Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1851 CVE-2024-57030
0.7%
71.5th 8.1 Wegia versions below 3.2.0 contain a cross-site scripting vulnerability in the employee documents pa
1852 CVE-2025-26320
0.7%
71.6th 6.5 CVE-2025-26320 is an OS command injection vulnerability in t0mer BroadlinkManager v5.9.1 that allows
1853 CVE-2022-50789
0.7%
71.5th 7.8 This is a command injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco systems up to version 2.x
1854 CVE-2025-2959
0.7%
71.5th 6.5 This vulnerability in TRENDnet TEW-410APB wireless access points allows local network attackers to c
1855 CVE-2024-13946
0.7%
71.5th 6.8 This vulnerability allows attackers to execute arbitrary code by planting malicious DLL files that t
1856 CVE-2025-30452
0.7%
71.5th 9.8 This CVE describes a critical input validation vulnerability in macOS that could allow attackers to
1857 CVE-2025-30424
0.7%
71.5th 9.8 A data exposure vulnerability in macOS Messages allows user contact information to leak into system
1858 CVE-2025-24273
0.7%
71.5th 9.8 This CVE describes a critical out-of-bounds write vulnerability in macOS kernel memory that allows a
1859 CVE-2025-24265
0.7%
71.5th 9.8 This CVE describes an out-of-bounds read vulnerability in macOS that could allow a malicious applica
1860 CVE-2025-24256
0.7%
71.5th 9.8 This is a macOS kernel memory disclosure vulnerability caused by insufficient bounds checking. An ap
1861 CVE-2025-24253
0.7%
71.5th 9.8 A macOS vulnerability allows malicious applications to bypass symlink protections and access protect
1862 CVE-2025-24247
0.7%
71.5th 9.8 A type confusion vulnerability in macOS allows attackers to cause unexpected application termination
1863 CVE-2025-24232
0.7%
71.5th 9.8 A state management vulnerability in macOS allows malicious applications to bypass file access restri
1864 CVE-2025-24356
0.7%
71.5th 7.5 CVE-2025-24356 is a UDP amplification vulnerability in fastd VPN daemon that allows attackers to spo
1865 CVE-2024-11582
0.7%
71.5th 7.2 The Subscribe2 WordPress plugin has a stored XSS vulnerability in all versions up to 10.43. Unauthen
1866 CVE-2025-29457
0.7%
71.5th 7.6 This vulnerability in MyBB 1.8.38 allows remote attackers to obtain sensitive information through th
1867 CVE-2025-3053
0.7%
71.5th 8.8 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex
1868 CVE-2025-30387
0.7%
71.4th 9.8 This path traversal vulnerability in Azure allows unauthorized attackers to access restricted direct
1869 CVE-2025-9784
0.7%
71.4th 7.5 This vulnerability in Undertow allows malicious clients to send malformed requests that trigger serv
1870 CVE-2024-45421
0.69%
71.4th 8.5 A buffer overflow vulnerability in some Zoom Apps allows authenticated users to escalate privileges
1871 CVE-2024-8684
0.69%
71.4th 8.3 This CVE describes an OS command injection vulnerability in Revolution Pi devices that allows authen
1872 CVE-2024-12909
0.69%
71.4th 9.8 This SQL injection vulnerability in the FinanceChatLlamaPack allows attackers to execute arbitrary S
1873 CVE-2024-38392
0.69%
71.4th 9.1 This vulnerability in Pexip Infinity Connect allows remote attackers to execute arbitrary code by ex
1874 CVE-2025-28384
0.69%
71.4th 9.1 This directory traversal vulnerability in OpenC3 COSMOS allows attackers to access files outside the
1875 CVE-2025-56427
0.69%
71.4th 7.5 A directory traversal vulnerability in ComposioHQ v0.7.20 allows remote attackers to access sensitiv
1876 CVE-2025-34274
0.69%
71.4th 9.8 Nagios Log Server versions before 2024R2.0.3 run the embedded Logstash process with root privileges,
1877 CVE-2024-14008
0.69%
71.4th 7.2 Nagios XI versions before 2024R1.3.2 contain a remote command execution vulnerability in the WinRM C
1878 CVE-2025-1539
0.69%
71.4th 8.8 A critical stack-based buffer overflow vulnerability exists in D-Link DAP-1320 firmware version 1.00
1879 CVE-2025-5441
0.69%
71.4th 6.3 This critical vulnerability in Linksys WiFi range extenders allows remote attackers to execute arbit
1880 CVE-2025-34267
0.69%
71.4th 9.9 Flowise versions 3.0.1 through 3.0.7 and all later versions with 'ALLOW_BUILTIN_DEP' enabled contain
1881 CVE-2025-29461
0.69%
71.3th 7.6 This vulnerability in a-blogcms 3.1.15 allows remote attackers to access sensitive information throu
1882 CVE-2025-29459
0.69%
71.3th 7.6 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in MyBB 1.8.38's Mail function
1883 CVE-2025-29451
0.69%
71.3th 7.6 This vulnerability in Seo Panel 4.11.0 allows remote attackers to access sensitive information throu
1884 CVE-2025-29394
0.69%
71.3th 8.1 An insecure file upload vulnerability in Verydows v2.0 allows remote attackers to upload malicious f
1885 CVE-2025-3714
0.69%
71.4th 9.8 This critical vulnerability allows unauthenticated remote attackers to execute arbitrary code on LCD
1886 CVE-2025-3710
0.69%
71.4th 9.8 CVE-2025-3710 is a critical stack-based buffer overflow vulnerability in LCD KVM over IP Switch CL57
1887 CVE-2020-36863
0.69%
71.3th 8.8 This vulnerability allows authenticated attackers to upload PHP files to Nagios XI's Audio Import di
1888 CVE-2025-31182
0.69%
71.3th 9.8 This vulnerability allows malicious applications to delete files they shouldn't have permission to a
1889 CVE-2025-63651
0.69%
71.3th 7.5 A use-after-free vulnerability in Monkey web server's string handling function allows attackers to c
1890 CVE-2025-63650
0.69%
71.3th 7.5 An out-of-bounds read vulnerability in Monkey web server's memory handling allows attackers to cause
1891 CVE-2025-29820
0.69%
71.3th 7.8 A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o
1892 CVE-2024-50630
0.69%
71.3th 7.5 This vulnerability allows remote attackers to obtain administrator credentials in Synology Drive Ser
1893 CVE-2025-25997
0.69%
71.2th 7.5 CVE-2025-25997 is a directory traversal vulnerability in FeMiner wms v1.0 that allows remote attacke
1894 CVE-2025-7359
0.69%
71.2th 8.2 The Counter live visitors for WooCommerce WordPress plugin has an arbitrary file deletion vulnerabil
1895 CVE-2024-39288
0.68%
71.2th 9.1 This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router
1896 CVE-2024-37357
0.68%
71.2th 9.1 This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router
1897 CVE-2025-22130
0.68%
71.2th 8.8 CVE-2025-22130 is a path traversal vulnerability in Soft Serve Git server that allows non-admin user
1898 CVE-2026-0779
0.68%
71.2th 8.8 This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG
1899 CVE-2025-2266
0.68%
71.1th 9.8 This vulnerability allows unauthenticated attackers to modify WordPress site options via the Checkou
1900 CVE-2026-0793
0.68%
71.1th 9.8 CVE-2026-0793 is a heap-based buffer overflow vulnerability in the InformaCast functionality of ALGO

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free