Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3651 | CVE-2025-25516 |
|
55th | 9.8 | Seacms versions up to 13.3 contain a SQL injection vulnerability in admin_paylog.php that allows att | |
| 3652 | CVE-2025-25513 |
|
55th | 9.8 | Seacms versions up to 13.3 contain a SQL injection vulnerability in admin_members.php that allows at | |
| 3653 | CVE-2025-6704 |
|
55th | 9.8 | This vulnerability allows unauthenticated attackers to write arbitrary files to Sophos Firewall syst | |
| 3654 | CVE-2025-35050 |
|
55th | 9.8 | CVE-2025-35050 is a critical remote code execution vulnerability in Newforma Info Exchange (NIX) tha | |
| 3655 | CVE-2025-12496 |
|
55th | 4.9 | The Zephyr Project Manager WordPress plugin has a directory traversal vulnerability that allows auth | |
| 3656 | CVE-2025-63689 |
|
55th | 10.0 | Multiple SQL injection vulnerabilities in the ycf1998 money-pos system allow remote attackers to exe | |
| 3657 | CVE-2024-27778 |
|
54.9th | 8.8 | This CVE-2024-27778 is an OS command injection vulnerability in Fortinet FortiSandbox that allows au | |
| 3658 | CVE-2022-45185 |
|
54.9th | 8.8 | SuiteCRM 7.12.7 contains an authenticated file upload vulnerability that allows authenticated users | |
| 3659 | CVE-2025-1675 |
|
54.9th | 8.2 | CVE-2025-1675 is an out-of-bounds read vulnerability in the dns_copy_qname function of Zephyr RTOS's | |
| 3660 | CVE-2024-45552 |
|
55th | 8.2 | This vulnerability allows information disclosure during video calls when a device receives a malform | |
| 3661 | CVE-2025-3203 |
|
54.9th | 4.3 | This vulnerability in Tenda W18E routers allows remote attackers to trigger a stack-based buffer ove | |
| 3662 | CVE-2025-4883 |
|
55th | 7.2 | A critical stack-based buffer overflow vulnerability in D-Link DI-8100 routers allows remote attacke | |
| 3663 | CVE-2025-12484 |
|
55th | 7.2 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages | |
| 3664 | CVE-2026-1064 |
|
55th | 4.7 | This vulnerability allows remote attackers to execute arbitrary commands on Bastillion systems throu | |
| 3665 | CVE-2026-1063 |
|
55th | 4.7 | This CVE describes a command injection vulnerability in Bastillion's Public Key Management System th | |
| 3666 | CVE-2026-2000 |
|
55th | 4.7 | This vulnerability allows remote attackers to execute arbitrary commands on DCN DCME-320 devices thr | |
| 3667 | CVE-2025-69259 |
|
54.9th | 7.5 | A NULL pointer dereference vulnerability in Trend Micro Apex Central allows remote attackers to caus | |
| 3668 | CVE-2024-11345 |
|
54.9th | 7.3 | A heap-based memory vulnerability in the Postscript interpreter of Lexmark devices allows attackers | |
| 3669 | CVE-2024-11344 |
|
54.9th | 7.3 | A type confusion vulnerability in the Postscript interpreter of Lexmark devices allows attackers to | |
| 3670 | CVE-2024-56940 |
|
54.9th | 7.5 | A vulnerability in LearnDash v6.7.1 allows attackers to cause Denial of Service (DoS) by uploading e | |
| 3671 | CVE-2025-24192 |
|
54.9th | 6.5 | A script imports isolation vulnerability in Apple WebKit allows malicious websites to bypass securit | |
| 3672 | CVE-2025-26645 |
|
54.9th | 8.8 | This vulnerability allows attackers to exploit relative path traversal in Remote Desktop Client to e | |
| 3673 | CVE-2024-51319 |
|
54.9th | 7.3 | This vulnerability allows authenticated attackers to include local files and upload malicious JSP fi | |
| 3674 | CVE-2024-53591 |
|
54.9th | 9.8 | This vulnerability in Seclore v3.27.5.0 allows attackers to bypass authentication through brute forc | |
| 3675 | CVE-2025-31490 |
|
54.9th | 7.5 | AutoGPT versions before 0.6.1 contain a DNS rebinding vulnerability in the requests wrapper that all | |
| 3676 | CVE-2025-3268 |
|
54.9th | 5.3 | This vulnerability allows remote attackers to bypass authentication mechanisms in TinyWebServer by m | |
| 3677 | CVE-2025-24919 |
|
54.9th | 8.1 | A deserialization vulnerability in Dell ControlVault3 and ControlVault3 Plus firmware allows arbitra | |
| 3678 | CVE-2025-9428 |
|
54.9th | 8.3 | This vulnerability allows authenticated attackers to execute arbitrary SQL commands through the key | |
| 3679 | CVE-2025-9064 |
|
54.9th | 9.1 | An unauthenticated path traversal vulnerability in FactoryTalk View Machine Edition allows attackers | |
| 3680 | CVE-2025-13659 |
|
54.8th | 8.8 | This vulnerability in Ivanti Endpoint Manager allows remote, unauthenticated attackers to write arbi | |
| 3681 | CVE-2025-12548 |
|
54.9th | 9.0 | This vulnerability in Eclipse Che che-machine-exec allows unauthenticated attackers to execute arbit | |
| 3682 | CVE-2025-59470 |
|
54.9th | 9.0 | This vulnerability allows authenticated Backup Operators to execute arbitrary code as the postgres u | |
| 3683 | CVE-2025-21399 |
|
54.8th | 7.4 | This vulnerability in Microsoft Edge (Chromium-based) allows an attacker to elevate privileges on a | |
| 3684 | CVE-2024-56300 |
|
54.7th | 7.5 | This vulnerability in the WPSpins Post/Page Copying Tool WordPress plugin allows attackers to retrie | |
| 3685 | CVE-2025-27135 |
|
54.8th | 9.8 | CVE-2025-27135 is a critical SQL injection vulnerability in RAGFlow's ExeSQL component that allows a | |
| 3686 | CVE-2025-36625 |
|
54.7th | 4.3 | This vulnerability allows unauthenticated attackers to manipulate Nessus logging entries by sending | |
| 3687 | CVE-2025-3034 |
|
54.8th | 8.1 | This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruptio | |
| 3688 | CVE-2021-4465 |
|
54.8th | N/A | This vulnerability allows unauthenticated remote attackers to cause denial-of-service by sending a s | |
| 3689 | CVE-2025-27404 |
|
54.7th | 7.6 | This is a cross-site scripting (XSS) vulnerability in Icinga Web 2 that allows attackers to craft ma | |
| 3690 | CVE-2025-3410 |
|
54.7th | 6.3 | This critical vulnerability in mymagicpower AIAS allows remote attackers to upload arbitrary files w | |
| 3691 | CVE-2025-53867 |
|
54.7th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v | |
| 3692 | CVE-2024-42516 |
|
54.7th | 7.5 | This HTTP response splitting vulnerability in Apache HTTP Server allows attackers to manipulate Cont | |
| 3693 | CVE-2025-9048 |
|
54.7th | 8.1 | The Wptobe-memberships WordPress plugin contains an arbitrary file deletion vulnerability in the del | |
| 3694 | CVE-2025-10639 |
|
54.6th | 8.8 | CVE-2025-10639 allows attackers with network access to TCP port 12304 to use hardcoded FTP credentia | |
| 3695 | CVE-2025-10706 |
|
54.6th | 8.8 | The Classified Pro WordPress theme allows authenticated users with subscriber-level access or higher | |
| 3696 | CVE-2025-68271 |
|
54.7th | 10.0 | OpenC3 COSMOS versions 5.0.0 through 6.10.1 contain a critical remote code execution vulnerability i | |
| 3697 | CVE-2026-0404 |
|
54.6th | 8.0 | An insufficient input validation vulnerability in NETGEAR Orbi routers' DHCPv6 functionality allows | |
| 3698 | CVE-2025-64093 |
|
54.7th | 10.0 | This is a critical remote code execution vulnerability in Zenitel devices that allows unauthenticate | |
| 3699 | CVE-2024-57659 |
|
54.6th | 7.5 | This vulnerability in OpenLink Virtuoso OpenSource allows attackers to cause denial of service by se | |
| 3700 | CVE-2024-57655 |
|
54.6th | 7.5 | This vulnerability in OpenLink Virtuoso OpenSource allows attackers to cause denial of service by se |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free