Loading HuntDB...

HCL Software

73 Products 216 CVEs

CVE Severity Distribution (All Time)

Critical
10
High
40
Medium
110
Low
53

Timeline Overview

Last 30 Days 0 CVEs
Last 6 Months 0 CVEs
Last Year 31 CVEs

Recent CVEs

View all
CVE-2024-42181 LOW 7 months, 4 weeks ago

HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-criti…

CVE-2024-42180 LOW 7 months, 4 weeks ago

HCL MyXalytics is affected by a malicious file upload vulnerability. The application accepts invalid file uploads, including incorrect content types…

CVE-2024-42179 LOW 7 months, 4 weeks ago

HCL MyXalytics is affected by sensitive information disclosure vulnerability. The HTTP response header exposes the Microsoft-HTTP API∕2.0 as the ser…

CVE-2024-42175 LOW 7 months, 4 weeks ago

HCL MyXalytics is affected by a weak input validation vulnerability. The application accepts special characters and there is no length validation. T…

CVE-2024-42174 LOW 7 months, 4 weeks ago

HCL MyXalytics is affected by username enumeration vulnerability. This allows a malicious user to perform enumeration of application users, and ther…

CVE-2024-42173 MEDIUM 7 months, 4 weeks ago

HCL MyXalytics is affected by an improper password policy implementation vulnerability. Weak passwords and lack of account lockout policies allow at…

CVE-2024-42172 MEDIUM 7 months, 4 weeks ago

HCL MyXalytics is affected by broken authentication. It allows attackers to compromise keys, passwords, and session tokens, potentially leading to i…

CVE-2024-42171 MEDIUM 7 months, 4 weeks ago

HCL MyXalytics is affected by a session fixation vulnerability. Cyber-criminals can exploit this by sending crafted URLs with a session token to acc…

CVE-2024-42170 MEDIUM 7 months, 4 weeks ago

HCL MyXalytics is affected by a session fixation vulnerability. Cyber-criminals can exploit this by sending crafted URLs with a session token to acc…

CVE-2024-42169 HIGH 7 months, 4 weeks ago

HCL MyXalytics is affected by insecure direct object references. It occurs due to missing access control checks, which fail to verify whether a user…