Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2451 | CVE-2025-11541 |
|
24.3th | 9.8 | A stack-based buffer overflow vulnerability in Sharp Display Solutions projectors allows attackers t | |
| 2452 | CVE-2025-14700 |
|
24.4th | 9.9 | This critical vulnerability in Crafty Controller's Webhook Template component allows authenticated a | |
| 2453 | CVE-2025-42880 |
|
24.3th | 9.9 | CVE-2025-42880 is a critical remote code execution vulnerability in SAP Solution Manager where authe | |
| 2454 | CVE-2026-24306 |
|
24.5th | 9.8 | CVE-2026-24306 is an improper access control vulnerability in Azure Front Door that allows unauthori | |
| 2455 | CVE-2024-11045 |
|
24.2th | 9.6 | A Cross-Site WebSocket Hijacking vulnerability in automatic1111/stable-diffusion-webui version 1.10. | |
| 2456 | CVE-2025-47284 |
|
24.2th | 9.9 | This vulnerability allows administrative users within a Gardener project to escalate privileges and | |
| 2457 | CVE-2025-11126 |
|
24.1th | 9.8 | This vulnerability involves hard-coded credentials in the Apeman ID71 system configuration file, all | |
| 2458 | CVE-2025-60219 |
|
24.1th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to servers runn | |
| 2459 | CVE-2025-10547 |
|
24.1th | 9.8 | An uninitialized variable vulnerability in DrayOS HTTP CGI request processing allows remote attacker | |
| 2460 | CVE-2025-64712 |
|
24.3th | 9.8 | A path traversal vulnerability in the unstructured library's partition_msg function allows attackers | |
| 2461 | CVE-2025-54391 |
|
24th | 9.1 | This vulnerability in Zimbra Collaboration (ZCS) allows attackers with valid user credentials to byp | |
| 2462 | CVE-2025-10392 |
|
24.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Mercury KM08-708H GiGA WiFi | |
| 2463 | CVE-2024-32444 |
|
24th | 9.8 | CVE-2024-32444 is an incorrect privilege assignment vulnerability in the RealHomes WordPress theme t | |
| 2464 | CVE-2025-50402 |
|
24th | 9.8 | The FAST FAC1200R F400_FAC1200R_Q device contains a buffer overflow vulnerability in the password ha | |
| 2465 | CVE-2025-50399 |
|
24th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on FAST FAC1200R F400_FAC1200R_ | |
| 2466 | CVE-2025-66256 |
|
24th | 9.8 | This vulnerability allows unauthenticated attackers to upload arbitrary files to Mozart FM Transmitt | |
| 2467 | CVE-2025-66250 |
|
24th | 9.8 | This vulnerability allows unauthenticated attackers to upload arbitrary files to DB Electronica Tele | |
| 2468 | CVE-2025-27918 |
|
24th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on AnyDesk clients by sending s | |
| 2469 | CVE-2024-27480 |
|
24.1th | 9.8 | CVE-2024-27480 is an insecure file upload vulnerability in VvvebJs 1.7.2 that allows attackers to up | |
| 2470 | CVE-2024-25182 |
|
24.1th | 9.8 | VvvebJs 1.7.2 contains an unrestricted file upload vulnerability in save.php that allows attackers t | |
| 2471 | CVE-2025-64663 |
|
23.9th | 9.9 | This CVE describes an elevation of privilege vulnerability in Microsoft's Custom Question Answering | |
| 2472 | CVE-2024-57035 |
|
23.7th | 9.8 | CVE-2024-57035 is a critical SQL injection vulnerability in WeGIA v3.2.0 that allows attackers to ex | |
| 2473 | CVE-2024-40446 |
|
23.8th | 9.8 | This vulnerability in forkosh Mime Tex allows remote attackers to execute arbitrary code via special | |
| 2474 | CVE-2025-47436 |
|
23.8th | 9.8 | A heap-based buffer overflow vulnerability in Apache ORC's C++ LZO decompression logic allows attack | |
| 2475 | CVE-2023-47297 |
|
23.8th | 9.8 | A settings manipulation vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arb | |
| 2476 | CVE-2025-40600 |
|
23.7th | 9.8 | A format string vulnerability in SonicOS SSL VPN interface allows remote unauthenticated attackers t | |
| 2477 | CVE-2025-9994 |
|
23.8th | 9.8 | The Amp'ed RF BT-AP 111 Bluetooth access point's HTTP admin interface lacks authentication, allowing | |
| 2478 | CVE-2024-13994 |
|
23.8th | 9.8 | Nagios XI versions before 2024R1.1.2 have a missing authorization vulnerability when 'Allow Insecure | |
| 2479 | CVE-2025-62481 |
|
23.7th | 9.8 | An unauthenticated remote code execution vulnerability in Oracle Marketing (part of Oracle E-Busines | |
| 2480 | CVE-2025-62168 |
|
23.7th | 10.0 | Squid caching proxy versions before 7.2 fail to properly redact HTTP authentication credentials in e | |
| 2481 | CVE-2025-50433 |
|
23.9th | 9.8 | This vulnerability allows attackers to escalate privileges via a crafted password reset mechanism on | |
| 2482 | CVE-2026-25938 |
|
23.9th | 9.8 | An authentication bypass vulnerability in FUXA web-based SCADA/HMI software allows unauthenticated r | |
| 2483 | CVE-2025-45378 |
|
23.8th | 9.1 | Dell CloudLink versions 8.0 through 8.1.2 have a vulnerability where privileged users with known pas | |
| 2484 | CVE-2025-67165 |
|
23.7th | 9.8 | An Insecure Direct Object Reference (IDOR) vulnerability in Pagekit CMS v1.0.18 allows attackers to | |
| 2485 | CVE-2026-22908 |
|
23.8th | 9.1 | This vulnerability allows remote attackers to gain full system access by uploading unvalidated conta | |
| 2486 | CVE-2026-26335 |
|
23.7th | 9.8 | This vulnerability allows attackers to achieve remote code execution on Calero VeraSMART servers by | |
| 2487 | CVE-2025-48373 |
|
23.6th | 9.1 | This vulnerability allows attackers to bypass authentication in the Schule school management system | |
| 2488 | CVE-2025-44654 |
|
23.5th | 9.8 | This vulnerability in Linksys E2500 routers with vsftpd configuration allows attackers to bypass chr | |
| 2489 | CVE-2025-55031 |
|
23.6th | 9.8 | This vulnerability in Firefox and Focus for iOS allows malicious web pages to trigger hybrid passkey | |
| 2490 | CVE-2025-59503 |
|
23.5th | 10.0 | This critical Server-Side Request Forgery (SSRF) vulnerability in Azure Compute Gallery allows unaut | |
| 2491 | CVE-2025-63747 |
|
23.5th | 9.8 | QaTraq 6.9.2 ships with default administrative credentials that are enabled in fresh installations. | |
| 2492 | CVE-2025-13342 |
|
23.7th | 9.8 | This vulnerability allows unauthenticated attackers to modify critical WordPress configuration optio | |
| 2493 | CVE-2025-59693 |
|
23.5th | 9.8 | This vulnerability allows a physically proximate attacker to bypass tamper protection on Entrust har | |
| 2494 | CVE-2025-4319 |
|
23.6th | 9.4 | This vulnerability allows attackers to perform brute force attacks against user accounts and exploit | |
| 2495 | CVE-2025-37184 |
|
23.5th | 9.8 | This vulnerability allows unauthenticated remote attackers to bypass multi-factor authentication req | |
| 2496 | CVE-2026-25200 |
|
23.6th | 9.8 | A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without proper aut | |
| 2497 | CVE-2025-48935 |
|
23.4th | 9.1 | This vulnerability allows attackers to bypass Deno's permission system for database read/write opera | |
| 2498 | CVE-2025-31229 |
|
23.4th | 9.1 | This vulnerability allows VoiceOver, Apple's screen reader accessibility feature, to audibly read de | |
| 2499 | CVE-2025-29009 |
|
23.3th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WooCommerce | |
| 2500 | CVE-2025-54738 |
|
23.3th | 9.8 | This CVE describes an authentication bypass vulnerability in the NooTheme Jobmonster WordPress theme |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free