Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3901 | CVE-2025-26375 |
|
53.3th | 8.8 | This vulnerability allows authenticated low-privileged users in Q-Free MaxTime systems to create new | |
| 3902 | CVE-2025-26371 |
|
53.3th | 8.8 | This vulnerability allows authenticated low-privileged attackers to add users to groups in Q-Free Ma | |
| 3903 | CVE-2025-26369 |
|
53.3th | 8.8 | A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to | |
| 3904 | CVE-2025-25680 |
|
53.2th | 7.7 | This vulnerability allows remote code execution on LSC Smart Connect Indoor PTZ Cameras when a speci | |
| 3905 | CVE-2025-46420 |
|
53.2th | 6.5 | A memory leak vulnerability in libsoup's soup_header_parse_quality_list() function allows attackers | |
| 3906 | CVE-2025-29150 |
|
53.3th | 4.3 | BlueCMS 1.6 contains an arbitrary file deletion vulnerability that allows attackers to delete files | |
| 3907 | CVE-2025-47884 |
|
53.2th | 9.1 | This vulnerability in Jenkins OpenID Connect Provider Plugin allows attackers who can configure jobs | |
| 3908 | CVE-2025-9938 |
|
53.2th | 8.8 | This CVE describes a remote stack-based buffer overflow vulnerability in D-Link DI-8400 routers. Att | |
| 3909 | CVE-2025-12138 |
|
53.2th | 8.8 | The URL Image Importer WordPress plugin allows authenticated attackers with Author-level access or h | |
| 3910 | CVE-2025-67818 |
|
53.2th | 7.2 | This vulnerability allows attackers with database write access to craft malicious entry names contai | |
| 3911 | CVE-2025-50334 |
|
53.2th | 7.5 | A vulnerability in Technitium DNS Server v13.5 allows remote attackers to trigger a denial of servic | |
| 3912 | CVE-2025-20088 |
|
53.2th | 6.5 | Mattermost fails to properly validate post properties, allowing authenticated malicious users to cra | |
| 3913 | CVE-2024-57634 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's exp_copy component allows attackers to execute crafted SQL st | |
| 3914 | CVE-2024-57632 |
|
53.2th | 7.5 | A SQL injection vulnerability in MonetDB Server's is_column_unique component allows attackers to exe | |
| 3915 | CVE-2024-57631 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's exp_ref component allows attackers to execute crafted SQL sta | |
| 3916 | CVE-2024-57630 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's exps_card component allows attackers to execute crafted SQL s | |
| 3917 | CVE-2024-57629 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's tail_type component allows attackers to execute crafted SQL s | |
| 3918 | CVE-2024-57628 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server allows attackers to execute crafted SQL statements that trigger | |
| 3919 | CVE-2024-57627 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's gc_col component allows attackers to execute crafted SQL stat | |
| 3920 | CVE-2024-57626 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's mat_join2 component allows attackers to execute crafted SQL s | |
| 3921 | CVE-2024-57625 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server allows attackers to execute crafted SQL statements that trigger | |
| 3922 | CVE-2024-57624 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's exp_atom component allows attackers to execute crafted SQL st | |
| 3923 | CVE-2024-57622 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's exp_bin component allows attackers to execute crafted SQL sta | |
| 3924 | CVE-2024-57621 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's GDKanalytical_correlation component allows attackers to execu | |
| 3925 | CVE-2024-57620 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's trimchars component allows attackers to execute crafted SQL s | |
| 3926 | CVE-2024-57619 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's atom_get_int component allows attackers to execute crafted SQ | |
| 3927 | CVE-2024-57617 |
|
53.2th | 7.5 | This vulnerability in MonetDB Server's dameraulevenshtein component allows attackers to execute craf | |
| 3928 | CVE-2025-21404 |
|
53.1th | 4.3 | This vulnerability in Microsoft Edge allows attackers to spoof UI elements, potentially tricking use | |
| 3929 | CVE-2025-25065 |
|
53.1th | 5.3 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Zimbra Collaboration's RSS | |
| 3930 | CVE-2024-12020 |
|
53.2th | 6.1 | This is a reflected cross-site scripting (XSS) vulnerability in LogicalDOC Enterprise's JSP files, a | |
| 3931 | CVE-2024-55597 |
|
53.2th | 5.5 | This path traversal vulnerability in Fortinet FortiWeb web application firewalls allows attackers to | |
| 3932 | CVE-2024-8262 |
|
53.2th | 9.8 | This path traversal vulnerability in Proliz Software OBS allows attackers to access files outside th | |
| 3933 | CVE-2024-41796 |
|
53.1th | 6.5 | This vulnerability allows unauthenticated attackers to change the login password on SENTRON 7KT PAC1 | |
| 3934 | CVE-2025-29534 |
|
53.2th | 8.8 | An authenticated remote code execution vulnerability in PowerStick Wave Dual-Band Wifi Extender V1.0 | |
| 3935 | CVE-2025-9603 |
|
53.1th | 6.3 | This CVE describes a command injection vulnerability in Telesquare TLR-2005KSH routers version 1.2.4 | |
| 3936 | CVE-2025-48978 |
|
53.2th | 7.5 | This vulnerability allows attackers with network access adjacent to an EdgeSwitch to execute arbitra | |
| 3937 | CVE-2025-27211 |
|
53.2th | 7.5 | CVE-2025-27211 is an improper input validation vulnerability in EdgeMAX EdgeSwitch that allows comma | |
| 3938 | CVE-2023-53869 |
|
53.2th | N/A | WEBIGniter 28.7.23 contains an unrestricted file upload vulnerability that allows authenticated atta | |
| 3939 | CVE-2025-34504 |
|
53.1th | 6.1 | KodExplorer 4.52 contains an open redirect vulnerability in the user login page. Attackers can manip | |
| 3940 | CVE-2023-53770 |
|
53.1th | 7.5 | MiniDVBLinux 5.4 contains an unauthenticated configuration download vulnerability that allows remote | |
| 3941 | CVE-2026-20759 |
|
53.2th | 8.8 | An OS command injection vulnerability in TOA Corporation TRIFORA 3 series network cameras allows aut | |
| 3942 | CVE-2025-20794 |
|
53.2th | 6.5 | This vulnerability in MediaTek modems allows improper input validation to cause system crashes, lead | |
| 3943 | CVE-2026-24788 |
|
53.2th | 8.8 | CVE-2026-24788 is an OS command injection vulnerability in RaspAP raspap-webgui that allows authenti | |
| 3944 | CVE-2025-2107 |
|
53.1th | 7.5 | This SQL injection vulnerability in the ArielBrailovsky-ViralAd WordPress plugin allows unauthentica | |
| 3945 | CVE-2025-3764 |
|
53th | 6.3 | This critical vulnerability in SourceCodester Web-based Pharmacy Product Management System 1.0 allow | |
| 3946 | CVE-2025-2291 |
|
53.1th | 8.1 | This vulnerability in PgBouncer allows attackers to authenticate with expired passwords when using a | |
| 3947 | CVE-2025-5082 |
|
53.1th | 6.1 | The WP Attachments WordPress plugin has a reflected cross-site scripting vulnerability in all versio | |
| 3948 | CVE-2025-4279 |
|
53th | 8.8 | The External Image Replace WordPress plugin allows authenticated attackers with contributor-level pe | |
| 3949 | CVE-2025-57105 |
|
53.1th | 9.8 | The DI-7400G+ router contains a command injection vulnerability in its web interface that allows att | |
| 3950 | CVE-2025-9244 |
|
53.1th | 6.3 | This CVE describes an OS command injection vulnerability in Linksys RE series range extenders. Attac |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free