Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2401 | CVE-2025-8043 |
|
25.2th | 9.8 | This vulnerability involves incorrect URL truncation in Firefox and Thunderbird, which could allow a | |
| 2402 | CVE-2025-55244 |
|
25.2th | 9.0 | This vulnerability in Azure Bot Service allows attackers to escalate privileges within affected depl | |
| 2403 | CVE-2025-55089 |
|
25.2th | 9.8 | A buffer overflow vulnerability in FileX's RAM disk driver allows remote attackers to execute arbitr | |
| 2404 | CVE-2025-10041 |
|
25.1th | 9.8 | The Flex QR Code Generator WordPress plugin allows unauthenticated attackers to upload arbitrary fil | |
| 2405 | CVE-2025-37729 |
|
25.1th | 9.1 | This CVE describes a template injection vulnerability in Elastic Cloud Enterprise (ECE) where Jinjav | |
| 2406 | CVE-2025-66216 |
|
25.2th | 9.8 | A heap buffer overflow vulnerability in AIS-catcher allows attackers to write approximately 1KB of a | |
| 2407 | CVE-2025-4320 |
|
25.2th | 10.0 | This vulnerability allows attackers to bypass authentication and exploit weak password recovery mech | |
| 2408 | CVE-2026-23840 |
|
25.1th | 9.3 | This cross-site scripting (XSS) vulnerability in Movary allows attackers to inject malicious scripts | |
| 2409 | CVE-2026-23839 |
|
25.1th | 9.3 | This cross-site scripting vulnerability in Movary allows attackers to inject malicious scripts via t | |
| 2410 | CVE-2026-25481 |
|
25.2th | 9.6 | This vulnerability allows attackers to bypass security controls in Langroid's TableChatAgent and exe | |
| 2411 | CVE-2024-39273 |
|
25th | 9.0 | This vulnerability allows attackers to perform man-in-the-middle attacks to push arbitrary firmware | |
| 2412 | CVE-2025-43245 |
|
25th | 9.8 | This CVE describes a code-signing downgrade vulnerability in macOS that allows malicious application | |
| 2413 | CVE-2025-43194 |
|
25th | 9.8 | This CVE describes a macOS vulnerability where an application can bypass file system protections and | |
| 2414 | CVE-2025-7393 |
|
24.9th | 9.8 | This vulnerability in Drupal Mail Login modules allows attackers to perform unlimited authentication | |
| 2415 | CVE-2025-34207 |
|
24.9th | 9.8 | This vulnerability allows attackers to capture SSH private keys from compromised Docker containers i | |
| 2416 | CVE-2025-59936 |
|
25th | 9.4 | CVE-2025-59936 is a cache poisoning vulnerability in get-jwks library that allows attackers to bypas | |
| 2417 | CVE-2022-38696 |
|
24.9th | 9.8 | CVE-2022-38696 is a critical BootRom vulnerability in Unisoc chipsets where missing payload size che | |
| 2418 | CVE-2022-38693 |
|
24.9th | 9.8 | CVE-2022-38693 is a memory buffer overflow vulnerability in FDL1 (Fastboot Download Layer) due to mi | |
| 2419 | CVE-2025-11832 |
|
25th | 9.8 | This CVE describes a resource allocation vulnerability in Azure Access Technology BLU-IC2 and BLU-IC | |
| 2420 | CVE-2025-14308 |
|
24.9th | 9.8 | An integer overflow vulnerability in Robocode's Buffer class write method allows attackers to manipu | |
| 2421 | CVE-2025-65656 |
|
24.9th | 9.8 | CVE-2025-65656 is a file inclusion vulnerability in dcat-admin v2.2.3-beta and earlier that allows a | |
| 2422 | CVE-2021-47819 |
|
25.1th | 9.8 | CVE-2021-47819 is a critical file upload vulnerability in ProjeQtOr Project Management software that | |
| 2423 | CVE-2025-65783 |
|
25th | 9.8 | An arbitrary file upload vulnerability in Hubert Hub v2.0 allows attackers to upload malicious PDF f | |
| 2424 | CVE-2025-46352 |
|
24.8th | 9.8 | The CS5000 Fire Panel contains a hard-coded VNC password that cannot be changed, allowing attackers | |
| 2425 | CVE-2025-39489 |
|
24.8th | 9.8 | CVE-2025-39489 is an incorrect privilege assignment vulnerability in the CouponXL WordPress theme th | |
| 2426 | CVE-2025-31918 |
|
24.8th | 9.8 | This vulnerability allows attackers to escalate privileges in the Simple Business Directory Pro Word | |
| 2427 | CVE-2025-2409 |
|
24.9th | 9.1 | This vulnerability in ASPECT systems allows attackers to corrupt files and overwrite system files if | |
| 2428 | CVE-2025-53075 |
|
24.9th | 9.8 | CVE-2025-53075 is a path traversal vulnerability in Samsung's rLottie animation library that allows | |
| 2429 | CVE-2025-54143 |
|
24.8th | 9.8 | This vulnerability in Firefox for iOS allows sandboxed iframes to bypass download restrictions, enab | |
| 2430 | CVE-2025-51452 |
|
24.8th | 9.8 | This vulnerability allows unauthenticated attackers to bypass login authentication on TOTOLINK A7000 | |
| 2431 | CVE-2025-57085 |
|
24.8th | 9.8 | This vulnerability in Tenda W30E routers allows attackers to cause a Denial of Service (DoS) by send | |
| 2432 | CVE-2025-62712 |
|
24.8th | 9.6 | An authenticated non-privileged user in JumpServer can retrieve connection tokens belonging to all u | |
| 2433 | CVE-2025-50343 |
|
24.9th | 9.8 | A heap-based memory corruption vulnerability in matio library versions up to 1.5.28 allows attackers | |
| 2434 | CVE-2025-65741 |
|
24.8th | 9.8 | CVE-2025-65741 allows attackers to inject malicious dynamic libraries (.dylib files) into Sublime Te | |
| 2435 | CVE-2025-54816 |
|
24.9th | 9.4 | This vulnerability allows unauthenticated attackers to establish WebSocket connections to affected s | |
| 2436 | CVE-2026-23520 |
|
24.7th | 9.0 | CVE-2026-23520 is a command injection vulnerability in Arcane's docker management platform that allo | |
| 2437 | CVE-2026-25130 |
|
24.8th | 9.6 | CVE-2026-25130 is a critical argument injection vulnerability in the Cybersecurity AI (CAI) framewor | |
| 2438 | CVE-2025-29310 |
|
24.5th | 9.8 | A critical vulnerability in ONOS v2.7.0 allows attackers to execute arbitrary commands or access net | |
| 2439 | CVE-2023-47539 |
|
24.6th | 9.8 | This vulnerability allows remote unauthenticated attackers to bypass administrator authentication on | |
| 2440 | CVE-2025-50128 |
|
24.6th | 9.6 | A stored cross-site scripting vulnerability in WWBN AVideo allows attackers to inject malicious Java | |
| 2441 | CVE-2025-5352 |
|
24.6th | 9.6 | A critical stored XSS vulnerability in lunary-ai/lunary Analytics component allows arbitrary JavaScr | |
| 2442 | CVE-2025-55613 |
|
24.6th | 9.8 | A buffer overflow vulnerability in Tenda O3V2 routers allows attackers to execute arbitrary code by | |
| 2443 | CVE-2025-59841 |
|
24.6th | 9.8 | Flag Forge CTF platform versions 2.2.0 through 2.3.0 have a session invalidation vulnerability where | |
| 2444 | CVE-2026-22034 |
|
24.6th | 9.8 | This vulnerability in Snuffleupagus allows uploaded files in multipart POST requests to be executed | |
| 2445 | CVE-2025-23797 |
|
24.3th | 9.8 | A Cross-Site Request Forgery vulnerability in the WP Options Editor WordPress plugin allows attacker | |
| 2446 | CVE-2026-26273 |
|
24.3th | 9.8 | Known social publishing platform versions 1.6.2 and earlier contain a critical authentication bypass | |
| 2447 | CVE-2025-51387 |
|
24.3th | 9.8 | CVE-2025-51387 allows remote code execution in GitKraken Desktop due to misconfigured Electron Fuses | |
| 2448 | CVE-2025-65085 |
|
24.5th | 9.8 | A heap-based buffer overflow vulnerability in Ashlar-Vellum CAD software allows attackers to read se | |
| 2449 | CVE-2025-64325 |
|
24.3th | 9.0 | This vulnerability allows an attacker to inject malicious content into the Emby Server admin dashboa | |
| 2450 | CVE-2025-11542 |
|
24.3th | 9.8 | A stack-based buffer overflow vulnerability in Sharp Display Solutions projectors allows attackers t |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free