allows a | |
| 1859 | CVE-2025-24265 |
|
71.5th | 9.8 | This CVE describes an out-of-bounds read vulnerability in macOS that could allow a malicious applica | |
| 1860 | CVE-2025-24256 |
|
71.5th | 9.8 | This is a macOS kernel memory disclosure vulnerability caused by insufficient bounds checking. An ap | |
| 1861 | CVE-2025-24253 |
|
71.5th | 9.8 | A macOS vulnerability allows malicious applications to bypass symlink protections and access protect | |
| 1862 | CVE-2025-24247 |
|
71.5th | 9.8 | A type confusion vulnerability in macOS allows attackers to cause unexpected application termination | |
| 1863 | CVE-2025-24232 |
|
71.5th | 9.8 | A state management vulnerability in macOS allows malicious applications to bypass file access restri | |
| 1864 | CVE-2025-24356 |
|
71.5th | 7.5 | CVE-2025-24356 is a UDP amplification vulnerability in fastd VPN daemon that allows attackers to spo | |
| 1865 | CVE-2024-11582 |
|
71.5th | 7.2 | The Subscribe2 WordPress plugin has a stored XSS vulnerability in all versions up to 10.43. Unauthen | |
| 1866 | CVE-2025-29457 |
|
71.5th | 7.6 | This vulnerability in MyBB 1.8.38 allows remote attackers to obtain sensitive information through th | |
| 1867 | CVE-2025-3053 |
|
71.5th | 8.8 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex | |
| 1868 | CVE-2025-30387 |
|
71.4th | 9.8 | This path traversal vulnerability in Azure allows unauthorized attackers to access restricted direct | |
| 1869 | CVE-2025-9784 |
|
71.4th | 7.5 | This vulnerability in Undertow allows malicious clients to send malformed requests that trigger serv | |
| 1870 | CVE-2024-45421 |
|
71.4th | 8.5 | A buffer overflow vulnerability in some Zoom Apps allows authenticated users to escalate privileges | |
| 1871 | CVE-2024-8684 |
|
71.4th | 8.3 | This CVE describes an OS command injection vulnerability in Revolution Pi devices that allows authen | |
| 1872 | CVE-2024-12909 |
|
71.4th | 9.8 | This SQL injection vulnerability in the FinanceChatLlamaPack allows attackers to execute arbitrary S | |
| 1873 | CVE-2024-38392 |
|
71.4th | 9.1 | This vulnerability in Pexip Infinity Connect allows remote attackers to execute arbitrary code by ex | |
| 1874 | CVE-2025-28384 |
|
71.4th | 9.1 | This directory traversal vulnerability in OpenC3 COSMOS allows attackers to access files outside the | |
| 1875 | CVE-2025-56427 |
|
71.4th | 7.5 | A directory traversal vulnerability in ComposioHQ v0.7.20 allows remote attackers to access sensitiv | |
| 1876 | CVE-2025-34274 |
|
71.4th | 9.8 | Nagios Log Server versions before 2024R2.0.3 run the embedded Logstash process with root privileges, | |
| 1877 | CVE-2024-14008 |
|
71.4th | 7.2 | Nagios XI versions before 2024R1.3.2 contain a remote command execution vulnerability in the WinRM C | |
| 1878 | CVE-2025-1539 |
|
71.4th | 8.8 | A critical stack-based buffer overflow vulnerability exists in D-Link DAP-1320 firmware version 1.00 | |
| 1879 | CVE-2025-5441 |
|
71.4th | 6.3 | This critical vulnerability in Linksys WiFi range extenders allows remote attackers to execute arbit | |
| 1880 | CVE-2025-34267 |
|
71.4th | 9.9 | Flowise versions 3.0.1 through 3.0.7 and all later versions with 'ALLOW_BUILTIN_DEP' enabled contain | |
| 1881 | CVE-2025-29461 |
|
71.3th | 7.6 | This vulnerability in a-blogcms 3.1.15 allows remote attackers to access sensitive information throu | |
| 1882 | CVE-2025-29459 |
|
71.3th | 7.6 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in MyBB 1.8.38's Mail function | |
| 1883 | CVE-2025-29451 |
|
71.3th | 7.6 | This vulnerability in Seo Panel 4.11.0 allows remote attackers to access sensitive information throu | |
| 1884 | CVE-2025-29394 |
|
71.3th | 8.1 | An insecure file upload vulnerability in Verydows v2.0 allows remote attackers to upload malicious f | |
| 1885 | CVE-2025-3714 |
|
71.4th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary code on LCD | |
| 1886 | CVE-2025-3710 |
|
71.4th | 9.8 | CVE-2025-3710 is a critical stack-based buffer overflow vulnerability in LCD KVM over IP Switch CL57 | |
| 1887 | CVE-2020-36863 |
|
71.3th | 8.8 | This vulnerability allows authenticated attackers to upload PHP files to Nagios XI's Audio Import di | |
| 1888 | CVE-2025-31182 |
|
71.3th | 9.8 | This vulnerability allows malicious applications to delete files they shouldn't have permission to a | |
| 1889 | CVE-2025-63651 |
|
71.3th | 7.5 | A use-after-free vulnerability in Monkey web server's string handling function allows attackers to c | |
| 1890 | CVE-2025-63650 |
|
71.3th | 7.5 | An out-of-bounds read vulnerability in Monkey web server's memory handling allows attackers to cause | |
| 1891 | CVE-2025-29820 |
|
71.3th | 7.8 | A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o | |
| 1892 | CVE-2024-50630 |
|
71.3th | 7.5 | This vulnerability allows remote attackers to obtain administrator credentials in Synology Drive Ser | |
| 1893 | CVE-2025-25997 |
|
71.2th | 7.5 | CVE-2025-25997 is a directory traversal vulnerability in FeMiner wms v1.0 that allows remote attacke | |
| 1894 | CVE-2025-7359 |
|
71.2th | 8.2 | The Counter live visitors for WooCommerce WordPress plugin has an arbitrary file deletion vulnerabil | |
| 1895 | CVE-2024-39288 |
|
71.2th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router | |
| 1896 | CVE-2024-37357 |
|
71.2th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router | |
| 1897 | CVE-2025-22130 |
|
71.2th | 8.8 | CVE-2025-22130 is a path traversal vulnerability in Soft Serve Git server that allows non-admin user | |
| 1898 | CVE-2026-0779 |
|
71.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 1899 | CVE-2025-2266 |
|
71.1th | 9.8 | This vulnerability allows unauthenticated attackers to modify WordPress site options via the Checkou | |
| 1900 | CVE-2026-0793 |
|
71.1th | 9.8 | CVE-2026-0793 is a heap-based buffer overflow vulnerability in the InformaCast functionality of ALGO |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free