Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4651 | CVE-2025-24224 |
|
47.9th | 7.5 | This vulnerability allows a remote attacker to cause unexpected system termination (crash/reboot) on | |
| 4652 | CVE-2025-15194 |
|
47.9th | 9.8 | A stack-based buffer overflow vulnerability in the hedwig.cgi HTTP header handler of D-Link DIR-600 | |
| 4653 | CVE-2023-53775 |
|
48th | 6.5 | CVE-2023-53775 is an authentication bypass vulnerability in Screen SFT DAB 1.9.3 that allows attacke | |
| 4654 | CVE-2022-44151 |
|
48th | 9.8 | CVE-2022-44151 is a critical SQL injection vulnerability in Simple Inventory Management System v1.0' | |
| 4655 | CVE-2025-22960 |
|
47.9th | 8.0 | Unauthenticated attackers can access debug log files containing session IDs and authentication token | |
| 4656 | CVE-2024-34897 |
|
47.9th | 7.5 | The Nedis SmartLife Android app v1.4.0 contains an API key disclosure vulnerability that allows atta | |
| 4657 | CVE-2024-45569 |
|
47.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code or cause denial of service by s | |
| 4658 | CVE-2025-3572 |
|
47.9th | 7.5 | SmartRobot from INTUMIT has an unauthenticated Server-Side Request Forgery vulnerability that allows | |
| 4659 | CVE-2025-55599 |
|
47.9th | 7.5 | A buffer overflow vulnerability in D-Link DIR-619L routers allows attackers to execute arbitrary cod | |
| 4660 | CVE-2025-54763 |
|
47.9th | 7.2 | This CVE describes an OS command injection vulnerability in FutureNet MA and IP-K series devices fro | |
| 4661 | CVE-2025-9952 |
|
47.9th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'range-date' | |
| 4662 | CVE-2025-61590 |
|
47.8th | 7.5 | This vulnerability allows remote code execution in Cursor AI code editor versions 1.6 and below thro | |
| 4663 | CVE-2025-11230 |
|
47.9th | 7.5 | This vulnerability in HAProxy's mjson library allows remote attackers to cause denial of service thr | |
| 4664 | CVE-2025-23949 |
|
47.8th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4665 | CVE-2024-57761 |
|
47.8th | 8.1 | An arbitrary file upload vulnerability in JeeWMS allows attackers to upload malicious files that can | |
| 4666 | CVE-2025-22508 |
|
47.8th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4667 | CVE-2025-26985 |
|
47.8th | 8.1 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 4668 | CVE-2024-11499 |
|
47.8th | 4.9 | An authenticated attacker can trigger a restart of RTU500 CMU units by updating certificates during | |
| 4669 | CVE-2025-1451 |
|
47.8th | 7.5 | This vulnerability in parisneo/lollms-webui allows attackers to cause denial of service by sending s | |
| 4670 | CVE-2025-46550 |
|
47.7th | 4.3 | This is a reflected cross-site scripting (XSS) vulnerability in YesWiki's /?BazaR endpoint via the i | |
| 4671 | CVE-2025-33028 |
|
47.8th | 6.1 | This CVE describes a Mark-of-the-Web bypass vulnerability in WinZip where extracted files from craft | |
| 4672 | CVE-2025-5257 |
|
47.8th | 6.5 | This vulnerability allows unauthenticated users to access unpublished page previews in Mautic via pr | |
| 4673 | CVE-2025-45343 |
|
47.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda W18E routers by exploi | |
| 4674 | CVE-2025-9392 |
|
47.8th | 8.8 | A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac | |
| 4675 | CVE-2025-8895 |
|
47.7th | 9.8 | The WP Webhooks WordPress plugin allows unauthenticated attackers to copy arbitrary files on the ser | |
| 4676 | CVE-2025-24285 |
|
47.8th | 9.8 | This CVE describes command injection vulnerabilities in UniFi Connect EV Station Lite that allow att | |
| 4677 | CVE-2025-8310 |
|
47.8th | 6.5 | This vulnerability allows authenticated remote attackers to reset administrator passwords in Ivanti | |
| 4678 | CVE-2025-57446 |
|
47.8th | 7.5 | A vulnerability in O-RAN Near Realtime RIC ric-plt-submgr allows remote attackers to cause denial of | |
| 4679 | CVE-2020-36856 |
|
47.8th | 8.8 | This vulnerability allows authenticated users with Core Config Manager access in Nagios XI to execut | |
| 4680 | CVE-2025-13320 |
|
47.7th | 6.8 | The WP User Manager WordPress plugin has an arbitrary file deletion vulnerability that allows authen | |
| 4681 | CVE-2024-5743 |
|
47.6th | 9.8 | This vulnerability in EveHome Eve Play allows attackers to exploit weak password hashing to execute | |
| 4682 | CVE-2025-25186 |
|
47.7th | 6.5 | This vulnerability in Ruby's Net::IMAP library allows a malicious IMAP server to cause denial of ser | |
| 4683 | CVE-2025-1705 |
|
47.7th | 6.1 | The tagDiv Composer WordPress plugin has a CSRF vulnerability that allows unauthenticated attackers | |
| 4684 | CVE-2025-2339 |
|
47.7th | 5.3 | CVE-2025-2339 is an improper authentication vulnerability in otale Tale Blog 2.0.5 that allows remot | |
| 4685 | CVE-2025-3573 |
|
47.7th | 6.1 | This vulnerability allows attackers to inject malicious scripts into web pages using the jQuery Vali | |
| 4686 | CVE-2025-32201 |
|
47.6th | 4.3 | This CVE describes a missing authorization vulnerability in the Xpro Theme Builder WordPress plugin | |
| 4687 | CVE-2026-25108 |
|
47.7th | 8.8 | FileZen contains an OS command injection vulnerability that allows authenticated users to execute ar | |
| 4688 | CVE-2025-4442 |
|
47.7th | 8.8 | A critical buffer overflow vulnerability in D-Link DIR-605L routers allows remote attackers to execu | |
| 4689 | CVE-2025-4342 |
|
47.7th | 8.8 | A critical buffer overflow vulnerability in D-Link DIR-600L routers allows remote attackers to execu | |
| 4690 | CVE-2025-68389 |
|
47.7th | 6.5 | This vulnerability allows authenticated Kibana users with low privileges to send crafted HTTP reques | |
| 4691 | CVE-2025-34256 |
|
47.6th | 9.8 | This vulnerability allows remote unauthenticated attackers to forge JWT tokens using a hard-coded cr | |
| 4692 | CVE-2025-21566 |
|
47.6th | 6.5 | This vulnerability in Oracle MySQL Server's optimizer component allows attackers with low-privileged | |
| 4693 | CVE-2024-12806 |
|
47.6th | 4.9 | This post-authentication absolute path traversal vulnerability in SonicOS management interfaces allo | |
| 4694 | CVE-2024-7425 |
|
47.6th | 6.8 | The WP ALL Export Pro WordPress plugin has an authentication bypass vulnerability that allows authen | |
| 4695 | CVE-2024-12866 |
|
47.6th | 7.5 | A local file inclusion vulnerability in netease-youdao/qanything v2.0.0 allows attackers to read arb | |
| 4696 | CVE-2025-26692 |
|
47.6th | 8.1 | CVE-2025-26692 is a path traversal vulnerability in Quick Agent V3 and V2 that allows remote unauthe | |
| 4697 | CVE-2025-3407 |
|
47.6th | 6.3 | This critical vulnerability in the stb library allows remote attackers to trigger an out-of-bounds r | |
| 4698 | CVE-2025-32703 |
|
47.6th | 5.5 | This vulnerability in Visual Studio allows authenticated local attackers to bypass access controls a | |
| 4699 | CVE-2025-30375 |
|
47.6th | 7.8 | A type confusion vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code | |
| 4700 | CVE-2025-46001 |
|
47.6th | 9.8 | An arbitrary file upload vulnerability in Filemanager v2.3.0 allows attackers to upload malicious PH |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free