Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2401 CVE-2025-8043
0.09%
25.2th 9.8 This vulnerability involves incorrect URL truncation in Firefox and Thunderbird, which could allow a
2402 CVE-2025-55244
0.09%
25.2th 9.0 This vulnerability in Azure Bot Service allows attackers to escalate privileges within affected depl
2403 CVE-2025-55089
0.09%
25.2th 9.8 A buffer overflow vulnerability in FileX's RAM disk driver allows remote attackers to execute arbitr
2404 CVE-2025-10041
0.09%
25.1th 9.8 The Flex QR Code Generator WordPress plugin allows unauthenticated attackers to upload arbitrary fil
2405 CVE-2025-37729
0.09%
25.1th 9.1 This CVE describes a template injection vulnerability in Elastic Cloud Enterprise (ECE) where Jinjav
2406 CVE-2025-66216
0.09%
25.2th 9.8 A heap buffer overflow vulnerability in AIS-catcher allows attackers to write approximately 1KB of a
2407 CVE-2025-4320
0.09%
25.2th 10.0 This vulnerability allows attackers to bypass authentication and exploit weak password recovery mech
2408 CVE-2026-23840
0.09%
25.1th 9.3 This cross-site scripting (XSS) vulnerability in Movary allows attackers to inject malicious scripts
2409 CVE-2026-23839
0.09%
25.1th 9.3 This cross-site scripting vulnerability in Movary allows attackers to inject malicious scripts via t
2410 CVE-2026-25481
0.09%
25.2th 9.6 This vulnerability allows attackers to bypass security controls in Langroid's TableChatAgent and exe
2411 CVE-2024-39273
0.09%
25th 9.0 This vulnerability allows attackers to perform man-in-the-middle attacks to push arbitrary firmware
2412 CVE-2025-43245
0.09%
25th 9.8 This CVE describes a code-signing downgrade vulnerability in macOS that allows malicious application
2413 CVE-2025-43194
0.09%
25th 9.8 This CVE describes a macOS vulnerability where an application can bypass file system protections and
2414 CVE-2025-7393
0.09%
24.9th 9.8 This vulnerability in Drupal Mail Login modules allows attackers to perform unlimited authentication
2415 CVE-2025-34207
0.09%
24.9th 9.8 This vulnerability allows attackers to capture SSH private keys from compromised Docker containers i
2416 CVE-2025-59936
0.09%
25th 9.4 CVE-2025-59936 is a cache poisoning vulnerability in get-jwks library that allows attackers to bypas
2417 CVE-2022-38696
0.09%
24.9th 9.8 CVE-2022-38696 is a critical BootRom vulnerability in Unisoc chipsets where missing payload size che
2418 CVE-2022-38693
0.09%
24.9th 9.8 CVE-2022-38693 is a memory buffer overflow vulnerability in FDL1 (Fastboot Download Layer) due to mi
2419 CVE-2025-11832
0.09%
25th 9.8 This CVE describes a resource allocation vulnerability in Azure Access Technology BLU-IC2 and BLU-IC
2420 CVE-2025-14308
0.09%
24.9th 9.8 An integer overflow vulnerability in Robocode's Buffer class write method allows attackers to manipu
2421 CVE-2025-65656
0.09%
24.9th 9.8 CVE-2025-65656 is a file inclusion vulnerability in dcat-admin v2.2.3-beta and earlier that allows a
2422 CVE-2021-47819
0.09%
25.1th 9.8 CVE-2021-47819 is a critical file upload vulnerability in ProjeQtOr Project Management software that
2423 CVE-2025-65783
0.09%
25th 9.8 An arbitrary file upload vulnerability in Hubert Hub v2.0 allows attackers to upload malicious PDF f
2424 CVE-2025-46352
0.09%
24.8th 9.8 The CS5000 Fire Panel contains a hard-coded VNC password that cannot be changed, allowing attackers
2425 CVE-2025-39489
0.09%
24.8th 9.8 CVE-2025-39489 is an incorrect privilege assignment vulnerability in the CouponXL WordPress theme th
2426 CVE-2025-31918
0.09%
24.8th 9.8 This vulnerability allows attackers to escalate privileges in the Simple Business Directory Pro Word
2427 CVE-2025-2409
0.09%
24.9th 9.1 This vulnerability in ASPECT systems allows attackers to corrupt files and overwrite system files if
2428 CVE-2025-53075
0.09%
24.9th 9.8 CVE-2025-53075 is a path traversal vulnerability in Samsung's rLottie animation library that allows
2429 CVE-2025-54143
0.09%
24.8th 9.8 This vulnerability in Firefox for iOS allows sandboxed iframes to bypass download restrictions, enab
2430 CVE-2025-51452
0.09%
24.8th 9.8 This vulnerability allows unauthenticated attackers to bypass login authentication on TOTOLINK A7000
2431 CVE-2025-57085
0.09%
24.8th 9.8 This vulnerability in Tenda W30E routers allows attackers to cause a Denial of Service (DoS) by send
2432 CVE-2025-62712
0.09%
24.8th 9.6 An authenticated non-privileged user in JumpServer can retrieve connection tokens belonging to all u
2433 CVE-2025-50343
0.09%
24.9th 9.8 A heap-based memory corruption vulnerability in matio library versions up to 1.5.28 allows attackers
2434 CVE-2025-65741
0.09%
24.8th 9.8 CVE-2025-65741 allows attackers to inject malicious dynamic libraries (.dylib files) into Sublime Te
2435 CVE-2025-54816
0.09%
24.9th 9.4 This vulnerability allows unauthenticated attackers to establish WebSocket connections to affected s
2436 CVE-2026-23520
0.09%
24.7th 9.0 CVE-2026-23520 is a command injection vulnerability in Arcane's docker management platform that allo
2437 CVE-2026-25130
0.09%
24.8th 9.6 CVE-2026-25130 is a critical argument injection vulnerability in the Cybersecurity AI (CAI) framewor
2438 CVE-2025-29310
0.09%
24.5th 9.8 A critical vulnerability in ONOS v2.7.0 allows attackers to execute arbitrary commands or access net
2439 CVE-2023-47539
0.09%
24.6th 9.8 This vulnerability allows remote unauthenticated attackers to bypass administrator authentication on
2440 CVE-2025-50128
0.09%
24.6th 9.6 A stored cross-site scripting vulnerability in WWBN AVideo allows attackers to inject malicious Java
2441 CVE-2025-5352
0.09%
24.6th 9.6 A critical stored XSS vulnerability in lunary-ai/lunary Analytics component allows arbitrary JavaScr
2442 CVE-2025-55613
0.09%
24.6th 9.8 A buffer overflow vulnerability in Tenda O3V2 routers allows attackers to execute arbitrary code by
2443 CVE-2025-59841
0.09%
24.6th 9.8 Flag Forge CTF platform versions 2.2.0 through 2.3.0 have a session invalidation vulnerability where
2444 CVE-2026-22034
0.09%
24.6th 9.8 This vulnerability in Snuffleupagus allows uploaded files in multipart POST requests to be executed
2445 CVE-2025-23797
0.08%
24.3th 9.8 A Cross-Site Request Forgery vulnerability in the WP Options Editor WordPress plugin allows attacker
2446 CVE-2026-26273
0.08%
24.3th 9.8 Known social publishing platform versions 1.6.2 and earlier contain a critical authentication bypass
2447 CVE-2025-51387
0.08%
24.3th 9.8 CVE-2025-51387 allows remote code execution in GitKraken Desktop due to misconfigured Electron Fuses
2448 CVE-2025-65085
0.08%
24.5th 9.8 A heap-based buffer overflow vulnerability in Ashlar-Vellum CAD software allows attackers to read se
2449 CVE-2025-64325
0.08%
24.3th 9.0 This vulnerability allows an attacker to inject malicious content into the Emby Server admin dashboa
2450 CVE-2025-11542
0.08%
24.3th 9.8 A stack-based buffer overflow vulnerability in Sharp Display Solutions projectors allows attackers t

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free