Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2601 CVE-2025-0593
0.48%
64.4th 8.8 This vulnerability allows remote attackers with low privileges to execute arbitrary shell commands o
2602 CVE-2025-64717
0.48%
64.4th 9.8 This vulnerability in ZITADEL identity management platform allows unauthenticated attackers to bypas
2603 CVE-2025-14850
0.48%
64.4th 8.1 Advantech WebAccess/SCADA is vulnerable to directory traversal that allows attackers to delete arbit
2604 CVE-2025-13426
0.48%
64.4th N/A This vulnerability in Google Apigee's JavaCallout policy allows attackers to inject malicious Java o
2605 CVE-2024-13520
0.48%
64.3th 5.3 This vulnerability allows unauthenticated attackers to modify gift voucher values, expiration dates,
2606 CVE-2025-3015
0.48%
64.3th 6.3 This critical vulnerability in Assimp's ASE file handler allows remote attackers to trigger out-of-b
2607 CVE-2025-2804
0.48%
64.3th 6.1 This reflected cross-site scripting vulnerability in the tagDiv Composer WordPress plugin allows una
2608 CVE-2025-2269
0.48%
64.3th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'image_id' p
2609 CVE-2025-32158
0.48%
64.3th 7.5 This vulnerability allows attackers to include arbitrary PHP files from remote servers in the aTheme
2610 CVE-2025-21177
0.48%
64.3th 8.7 This Server-Side Request Forgery vulnerability in Microsoft Dynamics 365 Sales allows authenticated
2611 CVE-2025-4981
0.48%
64.2th 9.9 This vulnerability allows authenticated Mattermost users to write files to arbitrary locations on th
2612 CVE-2025-11673
0.48%
64.2th 7.2 SOOP-CLM software from PiExtract contains hidden functionality that privileged remote attackers can
2613 CVE-2024-57660
0.47%
64.2th 7.5 A SQL injection vulnerability in the sqlo_expand_jts component of OpenLink Virtuoso Open Source allo
2614 CVE-2024-52892
0.47%
64.2th 6.1 IBM Jazz for Service Management versions 1.1.3 through 1.1.3.23 contain a cross-site scripting (XSS)
2615 CVE-2025-32799
0.47%
64.2th 9.8 CVE-2025-32799 is a path traversal vulnerability in conda-build that allows attackers to write files
2616 CVE-2025-34328
0.47%
64.2th 9.8 This critical vulnerability allows unauthenticated remote attackers to upload arbitrary files and ex
2617 CVE-2025-34394
0.47%
64.2th 9.8 Barracuda Service Center in the RMM solution prior to version 2025.1.1 exposes a .NET Remoting servi
2618 CVE-2025-34393
0.47%
64.2th 9.8 This vulnerability in Barracuda Service Center allows attackers to execute arbitrary code remotely b
2619 CVE-2024-12086
0.47%
64.2th 6.1 This rsync vulnerability allows a malicious server to read arbitrary files from a client's machine d
2620 CVE-2025-43844
0.47%
64.1th 9.8 CVE-2025-43844 is a critical command injection vulnerability in Retrieval-based-Voice-Conversion-Web
2621 CVE-2025-68952
0.47%
64.1th 9.8 Eigent multi-agent Workforce version 0.0.60 contains a 1-click Remote Code Execution vulnerability t
2622 CVE-2024-52006
0.47%
64.1th 7.5 This vulnerability allows attackers to inject malicious commands into Git credential helpers by expl
2623 CVE-2025-47981
0.47%
64.1th 9.8 A heap-based buffer overflow vulnerability in Windows SPNEGO Extended Negotiation allows unauthentic
2624 CVE-2025-56083
0.47%
64.1th 8.8 This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attac
2625 CVE-2025-63213
0.47%
64.1th 9.8 This vulnerability allows remote attackers to execute arbitrary commands with root privileges on QVi
2626 CVE-2023-53968
0.47%
64.1th 9.8 This authentication bypass vulnerability in Screen SFT DAB 600/C firmware allows attackers to delete
2627 CVE-2025-1059
0.47%
64th 7.5 A resource allocation vulnerability in Schneider Electric devices allows attackers to send malicious
2628 CVE-2025-2714
0.47%
64th 4.3 This vulnerability in JoomlaUX JUX Real Estate 3.4.0 allows attackers to inject malicious scripts vi
2629 CVE-2025-32581
0.47%
64th 7.1 This stored cross-site scripting (XSS) vulnerability in the WordPress Spam Blocker plugin allows att
2630 CVE-2023-7334
0.47%
64.1th 9.8 This CVE describes a critical .NET deserialization vulnerability in Changjetong T+ software that all
2631 CVE-2025-64424
0.47%
64th 8.8 A command injection vulnerability in Coolify allows low-privileged users (members) to execute arbitr
2632 CVE-2025-21185
0.47%
64th 6.5 This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected system
2633 CVE-2025-22599
0.47%
64th 6.5 A reflected cross-site scripting (XSS) vulnerability exists in WeGIA's home.php endpoint via the msg
2634 CVE-2025-1127
0.47%
64th 9.1 This CVE-2025-1127 vulnerability allows attackers to execute arbitrary code as an unprivileged user
2635 CVE-2025-30737
0.47%
64th 5.7 This vulnerability in Oracle Smart View for Office allows high-privileged attackers with network acc
2636 CVE-2025-21601
0.47%
64th 7.5 An unauthenticated attacker can send specially crafted network traffic to Juniper devices to cause C
2637 CVE-2025-64764
0.47%
64th 7.1 A reflected cross-site scripting (XSS) vulnerability exists in Astro web framework when using server
2638 CVE-2025-53477
0.47%
64th 7.5 A NULL pointer dereference vulnerability in Apache NimBLE's Bluetooth stack occurs when HCI connecti
2639 CVE-2025-21397
0.47%
63.9th 7.8 This vulnerability allows remote code execution through specially crafted Microsoft Office documents
2640 CVE-2025-21394
0.47%
63.9th 7.8 This vulnerability allows remote code execution through specially crafted Excel files. Attackers cou
2641 CVE-2025-21381
0.47%
63.9th 7.8 Microsoft Excel contains a remote code execution vulnerability that allows attackers to execute arbi
2642 CVE-2024-9639
0.47%
63.9th 8.0 This vulnerability allows remote code execution if an attacker obtains session administrator credent
2643 CVE-2025-3844
0.47%
63.9th 9.8 The PeproDev Ultimate Profile Solutions WordPress plugin has an authentication bypass vulnerability
2644 CVE-2025-34231
0.47%
63.9th 8.6 This CVE describes an unauthenticated server-side request forgery (SSRF) vulnerability in Vasion Pri
2645 CVE-2025-36072
0.47%
63.9th 8.8 This vulnerability in IBM webMethods Integration allows authenticated users to execute arbitrary cod
2646 CVE-2025-66631
0.47%
63.9th N/A CVE-2025-66631 is a remote code execution vulnerability in CSLA .NET framework versions 5.5.4 and be
2647 CVE-2025-2993
0.47%
63.9th 5.3 This critical vulnerability in Tenda FH1202 routers allows improper access controls through manipula
2648 CVE-2024-50631
0.47%
63.9th 7.5 This SQL injection vulnerability in Synology Drive Server's system syncing daemon allows remote atta
2649 CVE-2023-42970
0.47%
63.9th 8.8 This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow
2650 CVE-2025-41714
0.47%
63.9th 8.8 This vulnerability allows authenticated attackers to perform path traversal attacks via the 'Upload-

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free