Filtered by vendor Hcltech
Subscriptions
Filtered by product Dryice Myxalytics
Subscriptions
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-50344 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 5.4 Medium |
HCL DRYiCE MyXalytics is impacted by improper access control (Unauthenticated File Download) vulnerability. An unauthenticated user can download certain files. | ||||
CVE-2023-50343 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 8.3 High |
HCL DRYiCE MyXalytics is impacted by an Improper Access Control (Controller APIs) vulnerability. Certain API endpoints are accessible to Customer Admin Users that can allow access to sensitive information about other users. | ||||
CVE-2023-50342 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 7.1 High |
HCL DRYiCE MyXalytics is impacted by an Insecure Direct Object Reference (IDOR) vulnerability. A user can obtain certain details about another user as a result of improper access control. | ||||
CVE-2023-50341 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 7.6 High |
HCL DRYiCE MyXalytics is impacted by Improper Access Control (Obsolete web pages) vulnerability. Discovery of outdated and accessible web pages, reflects a "Missing Access Control" vulnerability, which could lead to inadvertent exposure of sensitive information and/or exposing a vulnerable endpoint. | ||||
CVE-2023-45724 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 8.2 High |
HCL DRYiCE MyXalytics product is impacted by unauthenticated file upload vulnerability. The web application permits the upload of a certain file without requiring user authentication. | ||||
CVE-2023-45723 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 7.6 High |
HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability. Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server. | ||||
CVE-2023-45722 | 1 Hcltech | 1 Dryice Myxalytics | 2024-11-21 | 8.8 High |
HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory. The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application. |