cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2014-10385,https://securityvulnerability.io/vulnerability/CVE-2014-10385,Cross-Site Scripting Vulnerability in Memphis Documents Library Plugin for WordPress,"The Memphis Documents Library plugin for WordPress, prior to version 3.0, is susceptible to a cross-site scripting (XSS) vulnerability that arises from improper handling of input received via the $_REQUEST variable. Attackers can exploit this weakness to inject malicious scripts into web pages viewed by other users. This can lead to account hijacking, unauthorized actions, or the exposure of sensitive information. Users are advised to update to the latest version to mitigate potential security risks.",Wordpress,Memphis Documents Library,6.1,MEDIUM,0.0005799999926239252,false,,false,false,false,,,false,false,,2019-08-22T13:20:41.000Z,0 CVE-2014-10384,https://securityvulnerability.io/vulnerability/CVE-2014-10384,Local File Inclusion in Memphis Documents Library for WordPress,"The Memphis Documents Library plugin for WordPress prior to version 3.0 is vulnerable to Local File Inclusion. This flaw allows attackers to exploit the plugin's functionality, potentially leading to unauthorized access to sensitive files on the server. It is essential for users to update to the latest version to mitigate risks associated with this vulnerability.",Wordpress,Memphis Documents Library,9.8,CRITICAL,0.0021299999207258224,false,,false,false,false,,,false,false,,2019-08-22T13:19:54.000Z,0 CVE-2014-10383,https://securityvulnerability.io/vulnerability/CVE-2014-10383,Remote File Inclusion Vulnerability in Memphis Documents Library Plugin for WordPress,"The Memphis Documents Library plugin for WordPress, prior to version 3.0, is susceptible to a remote file inclusion vulnerability. This flaw allows attackers to include remote files, which could lead to the execution of arbitrary code on the server. By exploiting this vulnerability, unauthorized users could potentially manipulate website functionality or steal sensitive information. It is crucial for users to update their plugins to version 3.0 or later to mitigate the risks associated with this vulnerability.",Wordpress,Memphis Documents Library,9.8,CRITICAL,0.004530000034719706,false,,false,false,false,,,false,false,,2019-08-22T13:18:50.000Z,0