Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 351 | CVE-2025-13326 |
|
2.5th | 3.9 | Mattermost Desktop App versions before 6.0.0 for macOS fail to enable Hardened Runtime when packaged | |
| 352 | CVE-2026-2069 |
|
2.5th | 3.3 | A stack-based buffer overflow vulnerability exists in llama.cpp's GBNF grammar handler. This allows | |
| 353 | CVE-2026-1990 |
|
2.5th | 3.3 | A null pointer dereference vulnerability in oatpp versions up to 1.3.1 allows local attackers to cau | |
| 354 | CVE-2025-36411 |
|
2.2th | 3.5 | IBM ApplinX 11.1 contains a cross-site request forgery (CSRF) vulnerability that allows attackers to | |
| 355 | CVE-2025-15535 |
|
2.4th | 3.3 | A null pointer dereference vulnerability in nicbarker clay library versions up to 0.14 allows local | |
| 356 | CVE-2026-1991 |
|
2.5th | 3.3 | This vulnerability in libuvc allows local attackers to cause a denial of service through null pointe | |
| 357 | CVE-2025-14836 |
|
2.2th | 2.7 | This vulnerability in ZZCMS 2025 allows attackers to store user data in cleartext on disk through th | |
| 358 | CVE-2025-31186 |
|
2.1th | 3.3 | This CVE describes a permissions vulnerability in Xcode that allows applications to bypass macOS Pri | |
| 359 | CVE-2025-15564 |
|
2.5th | 3.3 | This vulnerability in Mapnik up to version 4.2.0 allows local attackers to trigger a divide-by-zero | |
| 360 | CVE-2025-12734 |
|
2.4th | 3.5 | This vulnerability allows authenticated GitLab users to inject malicious HTML content into merge req | |
| 361 | CVE-2025-65185 |
|
2.2th | 2.8 | This vulnerability in Entrinsik Informer v5.10.1 allows attackers to enumerate valid usernames by an | |
| 362 | CVE-2025-66556 |
|
1.9th | 3.5 | This vulnerability in Nextcloud Talk allows participants with chat permissions to delete poll drafts | |
| 363 | CVE-2026-1751 |
|
1.9th | 3.1 | This vulnerability in GitLab CE/EE allows unauthorized users to edit merge request approval rules un | |
| 364 | CVE-2025-46277 |
|
1.9th | 3.3 | A macOS, iOS, iPadOS, and watchOS vulnerability allows applications to access a user's Safari browsi | |
| 365 | CVE-2025-43517 |
|
1.9th | 3.3 | This CVE describes a macOS privacy vulnerability where applications could access protected user data | |
| 366 | CVE-2025-43518 |
|
1.9th | 3.3 | This CVE describes a logic flaw in Apple's spellcheck API that could allow malicious applications to | |
| 367 | CVE-2026-1485 |
|
2th | 2.8 | A buffer underflow vulnerability in Glib's content type parsing logic allows integer wraparound for | |
| 368 | CVE-2025-57840 |
|
2th | 2.2 | This CVE describes a privilege bypass vulnerability in Android Debug Bridge (ADB) that could allow u | |
| 369 | CVE-2026-2241 |
|
1.9th | 3.3 | CVE-2026-2241 is an out-of-bounds read vulnerability in the os_strftime function of Janet programmin | |
| 370 | CVE-2026-2242 |
|
1.9th | 3.3 | This vulnerability in janet-lang allows local attackers to perform out-of-bounds read operations via | |
| 371 | CVE-2025-3950 |
|
2th | 3.5 | This vulnerability in GitLab allows authenticated users to bypass asset proxy protection by referenc | |
| 372 | CVE-2026-2240 |
|
1.9th | 3.3 | CVE-2026-2240 is an out-of-bounds read vulnerability in the janet programming language's compiler fu | |
| 373 | CVE-2025-57784 |
|
1.4th | 3.3 | A timing attack vulnerability exists in Hiawatha webserver version 11.7's Tomahawk management client | |
| 374 | CVE-2025-66548 |
|
1.4th | 3.3 | This vulnerability in Nextcloud Deck allows attackers to spoof file extensions using Right-to-Left O | |
| 375 | CVE-2025-43404 |
|
1.4th | 3.3 | A sandbox escape vulnerability in macOS allows malicious applications to bypass intended restriction | |
| 376 | CVE-2025-43516 |
|
1.6th | 3.3 | A session management vulnerability in macOS Voice Control allows users with Voice Control enabled to | |
| 377 | CVE-2025-12792 |
|
1.6th | 3.2 | The Canva for Mac desktop app distributed through the Mac App Store was built without Apple's Harden | |
| 378 | CVE-2025-14594 |
|
1.6th | 3.5 | This vulnerability allows authenticated users to view certain pipeline values via API queries in aff | |
| 379 | CVE-2026-20646 |
|
1.6th | 3.3 | A macOS logging vulnerability allows malicious applications to access sensitive location information | |
| 380 | CVE-2026-21674 |
|
1.7th | 3.3 | CVE-2026-21674 is a memory leak vulnerability in iccDEV's XML parsing functionality (iccFromXml) tha | |
| 381 | CVE-2026-20681 |
|
1.6th | 3.3 | This macOS vulnerability allows applications to access sensitive contact information that should be | |
| 382 | CVE-2026-2245 |
|
1.7th | 3.3 | An out-of-bounds read vulnerability exists in CCExtractor's MPEG-TS file parser affecting versions u | |
| 383 | CVE-2025-67852 |
|
1.6th | 3.5 | An open redirect vulnerability in Moodle's OAuth login flow allows attackers to redirect authenticat | |
| 384 | CVE-2025-13611 |
|
1.4th | 2.0 | This vulnerability in GitLab CE/EE allows authenticated users with access to certain logs to obtain | |
| 385 | CVE-2026-22250 |
|
1.4th | 2.5 | CVE-2026-22250 is a vulnerability in the wlc Weblate command-line client where SSL certificate verif | |
| 386 | CVE-2026-1409 |
|
1.4th | 2.0 | This vulnerability in Beetel 777VR1 routers allows attackers to bypass authentication rate limiting | |
| 387 | CVE-2025-65083 |
|
1.2th | 3.2 | GoSign Desktop versions through 2.4.1 disable TLS certificate validation when configured to use a pr | |
| 388 | CVE-2026-24883 |
|
1.3th | 3.7 | This vulnerability in GnuPG allows an attacker to crash the application by sending a specially craft | |
| 389 | CVE-2025-40818 |
|
1th | 3.3 | SINEMA Remote Connect Server versions before V3.2 SP4 store SSL/TLS private keys with insufficient p | |
| 390 | CVE-2026-25815 |
|
1th | 3.2 | This vulnerability allows attackers to decrypt LDAP credentials stored in FortiOS configuration file | |
| 391 | CVE-2026-20601 |
|
0.9th | 3.3 | This CVE describes a permissions vulnerability in macOS that allows applications to monitor keystrok | |
| 392 | CVE-2025-59700 |
|
1th | 3.9 | This vulnerability allows a physically proximate attacker with root access to modify the Recovery Pa | |
| 393 | CVE-2025-13053 |
|
1th | 3.7 | This vulnerability allows man-in-the-middle attackers to intercept and potentially modify communicat | |
| 394 | CVE-2026-1700 |
|
1th | 3.5 | This vulnerability allows remote attackers to inject malicious scripts via the Message parameter in | |
| 395 | CVE-2026-20656 |
|
1th | 3.3 | A logic vulnerability in Apple's iOS, iPadOS, Safari, and macOS allows malicious applications to acc | |
| 396 | CVE-2025-12654 |
|
0.9th | 2.7 | The WPvivid Backup & Migration WordPress plugin allows authenticated attackers with Administrator pr | |
| 397 | CVE-2025-24090 |
|
1th | 3.3 | This CVE describes an information disclosure vulnerability in iOS/iPadOS where malicious apps could | |
| 398 | CVE-2025-15288 |
|
0.8th | 3.1 | CVE-2025-15288 is an improper access control vulnerability in Tanium Interact that could allow authe | |
| 399 | CVE-2026-25046 |
|
0.7th | 2.9 | This vulnerability allows arbitrary command execution through shell injection in development scripts | |
| 400 | CVE-2026-20663 |
|
0.8th | 3.3 | This vulnerability allows malicious apps to enumerate a user's installed applications on iOS and iPa |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free