Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2151 CVE-2025-64656
0.11%
29.8th 9.4 This vulnerability allows an unauthorized attacker to perform an out-of-bounds read in Application G
2152 CVE-2025-64310
0.11%
29.7th 9.8 This vulnerability allows attackers to brute-force administrative passwords on EPSON projector web i
2153 CVE-2026-0907
0.11%
29.7th 9.8 This vulnerability allows attackers to spoof the user interface in Chrome's Split View mode, potenti
2154 CVE-2026-0906
0.11%
29.7th 9.8 This vulnerability allows attackers to spoof the URL bar (Omnibox) in Google Chrome on Android, pote
2155 CVE-2026-25142
0.11%
29.8th 10.0 CVE-2026-25142 is a critical sandbox escape vulnerability in SandboxJS library versions before 0.8.2
2156 CVE-2020-35546
0.11%
29.5th 9.1 Lexmark MX6500 printers with firmware LW75.JD.P296 and earlier have incorrect access control setting
2157 CVE-2025-27583
0.11%
29.5th 9.1 This vulnerability allows unauthenticated attackers to create and modify user accounts, including Ad
2158 CVE-2021-4457
0.11%
29.5th 9.1 The ZoomSounds WordPress plugin before version 6.05 contains an unrestricted file upload vulnerabili
2159 CVE-2025-41687
0.11%
29.6th 9.8 An unauthenticated remote attacker can exploit a stack-based buffer overflow in the u-link Managemen
2160 CVE-2025-54446
0.11%
29.6th 9.8 This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious
2161 CVE-2025-54438
0.11%
29.6th 9.8 This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious
2162 CVE-2025-10568
0.11%
29.5th 9.8 This vulnerability in HyperX NGENUITY software allows attackers to execute arbitrary code on affecte
2163 CVE-2025-48469
0.11%
29.4th 9.6 This vulnerability allows unauthenticated attackers to upload malicious firmware through a public up
2164 CVE-2025-49455
0.11%
29.3th 9.8 CVE-2025-49455 is a PHP object injection vulnerability in the LoftOcean TinySalt WordPress theme tha
2165 CVE-2025-31429
0.11%
29.3th 9.8 This vulnerability allows remote attackers to execute arbitrary code through deserialization of untr
2166 CVE-2025-31396
0.11%
29.3th 9.8 CVE-2025-31396 is a PHP object injection vulnerability in the FLAP Business WordPress theme that all
2167 CVE-2025-31052
0.11%
29.3th 9.8 This vulnerability allows remote attackers to execute arbitrary code through deserialization of untr
2168 CVE-2025-49072
0.11%
29.3th 9.8 This CVE describes a PHP object injection vulnerability in the Mr. Murphy WordPress theme caused by
2169 CVE-2025-61385
0.11%
29.5th 9.6 CVE-2025-61385 is a SQL injection vulnerability in the pg8000 Python PostgreSQL adapter. Attackers c
2170 CVE-2025-59407
0.11%
29.4th 9.8 This CVE exposes a hardcoded Java Keystore password in Flock Safety's Android application, allowing
2171 CVE-2025-56332
0.11%
29.4th 9.1 CVE-2025-56332 is an authentication bypass vulnerability in fosrl/pangolin v1.6.2 and earlier that a
2172 CVE-2025-68932
0.11%
29.4th 9.8 This vulnerability in FreshRSS allows attackers to predict authentication tokens due to weak random
2173 CVE-2026-25592
0.11%
29.4th 9.9 CVE-2026-25592 is an arbitrary file write vulnerability in Microsoft's Semantic Kernel .NET SDK that
2174 CVE-2025-1270
0.11%
29.2th 9.1 This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Anapi Group's h6web s
2175 CVE-2025-27891
0.11%
29.3th 9.1 A memory corruption vulnerability in Samsung Exynos processors allows attackers to perform out-of-bo
2176 CVE-2025-8857
0.11%
29.2th 9.8 Clinic Image System contains hard-coded administrator credentials in its source code, allowing unaut
2177 CVE-2025-8679
0.11%
29.2th 9.8 This vulnerability allows attackers to bypass captive portal authentication in ExtremeGuest Essentia
2178 CVE-2025-64180
0.11%
29.2th 10.0 A critical TOCTOU vulnerability in Manager accounting software allows attackers to bypass DNS valida
2179 CVE-2025-67511
0.11%
29.2th 9.6 CVE-2025-67511 is a command injection vulnerability in Cybersecurity AI (CAI) framework versions 0.5
2180 CVE-2025-65548
0.11%
29.2th 9.1 CVE-2025-65548 is a denial-of-service vulnerability in Cashu implementations that allows attackers t
2181 CVE-2025-51682
0.11%
29.2th 9.8 CVE-2025-51682 is a client-side authorization vulnerability in mJobtime 15.7.2 that allows attackers
2182 CVE-2026-2017
0.11%
29.3th 9.8 A critical stack-based buffer overflow vulnerability in IP-COM W30AP access points allows remote att
2183 CVE-2026-25505
0.11%
29.3th 9.8 Bambuddy versions before 0.1.7 have two critical authentication flaws: a hardcoded JWT secret key in
2184 CVE-2026-25237
0.11%
29.2th 9.8 This vulnerability in PEAR (PHP Extension and Application Repository) allows remote code execution w
2185 CVE-2026-26190
0.11%
29th 9.8 This critical vulnerability in Milvus vector database allows unauthenticated attackers to bypass aut
2186 CVE-2025-30967
0.11%
29.1th 9.6 A Cross-Site Request Forgery vulnerability in WPJobBoard WordPress plugin allows attackers to trick
2187 CVE-2025-32641
0.11%
29.1th 9.6 A Cross-Site Request Forgery vulnerability in Anant Addons for Elementor WordPress plugin allows att
2188 CVE-2025-46059
0.11%
29.1th 9.8 LangChain v0.3.51 contains an indirect prompt injection vulnerability in the GmailToolkit component
2189 CVE-2025-40599
0.11%
29.1th 9.1 An authenticated arbitrary file upload vulnerability in SMA 100 series web management interface allo
2190 CVE-2025-9179
0.11%
29.1th 9.8 This critical memory corruption vulnerability in Mozilla's GMP (Gecko Media Plugin) process allows a
2191 CVE-2025-9976
0.11%
29.1th 9.0 This CVE describes an OS command injection vulnerability in the Station Launcher App of the 3DEXPERI
2192 CVE-2025-57792
0.11%
29.2th 10.0 CVE-2025-57792 is a critical SQL injection vulnerability in Explorance Blue software that allows una
2193 CVE-2025-57441
0.11%
28.9th 9.8 The Blackmagic ATEM Mini Pro 2.7 exposes sensitive configuration information via an unauthenticated
2194 CVE-2025-57437
0.11%
28.9th 9.8 Blackmagic Web Presenter HD firmware version 3.3 exposes sensitive streaming and device configuratio
2195 CVE-2025-57601
0.11%
28.9th 9.8 This vulnerability allows attackers who obtain the hardcoded SSH private key to impersonate any mana
2196 CVE-2025-53072
0.11%
28.9th 9.8 This critical vulnerability in Oracle Marketing allows unauthenticated attackers with network access
2197 CVE-2025-61303
0.11%
28.8th 9.8 This vulnerability in Hatching Triage Sandbox allows malware samples to evade detection by recursive
2198 CVE-2025-56221
0.11%
28.8th 9.8 CVE-2025-56221 is an authentication bypass vulnerability in SigningHub v8.6.8 that allows attackers
2199 CVE-2025-55321
0.11%
28.9th 9.3 This cross-site scripting (XSS) vulnerability in Azure Monitor allows attackers to inject malicious
2200 CVE-2025-60854
0.11%
28.8th 9.8 This vulnerability allows remote attackers to execute arbitrary commands on D-Link R15 (AX1500) rout

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free