claris CVE Vulnerabilities & Metrics

Focus on claris vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About claris Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with claris. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total claris CVEs: 7
Earliest CVE date: 11 Feb 2020, 14:15 UTC
Latest CVE date: 14 May 2024, 15:13 UTC

Latest CVE reference: CVE-2024-27790

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical claris CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.27

Max CVSS: 4.6

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 2
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS claris CVEs

These are the five CVEs with the highest CVSS scores for claris, sorted by severity first and recency.

All CVEs for claris

CVE-2024-27790 claris vulnerability CVSS: 0 14 May 2024, 15:13 UTC

Claris International has resolved an issue of potentially allowing unauthorized access to records stored in databases hosted on FileMaker Server. This issue has been fixed in FileMaker Server 20.3.2 by validating transactions before replying to client requests.

CVE-2023-42955 claris vulnerability CVSS: 0 14 May 2024, 13:46 UTC

Claris International has successfully resolved an issue of potentially exposing password information to front-end websites when signed in to the Admin Console with an administrator role. This issue has been fixed in FileMaker Server 20.3.1 by eliminating the send of Admin Role passwords in the Node.js socket.

CVE-2024-27794 claris vulnerability CVSS: 0 15 Apr 2024, 23:15 UTC

Claris FileMaker Server before version 20.3.2 was susceptible to a reflected Cross-Site Scripting vulnerability due to an improperly handled parameter in the FileMaker WebDirect login endpoint. The vulnerability was resolved in FileMaker Server 20.3.2 by escaping the HTML contents of the login error message on the login page.

CVE-2023-42954 claris vulnerability CVSS: 0 21 Mar 2024, 23:15 UTC

A privilege escalation issue existed in FileMaker Server, potentially exposing sensitive information to front-end websites when signed in to the Admin Console with an administrator role. This issue has been fixed in FileMaker Server 20.3.1 by reducing the information sent in requests.

CVE-2023-42920 claris vulnerability CVSS: 0 19 Mar 2024, 17:15 UTC

Claris International has fixed a dylib hijacking vulnerability in the FileMaker Pro.app and Claris Pro.app versions on macOS.

CVE-2021-44147 claris vulnerability CVSS: 4.3 22 Nov 2021, 22:15 UTC

An XML External Entity issue in Claris FileMaker Pro and Server (including WebDirect) before 19.4.1 allows a remote attacker to disclose local files via a crafted XML/Excel document and perform server-side request forgery attacks.

CVE-2014-8347 claris vulnerability CVSS: 4.6 11 Feb 2020, 14:15 UTC

An Authentication Bypass vulnerability exists in the MatchPasswordData function in DBEngine.dll in Filemaker Pro 13.03 and Filemaker Pro Advanced 12.04, which could let a malicious user obtain elevated privileges.