Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2201 CVE-2025-2151
0.58%
68.3th 6.3 A critical stack-based buffer overflow vulnerability in Assimp's GetNextLine function allows remote
2202 CVE-2025-4978
0.58%
68.3th 9.8 This vulnerability allows remote attackers to bypass authentication on Netgear DGND3700 routers via
2203 CVE-2025-6222
0.58%
68.3th 9.8 This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress sites usi
2204 CVE-2025-53020
0.58%
68.3th 7.5 This vulnerability in Apache HTTP Server involves improper memory management where memory is release
2205 CVE-2025-25475
0.58%
68.3th 7.5 A NULL pointer dereference vulnerability in DCMTK's DICOM file processing component allows attackers
2206 CVE-2025-52480
0.58%
68.3th 9.8 CVE-2025-52480 is an argument injection vulnerability in Registrator.jl's gettreesha() function that
2207 CVE-2023-47030
0.58%
68.3th 9.8 CVE-2023-47030 is a critical remote code execution vulnerability in NCR Terminal Handler v1.5.1 that
2208 CVE-2023-47032
0.58%
68.3th 9.8 CVE-2023-47032 is a critical remote code execution vulnerability in NCR Terminal Handler v1.5.1 that
2209 CVE-2025-62215
0.58%
68.3th 7.0 KEV This Windows Kernel race condition vulnerability allows authenticated local attackers to escalate pr
2210 CVE-2025-26477
0.58%
68.3th 4.3 Dell ECS versions 3.8.1.4 and earlier contain an improper input validation vulnerability that allows
2211 CVE-2025-64055
0.58%
68.3th 9.8 CVE-2025-64055 is an authentication bypass vulnerability in Fanvil x210 V2 IP phones that allows una
2212 CVE-2025-21587
0.58%
68.2th 7.4 This vulnerability in Java Secure Socket Extension (JSSE) allows attackers to manipulate or access c
2213 CVE-2024-36842
0.58%
68.2th 7.3 This vulnerability allows remote attackers to execute arbitrary code on affected Oncord+ Android Inf
2214 CVE-2025-43561
0.57%
68.2th 9.1 This CVE describes an incorrect authorization vulnerability in Adobe ColdFusion that allows high-pri
2215 CVE-2024-24456
0.57%
68.2th 5.9 A buffer overflow vulnerability in Athonet MME allows remote attackers to crash the system by sendin
2216 CVE-2024-57791
0.57%
68.1th 7.5 A vulnerability in the Linux kernel's SMC (Shared Memory Communications) subsystem could cause a den
2217 CVE-2025-0817
0.57%
68.1th 7.2 The FormCraft WordPress plugin allows unauthenticated attackers to upload malicious SVG files contai
2218 CVE-2025-20646
0.57%
68.1th 9.8 This critical vulnerability in MediaTek WLAN AP firmware allows remote attackers to execute arbitrar
2219 CVE-2025-2704
0.57%
68.1th 7.5 This vulnerability allows remote attackers to cause a denial of service in OpenVPN servers by corrup
2220 CVE-2024-54802
0.57%
68.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Netgear WNR854T routers via
2221 CVE-2025-24986
0.57%
68.1th 6.5 This vulnerability in Azure PromptFlow allows unauthorized attackers to execute arbitrary code remot
2222 CVE-2025-13390
0.57%
68.1th 10.0 The WP Directory Kit WordPress plugin has an authentication bypass vulnerability that allows unauthe
2223 CVE-2025-1100
0.57%
68.1th 9.8 CVE-2025-1100 is a critical vulnerability in Q-Free MaxTime traffic management software where a hard
2224 CVE-2025-26683
0.57%
68.1th 8.1 CVE-2025-26683 is an improper authorization vulnerability in Azure Playwright that allows unauthoriz
2225 CVE-2025-21573
0.57%
68th 6.0 This vulnerability in Oracle Financial Services Revenue Management and Billing's Chatbot component a
2226 CVE-2025-1909
0.57%
68th 9.8 The BuddyBoss Platform Pro WordPress plugin has an authentication bypass vulnerability that allows u
2227 CVE-2025-57618
0.57%
68th 7.3 A path traversal vulnerability in FastX3 allows unauthenticated attackers to read arbitrary server f
2228 CVE-2024-45626
0.57%
68th 6.5 Apache James server versions below 3.7.6 and 3.8.2 have a vulnerability in their JMAP HTML-to-text c
2229 CVE-2025-9712
0.57%
68th 8.8 This vulnerability allows remote unauthenticated attackers to execute arbitrary code on Ivanti Endpo
2230 CVE-2025-27487
0.57%
67.9th 8.0 A heap-based buffer overflow vulnerability in Microsoft Remote Desktop Client allows authenticated a
2231 CVE-2025-34330
0.57%
68th 5.3 This vulnerability allows unauthenticated remote attackers to upload files to AudioCodes Fax Server
2232 CVE-2025-24259
0.57%
67.9th 9.8 This vulnerability allows malicious applications to access Safari bookmarks without proper authoriza
2233 CVE-2025-24241
0.57%
67.9th 9.8 This macOS vulnerability allows malicious applications to trick users into copying sensitive data to
2234 CVE-2025-27220
0.57%
67.9th 4.0 A Regular Expression Denial of Service (ReDoS) vulnerability exists in the CGI gem for Ruby versions
2235 CVE-2024-13925
0.57%
67.9th 7.5 The Klarna Checkout for WooCommerce WordPress plugin before version 2.13.5 exposes an unauthenticate
2236 CVE-2025-62786
0.57%
67.9th 8.1 A heap-based out-of-bounds write vulnerability in Wazuh's decode_win_permissions function allows wri
2237 CVE-2023-53981
0.57%
67.9th 7.2 PhotoShow 3.0 contains a remote code execution vulnerability where authenticated administrators can
2238 CVE-2024-10441
0.57%
67.9th 9.8 This critical vulnerability allows remote attackers to execute arbitrary code on Synology BeeStation
2239 CVE-2023-37930
0.57%
67.9th 7.5 This CVE describes memory corruption vulnerabilities in Fortinet VPN products that could allow authe
2240 CVE-2025-53376
0.56%
67.9th 8.8 CVE-2025-53376 is a command injection vulnerability in Dokploy that allows authenticated low-privile
2241 CVE-2025-55901
0.56%
67.9th 6.5 This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK A3300R routers
2242 CVE-2025-55893
0.56%
67.9th 6.5 This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK N200RE routers
2243 CVE-2025-30891
0.56%
67.8th 8.8 This vulnerability allows attackers to include local files on the server through improper filename c
2244 CVE-2025-30846
0.56%
67.8th 8.8 This vulnerability allows attackers to include local files on the server through improper filename c
2245 CVE-2025-32146
0.56%
67.8th 8.8 This vulnerability allows attackers to include local files on the server through improper input vali
2246 CVE-2025-32141
0.56%
67.8th 8.8 This vulnerability allows attackers to include local files on the server through improper filename c
2247 CVE-2025-66251
0.56%
67.8th 9.1 This vulnerability allows unauthenticated attackers to delete arbitrary .tgz files via path traversa
2248 CVE-2025-34024
0.56%
67.8th 8.8 An authenticated OS command injection vulnerability in Edimax EW-7438RPn firmware allows attackers t
2249 CVE-2025-64124
0.56%
67.8th 8.8 This OS command injection vulnerability in Nuvation Energy Multi-Stack Controller allows attackers t
2250 CVE-2025-9485
0.56%
67.7th 9.8 The OAuth Single Sign On plugin for WordPress has a critical authentication bypass vulnerability. Un

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free