Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4751 CVE-2024-2356
0.24%
47.2th 9.6 This CVE describes a Local File Inclusion vulnerability in the lollms-webui application that allows
4752 CVE-2025-23938
0.24%
47.2th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
4753 CVE-2025-23915
0.24%
47.2th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the FAT Event Lite WordPress plugin,
4754 CVE-2024-47239
0.24%
47.2th 6.5 Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.0 contain an uncontrolled resource consumption
4755 CVE-2025-26957
0.24%
47.2th 7.5 This vulnerability allows attackers to include local files on the server through the Affiliate Coupo
4756 CVE-2025-26932
0.24%
47.2th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in QuantumCloud ChatBot WordPress plugin
4757 CVE-2025-1674
0.24%
47.2th 8.2 CVE-2025-1674 is an out-of-bounds read vulnerability in Zephyr RTOS caused by insufficient input val
4758 CVE-2025-27272
0.24%
47.2th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
4759 CVE-2025-26370
0.24%
47.2th 7.1 This vulnerability allows authenticated low-privileged attackers to remove privileges from user grou
4760 CVE-2025-26350
0.24%
47.2th 4.9 This vulnerability allows authenticated remote attackers to upload malicious files to Q-Free MaxTime
4761 CVE-2025-29509
0.24%
47.2th 8.8 CVE-2025-29509 is a remote code execution vulnerability in Jan AI desktop application versions 0.5.1
4762 CVE-2025-6087
0.24%
47.2th 9.1 A Server-Side Request Forgery (SSRF) vulnerability in the @opennextjs/cloudflare package allows unau
4763 CVE-2025-37095
0.24%
47.2th 9.8 A directory traversal vulnerability in HPE StoreOnce Software allows attackers to access sensitive f
4764 CVE-2025-6507
0.24%
47.1th 9.8 This vulnerability in h2o-3 allows attackers to bypass regex filters in JDBC connections by manipula
4765 CVE-2025-11939
0.24%
47.2th 4.7 This vulnerability in ChurchCRM allows attackers to perform path traversal attacks via the restoreFi
4766 CVE-2025-10611
0.24%
47.2th 9.8 This critical vulnerability in WSO2 products allows attackers to bypass authentication and authoriza
4767 CVE-2025-34239
0.24%
47.1th 7.2 This vulnerability allows authenticated system administrators in Advantech WebAccess/VPN to execute
4768 CVE-2025-69211
0.24%
47.2th 7.4 NestJS applications using Fastify platform with route-specific middleware are vulnerable to URL enco
4769 CVE-2025-11783
0.24%
47.1th 9.8 A stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2 allows remote a
4770 CVE-2025-14844
0.24%
47.2th 8.2 This vulnerability allows unauthenticated attackers to access Stripe SetupIntent client_secret value
4771 CVE-2025-69971
0.24%
47.2th 9.8 FUXA v1.2.7 contains a hard-coded JWT secret key that allows attackers to forge valid authentication
4772 CVE-2025-21599
0.24%
47.1th 7.5 This CVE describes a memory leak vulnerability in Juniper's Tunnel Driver (jtd) on Junos OS Evolved.
4773 CVE-2024-12030
0.24%
47.1th 6.5 This SQL injection vulnerability in the MDTF WordPress plugin allows authenticated attackers with Co
4774 CVE-2025-22390
0.24%
47th 7.5 This vulnerability allows attackers to compromise user accounts through password attacks due to weak
4775 CVE-2025-0767
0.24%
47.1th 9.8 CVE-2025-0767 is a PHP object injection vulnerability in WP Activity Log plugin that allows remote c
4776 CVE-2025-28009
0.24%
47.1th 9.8 A SQL injection vulnerability in Dietiqa App v1.0.20 allows attackers to execute arbitrary SQL comma
4777 CVE-2025-32626
0.24%
47.1th 9.3 This SQL injection vulnerability in JoomSky JS Job Manager allows attackers to execute arbitrary SQL
4778 CVE-2025-22930
0.24%
47.1th 9.8 This SQL injection vulnerability in OS4ED openSIS allows attackers to execute arbitrary SQL commands
4779 CVE-2025-30886
0.24%
47.1th 9.3 This SQL injection vulnerability in JoomSky JS Help Desk allows attackers to execute arbitrary SQL c
4780 CVE-2025-5156
0.24%
47.1th 8.8 A critical buffer overflow vulnerability in H3C GR-5400AX routers allows remote attackers to execute
4781 CVE-2025-4835
0.24%
47.1th 8.8 This critical buffer overflow vulnerability in TOTOLINK routers allows remote attackers to execute a
4782 CVE-2025-4834
0.24%
47.1th 8.8 This critical buffer overflow vulnerability in TOTOLINK routers allows remote attackers to execute a
4783 CVE-2025-4832
0.24%
47.1th 8.8 This critical buffer overflow vulnerability in TOTOLINK routers allows remote attackers to execute a
4784 CVE-2025-51087
0.24%
47.1th 8.6 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8V4 routers by explo
4785 CVE-2025-7624
0.24%
47th 9.8 An SQL injection vulnerability in Sophos Firewall's legacy SMTP proxy allows remote attackers to exe
4786 CVE-2025-45479
0.24%
47.1th 9.8 This vulnerability allows attackers to execute arbitrary code on educoder challenge containers by in
4787 CVE-2025-3626
0.24%
47.1th 9.1 This critical vulnerability allows remote attackers with administrator credentials to execute arbitr
4788 CVE-2023-36881
0.24%
47.1th 4.5 CVE-2023-36881 is a cross-site scripting (XSS) vulnerability in Azure Apache Ambari that allows atta
4789 CVE-2026-1560
0.24%
47.1th 8.8 This vulnerability in the Lazy Blocks WordPress plugin allows authenticated attackers with Contribut
4790 CVE-2023-53776
0.24%
47.1th 8.8 This authentication bypass vulnerability in Screen SFT DAB 1.9.3 allows attackers to reuse IP-bound
4791 CVE-2023-53734
0.24%
47.1th N/A CVE-2023-53734 is an unauthenticated SQL injection vulnerability in dawa-pharma-1.0 pharmacy billing
4792 CVE-2025-0570
0.24%
47th 6.5 This vulnerability allows authenticated remote attackers to cause denial-of-service conditions on Sa
4793 CVE-2025-0612
0.24%
47th 7.5 This vulnerability allows remote attackers to trigger out-of-bounds memory access in Chrome's V8 Jav
4794 CVE-2024-46667
0.24%
47th 7.5 This vulnerability in Fortinet FortiSIEM allows attackers to cause denial of service by consuming al
4795 CVE-2024-11864
0.24%
47th 7.5 CVE-2024-11864 is a vulnerability in SCP-Firmware where specially crafted SCMI messages can cause a
4796 CVE-2024-53544
0.24%
47th 9.8 This SQL injection vulnerability in NovaCHRON Smart Time Plus allows attackers to execute arbitrary
4797 CVE-2024-23814
0.24%
47th 5.3 This vulnerability allows unauthenticated remote attackers to cause a temporary denial of service in
4798 CVE-2024-39564
0.24%
47th 7.5 A double-free vulnerability in Juniper Junos OS and Junos OS Evolved routing process daemon (rpd) al
4799 CVE-2024-8248
0.24%
47th 7.2 A path traversal vulnerability in the normalizePath function of mintplex-labs/anything-llm allows at
4800 CVE-2025-26936
0.24%
46.8th 10.0 This critical vulnerability in the Fresh Framework WordPress plugin allows unauthenticated attackers

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free