Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4501 CVE-2025-8060
0.26%
49.1th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC23 routers allows remote attackers t
4502 CVE-2025-7468
0.26%
49.1th 8.8 A critical buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers to execute
4503 CVE-2025-7465
0.26%
49.1th 8.8 A critical buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers to execute
4504 CVE-2025-7463
0.26%
49.1th 8.8 A critical buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers to execute
4505 CVE-2024-46484
0.26%
49.1th 9.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDne
4506 CVE-2025-0074
0.26%
49.1th 9.8 This critical vulnerability in Android's Bluetooth stack allows remote attackers to execute arbitrar
4507 CVE-2025-9443
0.26%
49.1th 8.8 A buffer overflow vulnerability in Tenda CH22 routers allows remote attackers to execute arbitrary c
4508 CVE-2025-9252
0.26%
49.1th 8.8 A stack-based buffer overflow vulnerability in Linksys WiFi range extenders allows remote attackers
4509 CVE-2025-9250
0.26%
49.1th 8.8 A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac
4510 CVE-2025-9248
0.26%
49.1th 8.8 A stack-based buffer overflow vulnerability in Linksys RE-series range extenders allows remote attac
4511 CVE-2025-9245
0.26%
49.1th 8.8 A stack-based buffer overflow vulnerability in Linksys WiFi range extenders allows remote attackers
4512 CVE-2025-9006
0.26%
49.1th 8.8 A buffer overflow vulnerability in Tenda CH22 router firmware version 1.0.0.1 allows remote attacker
4513 CVE-2025-57631
0.26%
49.1th 9.8 A critical SQL injection vulnerability in TDuckCloud v5.1 allows remote attackers to execute arbitra
4514 CVE-2025-65480
0.26%
49th 8.8 This vulnerability allows authenticated users of Pacom Unison Client 5.13.1 to inject malicious scri
4515 CVE-2025-66052
0.26%
49.1th 7.2 Vivotek IP7137 cameras with vulnerable firmware allow authenticated attackers to execute arbitrary s
4516 CVE-2023-40327
0.26%
48.9th 6.5 This CVE describes a missing authorization vulnerability in the Putler Connector for WooCommerce plu
4517 CVE-2023-47648
0.26%
48.9th 7.5 A missing authorization vulnerability in the EazyDocs WordPress plugin allows attackers to bypass ac
4518 CVE-2025-1006
0.26%
48.9th 8.8 This is a use-after-free vulnerability in Chrome's Network component that allows remote attackers to
4519 CVE-2025-26779
0.26%
48.9th 4.9 This path traversal vulnerability in the Keep Backup Daily WordPress plugin allows attackers to down
4520 CVE-2025-23015
0.26%
48.9th 8.8 This vulnerability allows users with MODIFY permission on all keyspaces in Apache Cassandra to escal
4521 CVE-2025-24239
0.26%
48.9th 6.5 This CVE describes a macOS code-signing downgrade vulnerability that allows malicious applications t
4522 CVE-2025-29826
0.26%
48.9th 7.3 CVE-2025-29826 is a privilege escalation vulnerability in Microsoft Dataverse where improper handlin
4523 CVE-2025-26684
0.26%
48.9th 6.7 This vulnerability in Microsoft Defender for Endpoint allows an authorized attacker to manipulate fi
4524 CVE-2024-37396
0.26%
48.9th 5.4 This stored XSS vulnerability in REDCap's Calendar function allows authenticated users to inject mal
4525 CVE-2024-37394
0.26%
48.9th 5.4 This stored XSS vulnerability in REDCap allows authenticated users to inject malicious scripts into
4526 CVE-2025-9365
0.26%
48.9th 7.8 Fuji Electric FRENIC-Loader 4 contains a deserialization vulnerability when importing files through
4527 CVE-2025-61582
0.26%
48.9th 7.5 CVE-2025-61582 is a denial-of-service vulnerability in TS3 Manager web interface versions 2.2.1 and
4528 CVE-2025-14043
0.26%
48.9th 5.3 The Tainacan WordPress plugin has an authorization bypass vulnerability that allows unauthenticated
4529 CVE-2026-23699
0.26%
48.9th 7.2 This CVE describes an OS command injection vulnerability in Ruijie AP180 series access points runnin
4530 CVE-2025-26966
0.26%
48.8th 9.8 This vulnerability allows unauthenticated attackers to bypass authentication in the PrivateContent W
4531 CVE-2025-27595
0.26%
48.9th 9.8 This vulnerability allows attackers to easily calculate matching passwords due to weak hashing algor
4532 CVE-2025-8420
0.26%
48.8th 8.1 The Request a Quote Form WordPress plugin versions ≤2.5.2 contain a remote code execution vulnerab
4533 CVE-2025-10680
0.26%
48.8th 8.8 This vulnerability allows a malicious OpenVPN server to execute arbitrary shell commands on client s
4534 CVE-2025-61455
0.26%
48.8th 9.8 CVE-2025-61455 is a critical SQL injection vulnerability in Bhabishya-123 E-commerce 1.0 that allows
4535 CVE-2025-59944
0.26%
48.8th 8.0 This vulnerability in Cursor IDE allows attackers to bypass case-sensitive file protection checks on
4536 CVE-2025-68667
0.26%
48.8th N/A This vulnerability allows remote unauthenticated attackers to forge membership events on vulnerable
4537 CVE-2025-14499
0.26%
48.8th 8.8 This is a cross-site scripting (XSS) vulnerability in IceWarp's gmaps webpage that allows remote att
4538 CVE-2025-66214
0.26%
48.8th 7.0 This vulnerability in Ladybug allows attackers to upload malicious XML files that get deserialized,
4539 CVE-2024-43708
0.26%
48.8th 6.5 This vulnerability allows authenticated users with read access to Kibana to send specially crafted p
4540 CVE-2024-54533
0.26%
48.8th 7.0 This CVE describes a macOS sandbox escape vulnerability where malicious applications can bypass sand
4541 CVE-2025-21619
0.26%
48.7th 9.8 This SQL injection vulnerability in GLPI allows administrator users to execute arbitrary SQL command
4542 CVE-2025-39470
0.26%
48.8th 8.1 This path traversal vulnerability in the Ivy School WordPress theme allows attackers to include loca
4543 CVE-2025-32587
0.26%
48.8th 8.1 This CVE describes a path traversal vulnerability in the WooCommerce Pickupp plugin that allows atta
4544 CVE-2025-30582
0.26%
48.8th 8.1 This path traversal vulnerability in DyaPress ERP/CRM allows attackers to include arbitrary PHP file
4545 CVE-2025-3176
0.26%
48.8th 7.3 This critical SQL injection vulnerability in Project Worlds Online Lawyer Management System 1.0 allo
4546 CVE-2025-3172
0.26%
48.8th 7.3 A critical SQL injection vulnerability exists in Project Worlds Online Lawyer Management System 1.0
4547 CVE-2025-51630
0.26%
48.7th 9.8 This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK N350RT routers by e
4548 CVE-2026-0656
0.26%
48.7th 8.2 The iPaymu Payment Gateway for WooCommerce WordPress plugin has a missing authentication vulnerabili
4549 CVE-2025-59157
0.26%
48.7th 9.9 CVE-2025-59157 is a command injection vulnerability in Coolify's Git Repository field during project
4550 CVE-2023-37024
0.26%
48.6th 7.5 An unauthenticated remote attacker can crash the Mobile Management Entity (MME) in Magma cellular co

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free