Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3351 CVE-2026-24346
0.03%
9.4th 9.1 This vulnerability allows attackers to access protected administrative areas of the EZCast Pro II we
3352 CVE-2026-25227
0.03%
9.1th 9.1 This vulnerability in authentik allows authenticated users with specific delegated permissions to ex
3353 CVE-2025-8454
0.03%
9.3th 9.8 CVE-2025-8454 is a critical vulnerability in the uscan tool (part of devscripts) that allows attacke
3354 CVE-2025-56231
0.03%
9.1th 9.1 Tonec Internet Download Manager versions 6.42.41.1 and earlier fail to properly validate SSL certifi
3355 CVE-2025-46801
0.03%
8.8th 9.8 CVE-2025-46801 is an authentication bypass vulnerability in Pgpool-II that allows attackers to log i
3356 CVE-2025-23266
0.03%
8.8th 9.0 CVE-2025-23266 is a container escape vulnerability in NVIDIA Container Toolkit that allows attackers
3357 CVE-2025-52579
0.03%
8.9th 9.4 Emerson ValveLink products store sensitive information like credentials or configuration data in cle
3358 CVE-2025-23048
0.03%
8.9th 9.1 This CVE describes an access control bypass vulnerability in Apache HTTP Server's mod_ssl module whe
3359 CVE-2025-53095
0.03%
8.9th 9.6 Sunshine's web UI lacks CSRF protection, allowing attackers to trick authenticated users into execut
3360 CVE-2025-59053
0.03%
8.9th 9.6 This vulnerability in AIRI v0.7.2-beta.2 allows attackers to achieve remote code execution through a
3361 CVE-2026-25234
0.03%
8.9th 9.8 This SQL injection vulnerability in PEAR's category deletion function allows attackers with category
3362 CVE-2024-41197
0.03%
8.6th 9.8 This vulnerability in Ocuco Innovation's INVCLIENT.EXE allows attackers to bypass authentication and
3363 CVE-2024-41195
0.03%
8.6th 9.8 This vulnerability in Ocuco Innovation's INNOVASERVICEINTF.EXE allows attackers to bypass authentica
3364 CVE-2025-0634
0.03%
8.4th 9.8 A Use After Free vulnerability in Samsung's rLottie animation library allows remote attackers to exe
3365 CVE-2025-48274
0.03%
8.4th 9.3 This SQL injection vulnerability in the WP Job Portal WordPress plugin allows attackers to execute a
3366 CVE-2025-70981
0.03%
8.4th 9.8 CVE-2025-70981 is a critical SQL injection vulnerability in CordysCRM 1.4.1 that allows attackers to
3367 CVE-2025-10969
0.03%
8.4th 9.8 This SQL injection vulnerability in Farktor Software's E-Commerce Package allows attackers to execut
3368 CVE-2025-58050
0.03%
8.6th 9.1 A heap-buffer-overflow read vulnerability in PCRE2 library version 10.45 allows attackers to read ou
3369 CVE-2019-19144
0.03%
8.6th 9.8 This CVE describes an XML External Entity (XXE) injection vulnerability in Quantum DXi6702 backup ap
3370 CVE-2025-9063
0.03%
8.5th 9.8 An authentication bypass vulnerability in FactoryTalk View Machine Edition's Web Browser ActiveX con
3371 CVE-2025-58951
0.03%
8.4th 9.3 This SQL injection vulnerability in the Advance Seat Reservation Management for WooCommerce plugin a
3372 CVE-2025-65826
0.03%
8.4th 9.8 This CVE describes a mobile application that contains hardcoded Wi-Fi credentials for the vendor's d
3373 CVE-2025-67494
0.03%
8.4th 9.3 CVE-2025-67494 is an unauthenticated server-side request forgery (SSRF) vulnerability in ZITADEL ide
3374 CVE-2026-23518
0.03%
8.5th 9.8 This vulnerability in Fleet's Windows MDM enrollment flow allows attackers to bypass authentication
3375 CVE-2025-68705
0.03%
8.6th 9.8 CVE-2025-68705 is a path traversal vulnerability in RustFS's /rustfs/rpc/read_file_stream endpoint t
3376 CVE-2026-24838
0.03%
8.4th 9.1 This vulnerability allows attackers to inject malicious scripts into DNN module titles, which execut
3377 CVE-2024-58250
0.03%
8th 9.3 The passprompt plugin in pppd (Point-to-Point Protocol daemon) before version 2.5.2 mishandles privi
3378 CVE-2025-24290
0.03%
8.3th 9.9 Multiple authenticated SQL injection vulnerabilities in UISP Application version 2.4.206 and earlier
3379 CVE-2025-6185
0.03%
8.3th 9.3 Leviton AcquiSuite and Energy Monitoring Hub have a cross-site scripting (XSS) vulnerability that al
3380 CVE-2024-58040
0.03%
8.3th 9.1 CVE-2024-58040 is a critical vulnerability in Crypt::RandomEncryption for Perl version 0.01 that use
3381 CVE-2025-58766
0.03%
8.2th 9.0 This critical vulnerability in Dyad v0.19.0 and earlier allows attackers to execute arbitrary code o
3382 CVE-2025-10439
0.03%
8.2th 9.8 This SQL injection vulnerability in Yordam Library Automation System allows attackers to execute arb
3383 CVE-2024-13149
0.03%
8.2th 9.8 This SQL injection vulnerability in Arma Store Armalife allows attackers to execute arbitrary SQL co
3384 CVE-2025-4688
0.03%
8.2th 9.8 This SQL injection vulnerability in BGS Interactive SINAV.LINK Exam Result Module allows attackers t
3385 CVE-2025-40692
0.03%
8.2th 9.8 This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate
3386 CVE-2025-40690
0.03%
8.2th 9.8 This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate
3387 CVE-2025-40687
0.03%
8.2th 9.8 This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate
3388 CVE-2025-41238
0.03%
7.7th 9.3 A heap-overflow vulnerability in VMware's PVSCSI controller allows local administrative users within
3389 CVE-2025-55113
0.03%
7.8th 9.0 This vulnerability allows attackers to bypass Access Control Lists in Control-M/Agent by using speci
3390 CVE-2025-47569
0.03%
7.9th 9.3 This SQL injection vulnerability in the WPSwings WooCommerce Ultimate Gift Card plugin allows attack
3391 CVE-2025-36356
0.03%
7.7th 9.3 This vulnerability allows a locally authenticated user on affected IBM Security Verify Access system
3392 CVE-2025-11543
0.03%
7.8th 9.8 This vulnerability allows attackers to bypass integrity checks and install unauthorized firmware on
3393 CVE-2026-0905
0.03%
7.6th 9.8 This vulnerability in Google Chrome allows attackers who obtain network log files to potentially ext
3394 CVE-2025-8037
0.03%
7.4th 9.1 This vulnerability allows an attacker to set a nameless cookie with an equals sign in its value, whi
3395 CVE-2025-54957
0.03%
7.3th 9.8 This vulnerability in Dolby UDC allows remote attackers to cause a buffer overflow via a malformed D
3396 CVE-2026-24436
0.03%
7.4th 9.8 This vulnerability allows attackers to perform unlimited brute-force attacks against administrative
3397 CVE-2025-15385
0.03%
7.3th 9.8 This CVE describes an authentication bypass vulnerability in TECNO Mobile's Boomplayer app. Attacker
3398 CVE-2025-2311
0.03%
6.9th 9.0 This vulnerability in SecHard software allows attackers to bypass authentication, manipulate interfa
3399 CVE-2025-7390
0.03%
7th 9.1 CVE-2025-7390 allows a malicious client to bypass client certificate authentication in Softing OPC H
3400 CVE-2025-36904
0.03%
7.2th 9.8 This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers t

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free