Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4651 CVE-2025-24224
0.25%
47.9th 7.5 This vulnerability allows a remote attacker to cause unexpected system termination (crash/reboot) on
4652 CVE-2025-15194
0.25%
47.9th 9.8 A stack-based buffer overflow vulnerability in the hedwig.cgi HTTP header handler of D-Link DIR-600
4653 CVE-2023-53775
0.25%
48th 6.5 CVE-2023-53775 is an authentication bypass vulnerability in Screen SFT DAB 1.9.3 that allows attacke
4654 CVE-2022-44151
0.25%
48th 9.8 CVE-2022-44151 is a critical SQL injection vulnerability in Simple Inventory Management System v1.0'
4655 CVE-2025-22960
0.25%
47.9th 8.0 Unauthenticated attackers can access debug log files containing session IDs and authentication token
4656 CVE-2024-34897
0.25%
47.9th 7.5 The Nedis SmartLife Android app v1.4.0 contains an API key disclosure vulnerability that allows atta
4657 CVE-2024-45569
0.25%
47.9th 9.8 This vulnerability allows remote attackers to execute arbitrary code or cause denial of service by s
4658 CVE-2025-3572
0.25%
47.9th 7.5 SmartRobot from INTUMIT has an unauthenticated Server-Side Request Forgery vulnerability that allows
4659 CVE-2025-55599
0.25%
47.9th 7.5 A buffer overflow vulnerability in D-Link DIR-619L routers allows attackers to execute arbitrary cod
4660 CVE-2025-54763
0.25%
47.9th 7.2 This CVE describes an OS command injection vulnerability in FutureNet MA and IP-K series devices fro
4661 CVE-2025-9952
0.25%
47.9th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'range-date'
4662 CVE-2025-61590
0.25%
47.8th 7.5 This vulnerability allows remote code execution in Cursor AI code editor versions 1.6 and below thro
4663 CVE-2025-11230
0.25%
47.9th 7.5 This vulnerability in HAProxy's mjson library allows remote attackers to cause denial of service thr
4664 CVE-2025-23949
0.25%
47.8th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
4665 CVE-2024-57761
0.25%
47.8th 8.1 An arbitrary file upload vulnerability in JeeWMS allows attackers to upload malicious files that can
4666 CVE-2025-22508
0.25%
47.8th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
4667 CVE-2025-26985
0.25%
47.8th 8.1 This vulnerability allows attackers to include local files on the server through PHP's include/requi
4668 CVE-2024-11499
0.25%
47.8th 4.9 An authenticated attacker can trigger a restart of RTU500 CMU units by updating certificates during
4669 CVE-2025-1451
0.25%
47.8th 7.5 This vulnerability in parisneo/lollms-webui allows attackers to cause denial of service by sending s
4670 CVE-2025-46550
0.25%
47.7th 4.3 This is a reflected cross-site scripting (XSS) vulnerability in YesWiki's /?BazaR endpoint via the i
4671 CVE-2025-33028
0.25%
47.8th 6.1 This CVE describes a Mark-of-the-Web bypass vulnerability in WinZip where extracted files from craft
4672 CVE-2025-5257
0.25%
47.8th 6.5 This vulnerability allows unauthenticated users to access unpublished page previews in Mautic via pr
4673 CVE-2025-45343
0.25%
47.8th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda W18E routers by exploi
4674 CVE-2025-9392
0.25%
47.8th 8.8 A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac
4675 CVE-2025-8895
0.25%
47.7th 9.8 The WP Webhooks WordPress plugin allows unauthenticated attackers to copy arbitrary files on the ser
4676 CVE-2025-24285
0.25%
47.8th 9.8 This CVE describes command injection vulnerabilities in UniFi Connect EV Station Lite that allow att
4677 CVE-2025-8310
0.25%
47.8th 6.5 This vulnerability allows authenticated remote attackers to reset administrator passwords in Ivanti
4678 CVE-2025-57446
0.25%
47.8th 7.5 A vulnerability in O-RAN Near Realtime RIC ric-plt-submgr allows remote attackers to cause denial of
4679 CVE-2020-36856
0.25%
47.8th 8.8 This vulnerability allows authenticated users with Core Config Manager access in Nagios XI to execut
4680 CVE-2025-13320
0.25%
47.7th 6.8 The WP User Manager WordPress plugin has an arbitrary file deletion vulnerability that allows authen
4681 CVE-2024-5743
0.25%
47.6th 9.8 This vulnerability in EveHome Eve Play allows attackers to exploit weak password hashing to execute
4682 CVE-2025-25186
0.25%
47.7th 6.5 This vulnerability in Ruby's Net::IMAP library allows a malicious IMAP server to cause denial of ser
4683 CVE-2025-1705
0.25%
47.7th 6.1 The tagDiv Composer WordPress plugin has a CSRF vulnerability that allows unauthenticated attackers
4684 CVE-2025-2339
0.25%
47.7th 5.3 CVE-2025-2339 is an improper authentication vulnerability in otale Tale Blog 2.0.5 that allows remot
4685 CVE-2025-3573
0.25%
47.7th 6.1 This vulnerability allows attackers to inject malicious scripts into web pages using the jQuery Vali
4686 CVE-2025-32201
0.25%
47.6th 4.3 This CVE describes a missing authorization vulnerability in the Xpro Theme Builder WordPress plugin
4687 CVE-2026-25108
0.25%
47.7th 8.8 FileZen contains an OS command injection vulnerability that allows authenticated users to execute ar
4688 CVE-2025-4442
0.25%
47.7th 8.8 A critical buffer overflow vulnerability in D-Link DIR-605L routers allows remote attackers to execu
4689 CVE-2025-4342
0.25%
47.7th 8.8 A critical buffer overflow vulnerability in D-Link DIR-600L routers allows remote attackers to execu
4690 CVE-2025-68389
0.25%
47.7th 6.5 This vulnerability allows authenticated Kibana users with low privileges to send crafted HTTP reques
4691 CVE-2025-34256
0.25%
47.6th 9.8 This vulnerability allows remote unauthenticated attackers to forge JWT tokens using a hard-coded cr
4692 CVE-2025-21566
0.25%
47.6th 6.5 This vulnerability in Oracle MySQL Server's optimizer component allows attackers with low-privileged
4693 CVE-2024-12806
0.25%
47.6th 4.9 This post-authentication absolute path traversal vulnerability in SonicOS management interfaces allo
4694 CVE-2024-7425
0.25%
47.6th 6.8 The WP ALL Export Pro WordPress plugin has an authentication bypass vulnerability that allows authen
4695 CVE-2024-12866
0.25%
47.6th 7.5 A local file inclusion vulnerability in netease-youdao/qanything v2.0.0 allows attackers to read arb
4696 CVE-2025-26692
0.25%
47.6th 8.1 CVE-2025-26692 is a path traversal vulnerability in Quick Agent V3 and V2 that allows remote unauthe
4697 CVE-2025-3407
0.25%
47.6th 6.3 This critical vulnerability in the stb library allows remote attackers to trigger an out-of-bounds r
4698 CVE-2025-32703
0.25%
47.6th 5.5 This vulnerability in Visual Studio allows authenticated local attackers to bypass access controls a
4699 CVE-2025-30375
0.25%
47.6th 7.8 A type confusion vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code
4700 CVE-2025-46001
0.25%
47.6th 9.8 An arbitrary file upload vulnerability in Filemanager v2.3.0 allows attackers to upload malicious PH

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free