Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4501 | CVE-2025-8060 |
|
49.1th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC23 routers allows remote attackers t | |
| 4502 | CVE-2025-7468 |
|
49.1th | 8.8 | A critical buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers to execute | |
| 4503 | CVE-2025-7465 |
|
49.1th | 8.8 | A critical buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers to execute | |
| 4504 | CVE-2025-7463 |
|
49.1th | 8.8 | A critical buffer overflow vulnerability in Tenda FH1201 routers allows remote attackers to execute | |
| 4505 | CVE-2024-46484 |
|
49.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDne | |
| 4506 | CVE-2025-0074 |
|
49.1th | 9.8 | This critical vulnerability in Android's Bluetooth stack allows remote attackers to execute arbitrar | |
| 4507 | CVE-2025-9443 |
|
49.1th | 8.8 | A buffer overflow vulnerability in Tenda CH22 routers allows remote attackers to execute arbitrary c | |
| 4508 | CVE-2025-9252 |
|
49.1th | 8.8 | A stack-based buffer overflow vulnerability in Linksys WiFi range extenders allows remote attackers | |
| 4509 | CVE-2025-9250 |
|
49.1th | 8.8 | A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac | |
| 4510 | CVE-2025-9248 |
|
49.1th | 8.8 | A stack-based buffer overflow vulnerability in Linksys RE-series range extenders allows remote attac | |
| 4511 | CVE-2025-9245 |
|
49.1th | 8.8 | A stack-based buffer overflow vulnerability in Linksys WiFi range extenders allows remote attackers | |
| 4512 | CVE-2025-9006 |
|
49.1th | 8.8 | A buffer overflow vulnerability in Tenda CH22 router firmware version 1.0.0.1 allows remote attacker | |
| 4513 | CVE-2025-57631 |
|
49.1th | 9.8 | A critical SQL injection vulnerability in TDuckCloud v5.1 allows remote attackers to execute arbitra | |
| 4514 | CVE-2025-65480 |
|
49th | 8.8 | This vulnerability allows authenticated users of Pacom Unison Client 5.13.1 to inject malicious scri | |
| 4515 | CVE-2025-66052 |
|
49.1th | 7.2 | Vivotek IP7137 cameras with vulnerable firmware allow authenticated attackers to execute arbitrary s | |
| 4516 | CVE-2023-40327 |
|
48.9th | 6.5 | This CVE describes a missing authorization vulnerability in the Putler Connector for WooCommerce plu | |
| 4517 | CVE-2023-47648 |
|
48.9th | 7.5 | A missing authorization vulnerability in the EazyDocs WordPress plugin allows attackers to bypass ac | |
| 4518 | CVE-2025-1006 |
|
48.9th | 8.8 | This is a use-after-free vulnerability in Chrome's Network component that allows remote attackers to | |
| 4519 | CVE-2025-26779 |
|
48.9th | 4.9 | This path traversal vulnerability in the Keep Backup Daily WordPress plugin allows attackers to down | |
| 4520 | CVE-2025-23015 |
|
48.9th | 8.8 | This vulnerability allows users with MODIFY permission on all keyspaces in Apache Cassandra to escal | |
| 4521 | CVE-2025-24239 |
|
48.9th | 6.5 | This CVE describes a macOS code-signing downgrade vulnerability that allows malicious applications t | |
| 4522 | CVE-2025-29826 |
|
48.9th | 7.3 | CVE-2025-29826 is a privilege escalation vulnerability in Microsoft Dataverse where improper handlin | |
| 4523 | CVE-2025-26684 |
|
48.9th | 6.7 | This vulnerability in Microsoft Defender for Endpoint allows an authorized attacker to manipulate fi | |
| 4524 | CVE-2024-37396 |
|
48.9th | 5.4 | This stored XSS vulnerability in REDCap's Calendar function allows authenticated users to inject mal | |
| 4525 | CVE-2024-37394 |
|
48.9th | 5.4 | This stored XSS vulnerability in REDCap allows authenticated users to inject malicious scripts into | |
| 4526 | CVE-2025-9365 |
|
48.9th | 7.8 | Fuji Electric FRENIC-Loader 4 contains a deserialization vulnerability when importing files through | |
| 4527 | CVE-2025-61582 |
|
48.9th | 7.5 | CVE-2025-61582 is a denial-of-service vulnerability in TS3 Manager web interface versions 2.2.1 and | |
| 4528 | CVE-2025-14043 |
|
48.9th | 5.3 | The Tainacan WordPress plugin has an authorization bypass vulnerability that allows unauthenticated | |
| 4529 | CVE-2026-23699 |
|
48.9th | 7.2 | This CVE describes an OS command injection vulnerability in Ruijie AP180 series access points runnin | |
| 4530 | CVE-2025-26966 |
|
48.8th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication in the PrivateContent W | |
| 4531 | CVE-2025-27595 |
|
48.9th | 9.8 | This vulnerability allows attackers to easily calculate matching passwords due to weak hashing algor | |
| 4532 | CVE-2025-8420 |
|
48.8th | 8.1 | The Request a Quote Form WordPress plugin versions ≤2.5.2 contain a remote code execution vulnerab | |
| 4533 | CVE-2025-10680 |
|
48.8th | 8.8 | This vulnerability allows a malicious OpenVPN server to execute arbitrary shell commands on client s | |
| 4534 | CVE-2025-61455 |
|
48.8th | 9.8 | CVE-2025-61455 is a critical SQL injection vulnerability in Bhabishya-123 E-commerce 1.0 that allows | |
| 4535 | CVE-2025-59944 |
|
48.8th | 8.0 | This vulnerability in Cursor IDE allows attackers to bypass case-sensitive file protection checks on | |
| 4536 | CVE-2025-68667 |
|
48.8th | N/A | This vulnerability allows remote unauthenticated attackers to forge membership events on vulnerable | |
| 4537 | CVE-2025-14499 |
|
48.8th | 8.8 | This is a cross-site scripting (XSS) vulnerability in IceWarp's gmaps webpage that allows remote att | |
| 4538 | CVE-2025-66214 |
|
48.8th | 7.0 | This vulnerability in Ladybug allows attackers to upload malicious XML files that get deserialized, | |
| 4539 | CVE-2024-43708 |
|
48.8th | 6.5 | This vulnerability allows authenticated users with read access to Kibana to send specially crafted p | |
| 4540 | CVE-2024-54533 |
|
48.8th | 7.0 | This CVE describes a macOS sandbox escape vulnerability where malicious applications can bypass sand | |
| 4541 | CVE-2025-21619 |
|
48.7th | 9.8 | This SQL injection vulnerability in GLPI allows administrator users to execute arbitrary SQL command | |
| 4542 | CVE-2025-39470 |
|
48.8th | 8.1 | This path traversal vulnerability in the Ivy School WordPress theme allows attackers to include loca | |
| 4543 | CVE-2025-32587 |
|
48.8th | 8.1 | This CVE describes a path traversal vulnerability in the WooCommerce Pickupp plugin that allows atta | |
| 4544 | CVE-2025-30582 |
|
48.8th | 8.1 | This path traversal vulnerability in DyaPress ERP/CRM allows attackers to include arbitrary PHP file | |
| 4545 | CVE-2025-3176 |
|
48.8th | 7.3 | This critical SQL injection vulnerability in Project Worlds Online Lawyer Management System 1.0 allo | |
| 4546 | CVE-2025-3172 |
|
48.8th | 7.3 | A critical SQL injection vulnerability exists in Project Worlds Online Lawyer Management System 1.0 | |
| 4547 | CVE-2025-51630 |
|
48.7th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK N350RT routers by e | |
| 4548 | CVE-2026-0656 |
|
48.7th | 8.2 | The iPaymu Payment Gateway for WooCommerce WordPress plugin has a missing authentication vulnerabili | |
| 4549 | CVE-2025-59157 |
|
48.7th | 9.9 | CVE-2025-59157 is a command injection vulnerability in Coolify's Git Repository field during project | |
| 4550 | CVE-2023-37024 |
|
48.6th | 7.5 | An unauthenticated remote attacker can crash the Mobile Management Entity (MME) in Magma cellular co |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free