Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4251 | CVE-2025-7945 |
|
50.8th | 8.8 | A critical buffer overflow vulnerability in D-Link DIR-513 routers allows remote attackers to execut | |
| 4252 | CVE-2025-10775 |
|
50.8th | 4.7 | This CVE describes an OS command injection vulnerability in Wavlink WL-NU516U1 routers that allows r | |
| 4253 | CVE-2025-35055 |
|
50.8th | 8.8 | This vulnerability allows authenticated attackers to upload arbitrary files to any writable location | |
| 4254 | CVE-2025-69260 |
|
50.8th | 7.5 | An out-of-bounds read vulnerability in Trend Micro Apex Central allows remote attackers to cause den | |
| 4255 | CVE-2026-20422 |
|
50.8th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service through improper input validat | |
| 4256 | CVE-2026-20421 |
|
50.8th | 6.5 | This vulnerability allows remote attackers to cause a system crash (denial of service) in affected m | |
| 4257 | CVE-2026-20420 |
|
50.8th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service through system crashes when de | |
| 4258 | CVE-2026-20405 |
|
50.8th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service through system crashes when de | |
| 4259 | CVE-2026-20404 |
|
50.8th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service through improper input validat | |
| 4260 | CVE-2026-20403 |
|
50.8th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service via system crash when a device | |
| 4261 | CVE-2026-20402 |
|
50.8th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service through improper input validat | |
| 4262 | CVE-2026-20401 |
|
50.8th | 7.5 | This vulnerability allows remote denial of service attacks against mobile devices with affected Medi | |
| 4263 | CVE-2025-0063 |
|
50.7th | 8.8 | SAP NetWeaver AS ABAP and ABAP Platform have an authorization bypass vulnerability in RFC function m | |
| 4264 | CVE-2024-11347 |
|
50.7th | 7.3 | An integer overflow vulnerability in Lexmark printer PostScript interpreters allows attackers to exe | |
| 4265 | CVE-2024-58087 |
|
50.7th | 8.1 | A race condition vulnerability in the Linux kernel's ksmbd (SMB server) component allows attackers t | |
| 4266 | CVE-2024-51461 |
|
50.7th | 4.3 | This vulnerability in IBM QRadar WinCollect Agent allows remote attackers to cause denial of service | |
| 4267 | CVE-2025-49181 |
|
50.7th | 8.6 | This vulnerability allows unauthorized users to access sensitive information via HTTP GET requests a | |
| 4268 | CVE-2025-10690 |
|
50.7th | 9.8 | This vulnerability allows unauthenticated attackers to upload arbitrary ZIP files containing malicio | |
| 4269 | CVE-2025-13592 |
|
50.7th | 7.2 | The Advanced Ads WordPress plugin up to version 2.0.14 contains a remote code execution vulnerabilit | |
| 4270 | CVE-2025-14703 |
|
50.7th | 5.3 | This vulnerability allows remote attackers to bypass authentication in Shiguangwu sgwbox N3 NAS devi | |
| 4271 | CVE-2025-68398 |
|
50.7th | 9.1 | This vulnerability in Weblate allows remote attackers to overwrite Git configuration settings, poten | |
| 4272 | CVE-2025-21332 |
|
50.6th | 4.3 | This CVE describes a security feature bypass vulnerability in the MapUrlToZone function, which is us | |
| 4273 | CVE-2024-55160 |
|
50.7th | 9.8 | GFast versions 2 through 3.2 contain a SQL injection vulnerability in the OrderBy parameter at the / | |
| 4274 | CVE-2025-32807 |
|
50.7th | 5.3 | A path traversal vulnerability in FusionDirectory allows remote attackers to read arbitrary files en | |
| 4275 | CVE-2025-11344 |
|
50.7th | 6.3 | This vulnerability in ILIAS learning management system allows remote attackers to execute arbitrary | |
| 4276 | CVE-2025-63918 |
|
50.6th | 6.2 | PDFPatcher contains a directory traversal vulnerability (CWE-22) where the executable fails to valid | |
| 4277 | CVE-2022-50696 |
|
50.6th | 9.8 | SOUND4 IMPACT/FIRST/PULSE/Eco devices versions 2.x and below contain hardcoded credentials in server | |
| 4278 | CVE-2025-68161 |
|
50.6th | 4.8 | This vulnerability in Apache Log4j Core allows man-in-the-middle attackers to intercept or redirect | |
| 4279 | CVE-2025-69906 |
|
50.6th | 8.8 | Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin that | |
| 4280 | CVE-2025-0680 |
|
50.6th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands on devices connected to the | |
| 4281 | CVE-2024-0136 |
|
50.5th | 7.6 | NVIDIA Container Toolkit has an improper isolation vulnerability where specially crafted container i | |
| 4282 | CVE-2024-0135 |
|
50.5th | 7.6 | NVIDIA Container Toolkit has an improper isolation vulnerability where malicious container images ca | |
| 4283 | CVE-2025-25008 |
|
50.5th | 7.1 | This CVE describes a local privilege escalation vulnerability in Microsoft Windows where an attacker | |
| 4284 | CVE-2025-24992 |
|
50.6th | 5.5 | This CVE describes a buffer over-read vulnerability in Windows NTFS that allows a local attacker to | |
| 4285 | CVE-2025-12676 |
|
50.6th | 5.3 | The KiotViet Sync WordPress plugin uses a hardcoded password for authentication, allowing unauthenti | |
| 4286 | CVE-2025-15099 |
|
50.6th | 7.3 | This vulnerability allows remote attackers to bypass authentication in simstudioai sim by manipulati | |
| 4287 | CVE-2025-69612 |
|
50.5th | 6.5 | This path traversal vulnerability in TMS Management Console allows authenticated users to read arbit | |
| 4288 | CVE-2024-28243 |
|
50.5th | 6.5 | KaTeX users who render untrusted mathematical expressions are vulnerable to a denial-of-service atta | |
| 4289 | CVE-2025-24357 |
|
50.4th | 7.5 | This vulnerability in vLLM allows remote code execution when loading malicious model checkpoints fro | |
| 4290 | CVE-2024-27781 |
|
50.4th | 7.1 | This is a cross-site scripting (XSS) vulnerability in Fortinet FortiSandbox that allows authenticate | |
| 4291 | CVE-2025-30372 |
|
50.4th | 9.8 | Emlog Pro versions 2.5.7 and 2.5.8 contain an SQL injection vulnerability in search_controller.php d | |
| 4292 | CVE-2025-25686 |
|
50.4th | 9.8 | This vulnerability allows attackers to execute arbitrary SQL commands through SEMCMS_Fuction.php in | |
| 4293 | CVE-2024-40073 |
|
50.4th | 9.8 | This SQL injection vulnerability in Sourcecodester Online ID Generator System 1.0 allows attackers t | |
| 4294 | CVE-2025-32728 |
|
50.4th | 4.3 | OpenSSH versions before 10.0 have a bug where the DisableForwarding directive fails to properly disa | |
| 4295 | CVE-2025-29369 |
|
50.4th | 9.8 | CVE-2025-29369 is a critical SQL injection vulnerability in Code-Projects Matrimonial Site V1.0 that | |
| 4296 | CVE-2025-45542 |
|
50.4th | 7.3 | A SQL injection vulnerability exists in the registrationform endpoint of CloudClassroom-PHP-Project | |
| 4297 | CVE-2025-52434 |
|
50.4th | 7.5 | A race condition vulnerability in Apache Tomcat's APR/Native connector when handling HTTP/2 connecti | |
| 4298 | CVE-2025-10156 |
|
50.4th | 9.8 | This vulnerability allows attackers to bypass security scans in mmaitre314 picklescan by crafting ZI | |
| 4299 | CVE-2025-63459 |
|
50.4th | 7.5 | This vulnerability is a stack overflow in Totolink A7000R routers that allows attackers to cause a D | |
| 4300 | CVE-2025-63464 |
|
50.4th | 7.5 | This CVE describes a stack overflow vulnerability in Totolink LR350 routers via the ssid parameter. |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free