Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2151 | CVE-2025-64656 |
|
29.8th | 9.4 | This vulnerability allows an unauthorized attacker to perform an out-of-bounds read in Application G | |
| 2152 | CVE-2025-64310 |
|
29.7th | 9.8 | This vulnerability allows attackers to brute-force administrative passwords on EPSON projector web i | |
| 2153 | CVE-2026-0907 |
|
29.7th | 9.8 | This vulnerability allows attackers to spoof the user interface in Chrome's Split View mode, potenti | |
| 2154 | CVE-2026-0906 |
|
29.7th | 9.8 | This vulnerability allows attackers to spoof the URL bar (Omnibox) in Google Chrome on Android, pote | |
| 2155 | CVE-2026-25142 |
|
29.8th | 10.0 | CVE-2026-25142 is a critical sandbox escape vulnerability in SandboxJS library versions before 0.8.2 | |
| 2156 | CVE-2020-35546 |
|
29.5th | 9.1 | Lexmark MX6500 printers with firmware LW75.JD.P296 and earlier have incorrect access control setting | |
| 2157 | CVE-2025-27583 |
|
29.5th | 9.1 | This vulnerability allows unauthenticated attackers to create and modify user accounts, including Ad | |
| 2158 | CVE-2021-4457 |
|
29.5th | 9.1 | The ZoomSounds WordPress plugin before version 6.05 contains an unrestricted file upload vulnerabili | |
| 2159 | CVE-2025-41687 |
|
29.6th | 9.8 | An unauthenticated remote attacker can exploit a stack-based buffer overflow in the u-link Managemen | |
| 2160 | CVE-2025-54446 |
|
29.6th | 9.8 | This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious | |
| 2161 | CVE-2025-54438 |
|
29.6th | 9.8 | This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious | |
| 2162 | CVE-2025-10568 |
|
29.5th | 9.8 | This vulnerability in HyperX NGENUITY software allows attackers to execute arbitrary code on affecte | |
| 2163 | CVE-2025-48469 |
|
29.4th | 9.6 | This vulnerability allows unauthenticated attackers to upload malicious firmware through a public up | |
| 2164 | CVE-2025-49455 |
|
29.3th | 9.8 | CVE-2025-49455 is a PHP object injection vulnerability in the LoftOcean TinySalt WordPress theme tha | |
| 2165 | CVE-2025-31429 |
|
29.3th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code through deserialization of untr | |
| 2166 | CVE-2025-31396 |
|
29.3th | 9.8 | CVE-2025-31396 is a PHP object injection vulnerability in the FLAP Business WordPress theme that all | |
| 2167 | CVE-2025-31052 |
|
29.3th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code through deserialization of untr | |
| 2168 | CVE-2025-49072 |
|
29.3th | 9.8 | This CVE describes a PHP object injection vulnerability in the Mr. Murphy WordPress theme caused by | |
| 2169 | CVE-2025-61385 |
|
29.5th | 9.6 | CVE-2025-61385 is a SQL injection vulnerability in the pg8000 Python PostgreSQL adapter. Attackers c | |
| 2170 | CVE-2025-59407 |
|
29.4th | 9.8 | This CVE exposes a hardcoded Java Keystore password in Flock Safety's Android application, allowing | |
| 2171 | CVE-2025-56332 |
|
29.4th | 9.1 | CVE-2025-56332 is an authentication bypass vulnerability in fosrl/pangolin v1.6.2 and earlier that a | |
| 2172 | CVE-2025-68932 |
|
29.4th | 9.8 | This vulnerability in FreshRSS allows attackers to predict authentication tokens due to weak random | |
| 2173 | CVE-2026-25592 |
|
29.4th | 9.9 | CVE-2026-25592 is an arbitrary file write vulnerability in Microsoft's Semantic Kernel .NET SDK that | |
| 2174 | CVE-2025-1270 |
|
29.2th | 9.1 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Anapi Group's h6web s | |
| 2175 | CVE-2025-27891 |
|
29.3th | 9.1 | A memory corruption vulnerability in Samsung Exynos processors allows attackers to perform out-of-bo | |
| 2176 | CVE-2025-8857 |
|
29.2th | 9.8 | Clinic Image System contains hard-coded administrator credentials in its source code, allowing unaut | |
| 2177 | CVE-2025-8679 |
|
29.2th | 9.8 | This vulnerability allows attackers to bypass captive portal authentication in ExtremeGuest Essentia | |
| 2178 | CVE-2025-64180 |
|
29.2th | 10.0 | A critical TOCTOU vulnerability in Manager accounting software allows attackers to bypass DNS valida | |
| 2179 | CVE-2025-67511 |
|
29.2th | 9.6 | CVE-2025-67511 is a command injection vulnerability in Cybersecurity AI (CAI) framework versions 0.5 | |
| 2180 | CVE-2025-65548 |
|
29.2th | 9.1 | CVE-2025-65548 is a denial-of-service vulnerability in Cashu implementations that allows attackers t | |
| 2181 | CVE-2025-51682 |
|
29.2th | 9.8 | CVE-2025-51682 is a client-side authorization vulnerability in mJobtime 15.7.2 that allows attackers | |
| 2182 | CVE-2026-2017 |
|
29.3th | 9.8 | A critical stack-based buffer overflow vulnerability in IP-COM W30AP access points allows remote att | |
| 2183 | CVE-2026-25505 |
|
29.3th | 9.8 | Bambuddy versions before 0.1.7 have two critical authentication flaws: a hardcoded JWT secret key in | |
| 2184 | CVE-2026-25237 |
|
29.2th | 9.8 | This vulnerability in PEAR (PHP Extension and Application Repository) allows remote code execution w | |
| 2185 | CVE-2026-26190 |
|
29th | 9.8 | This critical vulnerability in Milvus vector database allows unauthenticated attackers to bypass aut | |
| 2186 | CVE-2025-30967 |
|
29.1th | 9.6 | A Cross-Site Request Forgery vulnerability in WPJobBoard WordPress plugin allows attackers to trick | |
| 2187 | CVE-2025-32641 |
|
29.1th | 9.6 | A Cross-Site Request Forgery vulnerability in Anant Addons for Elementor WordPress plugin allows att | |
| 2188 | CVE-2025-46059 |
|
29.1th | 9.8 | LangChain v0.3.51 contains an indirect prompt injection vulnerability in the GmailToolkit component | |
| 2189 | CVE-2025-40599 |
|
29.1th | 9.1 | An authenticated arbitrary file upload vulnerability in SMA 100 series web management interface allo | |
| 2190 | CVE-2025-9179 |
|
29.1th | 9.8 | This critical memory corruption vulnerability in Mozilla's GMP (Gecko Media Plugin) process allows a | |
| 2191 | CVE-2025-9976 |
|
29.1th | 9.0 | This CVE describes an OS command injection vulnerability in the Station Launcher App of the 3DEXPERI | |
| 2192 | CVE-2025-57792 |
|
29.2th | 10.0 | CVE-2025-57792 is a critical SQL injection vulnerability in Explorance Blue software that allows una | |
| 2193 | CVE-2025-57441 |
|
28.9th | 9.8 | The Blackmagic ATEM Mini Pro 2.7 exposes sensitive configuration information via an unauthenticated | |
| 2194 | CVE-2025-57437 |
|
28.9th | 9.8 | Blackmagic Web Presenter HD firmware version 3.3 exposes sensitive streaming and device configuratio | |
| 2195 | CVE-2025-57601 |
|
28.9th | 9.8 | This vulnerability allows attackers who obtain the hardcoded SSH private key to impersonate any mana | |
| 2196 | CVE-2025-53072 |
|
28.9th | 9.8 | This critical vulnerability in Oracle Marketing allows unauthenticated attackers with network access | |
| 2197 | CVE-2025-61303 |
|
28.8th | 9.8 | This vulnerability in Hatching Triage Sandbox allows malware samples to evade detection by recursive | |
| 2198 | CVE-2025-56221 |
|
28.8th | 9.8 | CVE-2025-56221 is an authentication bypass vulnerability in SigningHub v8.6.8 that allows attackers | |
| 2199 | CVE-2025-55321 |
|
28.9th | 9.3 | This cross-site scripting (XSS) vulnerability in Azure Monitor allows attackers to inject malicious | |
| 2200 | CVE-2025-60854 |
|
28.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands on D-Link R15 (AX1500) rout |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free