Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3351 | CVE-2026-24346 |
|
9.4th | 9.1 | This vulnerability allows attackers to access protected administrative areas of the EZCast Pro II we | |
| 3352 | CVE-2026-25227 |
|
9.1th | 9.1 | This vulnerability in authentik allows authenticated users with specific delegated permissions to ex | |
| 3353 | CVE-2025-8454 |
|
9.3th | 9.8 | CVE-2025-8454 is a critical vulnerability in the uscan tool (part of devscripts) that allows attacke | |
| 3354 | CVE-2025-56231 |
|
9.1th | 9.1 | Tonec Internet Download Manager versions 6.42.41.1 and earlier fail to properly validate SSL certifi | |
| 3355 | CVE-2025-46801 |
|
8.8th | 9.8 | CVE-2025-46801 is an authentication bypass vulnerability in Pgpool-II that allows attackers to log i | |
| 3356 | CVE-2025-23266 |
|
8.8th | 9.0 | CVE-2025-23266 is a container escape vulnerability in NVIDIA Container Toolkit that allows attackers | |
| 3357 | CVE-2025-52579 |
|
8.9th | 9.4 | Emerson ValveLink products store sensitive information like credentials or configuration data in cle | |
| 3358 | CVE-2025-23048 |
|
8.9th | 9.1 | This CVE describes an access control bypass vulnerability in Apache HTTP Server's mod_ssl module whe | |
| 3359 | CVE-2025-53095 |
|
8.9th | 9.6 | Sunshine's web UI lacks CSRF protection, allowing attackers to trick authenticated users into execut | |
| 3360 | CVE-2025-59053 |
|
8.9th | 9.6 | This vulnerability in AIRI v0.7.2-beta.2 allows attackers to achieve remote code execution through a | |
| 3361 | CVE-2026-25234 |
|
8.9th | 9.8 | This SQL injection vulnerability in PEAR's category deletion function allows attackers with category | |
| 3362 | CVE-2024-41197 |
|
8.6th | 9.8 | This vulnerability in Ocuco Innovation's INVCLIENT.EXE allows attackers to bypass authentication and | |
| 3363 | CVE-2024-41195 |
|
8.6th | 9.8 | This vulnerability in Ocuco Innovation's INNOVASERVICEINTF.EXE allows attackers to bypass authentica | |
| 3364 | CVE-2025-0634 |
|
8.4th | 9.8 | A Use After Free vulnerability in Samsung's rLottie animation library allows remote attackers to exe | |
| 3365 | CVE-2025-48274 |
|
8.4th | 9.3 | This SQL injection vulnerability in the WP Job Portal WordPress plugin allows attackers to execute a | |
| 3366 | CVE-2025-70981 |
|
8.4th | 9.8 | CVE-2025-70981 is a critical SQL injection vulnerability in CordysCRM 1.4.1 that allows attackers to | |
| 3367 | CVE-2025-10969 |
|
8.4th | 9.8 | This SQL injection vulnerability in Farktor Software's E-Commerce Package allows attackers to execut | |
| 3368 | CVE-2025-58050 |
|
8.6th | 9.1 | A heap-buffer-overflow read vulnerability in PCRE2 library version 10.45 allows attackers to read ou | |
| 3369 | CVE-2019-19144 |
|
8.6th | 9.8 | This CVE describes an XML External Entity (XXE) injection vulnerability in Quantum DXi6702 backup ap | |
| 3370 | CVE-2025-9063 |
|
8.5th | 9.8 | An authentication bypass vulnerability in FactoryTalk View Machine Edition's Web Browser ActiveX con | |
| 3371 | CVE-2025-58951 |
|
8.4th | 9.3 | This SQL injection vulnerability in the Advance Seat Reservation Management for WooCommerce plugin a | |
| 3372 | CVE-2025-65826 |
|
8.4th | 9.8 | This CVE describes a mobile application that contains hardcoded Wi-Fi credentials for the vendor's d | |
| 3373 | CVE-2025-67494 |
|
8.4th | 9.3 | CVE-2025-67494 is an unauthenticated server-side request forgery (SSRF) vulnerability in ZITADEL ide | |
| 3374 | CVE-2026-23518 |
|
8.5th | 9.8 | This vulnerability in Fleet's Windows MDM enrollment flow allows attackers to bypass authentication | |
| 3375 | CVE-2025-68705 |
|
8.6th | 9.8 | CVE-2025-68705 is a path traversal vulnerability in RustFS's /rustfs/rpc/read_file_stream endpoint t | |
| 3376 | CVE-2026-24838 |
|
8.4th | 9.1 | This vulnerability allows attackers to inject malicious scripts into DNN module titles, which execut | |
| 3377 | CVE-2024-58250 |
|
8th | 9.3 | The passprompt plugin in pppd (Point-to-Point Protocol daemon) before version 2.5.2 mishandles privi | |
| 3378 | CVE-2025-24290 |
|
8.3th | 9.9 | Multiple authenticated SQL injection vulnerabilities in UISP Application version 2.4.206 and earlier | |
| 3379 | CVE-2025-6185 |
|
8.3th | 9.3 | Leviton AcquiSuite and Energy Monitoring Hub have a cross-site scripting (XSS) vulnerability that al | |
| 3380 | CVE-2024-58040 |
|
8.3th | 9.1 | CVE-2024-58040 is a critical vulnerability in Crypt::RandomEncryption for Perl version 0.01 that use | |
| 3381 | CVE-2025-58766 |
|
8.2th | 9.0 | This critical vulnerability in Dyad v0.19.0 and earlier allows attackers to execute arbitrary code o | |
| 3382 | CVE-2025-10439 |
|
8.2th | 9.8 | This SQL injection vulnerability in Yordam Library Automation System allows attackers to execute arb | |
| 3383 | CVE-2024-13149 |
|
8.2th | 9.8 | This SQL injection vulnerability in Arma Store Armalife allows attackers to execute arbitrary SQL co | |
| 3384 | CVE-2025-4688 |
|
8.2th | 9.8 | This SQL injection vulnerability in BGS Interactive SINAV.LINK Exam Result Module allows attackers t | |
| 3385 | CVE-2025-40692 |
|
8.2th | 9.8 | This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate | |
| 3386 | CVE-2025-40690 |
|
8.2th | 9.8 | This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate | |
| 3387 | CVE-2025-40687 |
|
8.2th | 9.8 | This SQL injection vulnerability in Online Fire Reporting System v1.2 allows attackers to manipulate | |
| 3388 | CVE-2025-41238 |
|
7.7th | 9.3 | A heap-overflow vulnerability in VMware's PVSCSI controller allows local administrative users within | |
| 3389 | CVE-2025-55113 |
|
7.8th | 9.0 | This vulnerability allows attackers to bypass Access Control Lists in Control-M/Agent by using speci | |
| 3390 | CVE-2025-47569 |
|
7.9th | 9.3 | This SQL injection vulnerability in the WPSwings WooCommerce Ultimate Gift Card plugin allows attack | |
| 3391 | CVE-2025-36356 |
|
7.7th | 9.3 | This vulnerability allows a locally authenticated user on affected IBM Security Verify Access system | |
| 3392 | CVE-2025-11543 |
|
7.8th | 9.8 | This vulnerability allows attackers to bypass integrity checks and install unauthorized firmware on | |
| 3393 | CVE-2026-0905 |
|
7.6th | 9.8 | This vulnerability in Google Chrome allows attackers who obtain network log files to potentially ext | |
| 3394 | CVE-2025-8037 |
|
7.4th | 9.1 | This vulnerability allows an attacker to set a nameless cookie with an equals sign in its value, whi | |
| 3395 | CVE-2025-54957 |
|
7.3th | 9.8 | This vulnerability in Dolby UDC allows remote attackers to cause a buffer overflow via a malformed D | |
| 3396 | CVE-2026-24436 |
|
7.4th | 9.8 | This vulnerability allows attackers to perform unlimited brute-force attacks against administrative | |
| 3397 | CVE-2025-15385 |
|
7.3th | 9.8 | This CVE describes an authentication bypass vulnerability in TECNO Mobile's Boomplayer app. Attacker | |
| 3398 | CVE-2025-2311 |
|
6.9th | 9.0 | This vulnerability in SecHard software allows attackers to bypass authentication, manipulate interfa | |
| 3399 | CVE-2025-7390 |
|
7th | 9.1 | CVE-2025-7390 allows a malicious client to bypass client certificate authentication in Softing OPC H | |
| 3400 | CVE-2025-36904 |
|
7.2th | 9.8 | This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers t |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free