Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2751 | CVE-2024-36403 |
|
62.8th | 5.3 | Matrix Media Repo (MMR) before version 1.3.5 is vulnerable to a disk fill attack where unauthenticat | |
| 2752 | CVE-2025-4142 |
|
62.8th | 8.8 | A critical buffer overflow vulnerability in Netgear EX6200 wireless extenders allows remote attacker | |
| 2753 | CVE-2025-4140 |
|
62.8th | 8.8 | A critical buffer overflow vulnerability in Netgear EX6120 WiFi extender firmware allows remote atta | |
| 2754 | CVE-2025-29660 |
|
62.8th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary scripts on Yi IOT XY-3820 d | |
| 2755 | CVE-2025-41699 |
|
62.8th | 8.8 | This vulnerability allows a low-privileged remote attacker with web management access to inject and | |
| 2756 | CVE-2025-54347 |
|
62.8th | 9.9 | A directory traversal vulnerability in Desktop Alert PingAlert Application Server versions 6.1.0.11 | |
| 2757 | CVE-2025-66209 |
|
62.7th | 9.9 | CVE-2025-66209 is an authenticated command injection vulnerability in Coolify's Database Backup func | |
| 2758 | CVE-2025-12491 |
|
62.8th | 7.5 | This vulnerability allows unauthenticated remote attackers to retrieve sensitive information from Se | |
| 2759 | CVE-2024-49352 |
|
62.7th | 7.1 | IBM Cognos Analytics is vulnerable to XML External Entity Injection (XXE), allowing attackers to rea | |
| 2760 | CVE-2025-1268 |
|
62.7th | 9.4 | This CVE describes an out-of-bounds write vulnerability in multiple Canon printer drivers that could | |
| 2761 | CVE-2025-66848 |
|
62.7th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary commands remotely on affect | |
| 2762 | CVE-2025-23237 |
|
62.7th | 6.6 | This CVE describes an OS command injection vulnerability in UD-LT2 firmware that allows authenticate | |
| 2763 | CVE-2025-2477 |
|
62.7th | 4.7 | The CryoKey WordPress plugin has a reflected cross-site scripting vulnerability in the 'ckemail' par | |
| 2764 | CVE-2025-27774 |
|
62.7th | 5.3 | Applio voice conversion tool versions 3.2.7 and earlier contain server-side request forgery (SSRF) a | |
| 2765 | CVE-2025-2106 |
|
62.7th | 7.5 | This SQL injection vulnerability in the ArielBrailovsky-ViralAd WordPress plugin allows unauthentica | |
| 2766 | CVE-2024-46209 |
|
62.6th | 5.4 | A stored cross-site scripting (XSS) vulnerability in REDAXO CMS v5.17.1 allows attackers to inject m | |
| 2767 | CVE-2025-64075 |
|
62.6th | 10.0 | A path traversal vulnerability in the ZBT WE2001 router's check_token function allows remote attacke | |
| 2768 | CVE-2025-15472 |
|
62.6th | 7.2 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDne | |
| 2769 | CVE-2025-0447 |
|
62.6th | 8.8 | This vulnerability in Google Chrome's navigation implementation allows attackers to escalate privile | |
| 2770 | CVE-2025-0443 |
|
62.6th | 8.8 | This vulnerability in Google Chrome extensions allows attackers to escalate privileges by tricking u | |
| 2771 | CVE-2025-4607 |
|
62.6th | 9.8 | The PSW Front-end Login & Registration WordPress plugin has a critical privilege escalation vulnerab | |
| 2772 | CVE-2021-4470 |
|
62.6th | N/A | CVE-2021-4470 is a critical pre-authentication remote code execution vulnerability in TG8 Firewall's | |
| 2773 | CVE-2025-23239 |
|
62.6th | 8.7 | An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpo | |
| 2774 | CVE-2024-13593 |
|
62.6th | 7.5 | The BMLT Meeting Map WordPress plugin has a Local File Inclusion vulnerability that allows authentic | |
| 2775 | CVE-2025-0461 |
|
62.6th | 4.3 | This CVE describes a path traversal vulnerability in Shanghai Lingdang Information Technology's Ling | |
| 2776 | CVE-2019-25222 |
|
62.6th | 4.9 | This SQL injection vulnerability in the WordPress Thumbnail Carousel Slider plugin allows unauthenti | |
| 2777 | CVE-2025-4299 |
|
62.5th | 8.8 | A critical buffer overflow vulnerability in Tenda AC1206 routers allows remote attackers to execute | |
| 2778 | CVE-2025-35027 |
|
62.6th | 7.3 | This CVE describes a command injection vulnerability in Unitree robotic products that allows attacke | |
| 2779 | CVE-2025-8712 |
|
62.6th | 5.4 | This CVE describes a missing authorization vulnerability in Ivanti secure access products that allow | |
| 2780 | CVE-2025-10878 |
|
62.6th | 10.0 | An unauthenticated SQL injection vulnerability in Fikir Odalari AdminPando 1.0.1 allows attackers to | |
| 2781 | CVE-2024-13409 |
|
62.5th | 7.5 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to p | |
| 2782 | CVE-2025-20146 |
|
62.5th | 8.6 | An unauthenticated remote attacker can cause denial of service on affected Cisco routers by sending | |
| 2783 | CVE-2025-1144 |
|
62.4th | 9.8 | The School Affairs System from Quanxun exposes sensitive information to unauthenticated attackers, a | |
| 2784 | CVE-2025-24320 |
|
62.4th | 8.0 | A stored XSS vulnerability in BIG-IP Configuration utility allows attackers to execute JavaScript in | |
| 2785 | CVE-2025-29484 |
|
62.4th | 7.5 | CVE-2025-29484 is an out-of-memory vulnerability in libming's parseABC_NS_SET_INFO function that all | |
| 2786 | CVE-2025-4120 |
|
62.4th | 8.8 | A critical buffer overflow vulnerability in Netgear JWNR2000v2 routers allows remote attackers to ex | |
| 2787 | CVE-2025-2474 |
|
62.3th | 9.8 | CVE-2025-2474 is a critical out-of-bounds write vulnerability in the PCX image codec in QNX SDP that | |
| 2788 | CVE-2025-29516 |
|
62.4th | 7.2 | This CVE describes a command injection vulnerability in D-Link DSL-7740C routers that allows attacke | |
| 2789 | CVE-2025-15139 |
|
62.4th | 6.3 | This CVE describes a command injection vulnerability in TRENDnet TEW-822DRE routers that allows remo | |
| 2790 | CVE-2025-15133 |
|
62.4th | 6.3 | This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices th | |
| 2791 | CVE-2025-15132 |
|
62.4th | 6.3 | This CVE describes a command injection vulnerability in ZSPACE Z4Pro+ devices that allows remote att | |
| 2792 | CVE-2025-15131 |
|
62.4th | 6.3 | This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices th | |
| 2793 | CVE-2024-10628 |
|
62.3th | 7.5 | This SQL injection vulnerability in Quiz Maker WordPress plugins allows unauthenticated attackers to | |
| 2794 | CVE-2025-24019 |
|
62.3th | 7.1 | This vulnerability in YesWiki allows any authenticated user to delete arbitrary files owned by the P | |
| 2795 | CVE-2024-56511 |
|
62.3th | 9.8 | This vulnerability allows attackers to bypass authentication in DataEase by exploiting a path traver | |
| 2796 | CVE-2025-23410 |
|
62.3th | 9.8 | CVE-2025-23410 is a path traversal vulnerability in GMOD Apollo's web interface that allows attacker | |
| 2797 | CVE-2025-4317 |
|
62.3th | 8.8 | The TheGem WordPress theme has an arbitrary file upload vulnerability in all versions up to 5.10.3. | |
| 2798 | CVE-2025-50578 |
|
62.3th | 9.8 | CVE-2025-50578 allows unauthenticated attackers to manipulate HTTP headers (X-Forwarded-Host and Ref | |
| 2799 | CVE-2025-31103 |
|
62.2th | 7.5 | CVE-2025-31103 is an untrusted data deserialization vulnerability in a-blog cms that allows attacker | |
| 2800 | CVE-2025-32118 |
|
62.2th | 9.1 | This vulnerability allows attackers to upload malicious files to WordPress sites using the CMP – C |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free