Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-42181

Summary
Assigner-HCL
Assigner Org ID-1e47fe04-f25f-42fa-b674-36de2c5e3cfc
Published At-12 Jan, 2025 | 22:04
Updated At-13 Jan, 2025 | 15:13
Rejected At-
Credits

HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability

HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:HCL
Assigner Org ID:1e47fe04-f25f-42fa-b674-36de2c5e3cfc
Published At:12 Jan, 2025 | 22:04
Updated At:13 Jan, 2025 | 15:13
Rejected At:
▼CVE Numbering Authority (CNA)
HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability

HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Affected Products
Vendor
HCL Technologies Ltd.HCL Software
Product
DRYiCE MyXalytics
Default Status
unaffected
Versions
Affected
  • 6.3
Problem Types
TypeCWE IDDescription
CWECWE-319CWE-319 Cleartext Transmission of Sensitive Information
Type: CWE
CWE ID: CWE-319
Description: CWE-319 Cleartext Transmission of Sensitive Information
Metrics
VersionBase scoreBase severityVector
3.11.6LOW
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 1.6
Base severity: LOW
Vector:
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149
N/A
Hyperlink: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@hcl.com
Published At:12 Jan, 2025 | 22:15
Updated At:16 May, 2025 | 13:45

HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.11.6LOW
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 1.6
Base severity: LOW
Vector:
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

HCL Technologies Ltd.
hcltech
>>dryice_myxalytics>>6.3
cpe:2.3:a:hcltech:dryice_myxalytics:6.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Secondarypsirt@hcl.com
CWE-319Primarynvd@nist.gov
CWE ID: CWE-319
Type: Secondary
Source: psirt@hcl.com
CWE ID: CWE-319
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149psirt@hcl.com
Vendor Advisory
Hyperlink: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118149
Source: psirt@hcl.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

245Records found

CVE-2021-27782
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.4||MEDIUM
EPSS-0.19% / 40.84%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 18:54
Updated-02 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Mobile / Modern Client Management Server passwords are susceptible to a brute-force attack

HCL BigFix Mobile / Modern Client Management Admin and Config UI passwords can be brute-forced. User should be locked out for multiple invalid attempts.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_mobileBigFix Mobile
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2024-42178
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-2.5||LOW
EPSS-0.19% / 41.32%
||
7 Day CHG+0.07%
Published-17 Apr, 2025 | 21:24
Updated-16 May, 2025 | 13:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL MyXalytics is affected by a failure to restrict URL access vulnerability

HCL MyXalytics is affected by a failure to restrict URL access vulnerability. Unauthenticated users might gain unauthorized access to potentially confidential information, creating a risk of misuse, manipulation, or unauthorized distribution.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dryice_myxalyticsHCL MyXalytics
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-27757
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.72%
||
7 Day CHG~0.00%
Published-04 Mar, 2022 | 18:53
Updated-03 Aug, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

" Insecure password storage issue.The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Since the information is stored in cleartext, attackers could potentially read it and gain access to sensitive information."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-bigfix_insights"BigFix Insights"
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2021-27761
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-4.8||MEDIUM
EPSS-0.12% / 30.46%
||
7 Day CHG~0.00%
Published-06 May, 2022 | 18:10
Updated-16 Sep, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Platform is affected by weak web transport security

Weak web transport security (Weak TLS): An attacker may be able to decrypt the data using attacks

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_platformBigFix Platform
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2021-27756
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.38%
||
7 Day CHG~0.00%
Published-04 Mar, 2022 | 21:18
Updated-03 Aug, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"TLS-RSA cipher suites are not disabled in BigFix Compliance up to v2.0.5. If TLS 2.0 and secure ciphers are not enabled then an attacker can passively record traffic and later decrypt it."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-bigfix_compliance"BigFix Compliance Server"
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2021-27784
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.9||MEDIUM
EPSS-0.08% / 23.80%
||
7 Day CHG~0.00%
Published-31 Oct, 2022 | 22:05
Updated-02 May, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Launch container images may contain non-unique https certificates and database encryption key

The provided HCL Launch Container images contain non-unique HTTPS certificates and a database encryption key. The fix provides directions and tools to replace the non-unique keys and certificates. This does not affect the standard installer packages.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-hcl_launch_container_imageHCL Launch
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2022-27558
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.9||MEDIUM
EPSS-0.22% / 44.57%
||
7 Day CHG~0.00%
Published-29 Aug, 2022 | 16:00
Updated-17 Sep, 2024 | 01:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL iNotes is susceptible to a Broken Password Strength Checks vulnerability.

HCL iNotes is susceptible to a Broken Password Strength Checks vulnerability. Custom password policies are not enforced on certain iNotes forms which could allow users to set weak passwords, leading to easier cracking.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dominohcl_inotesHCL iNotes
CWE ID-CWE-521
Weak Password Requirements
CVE-2025-52616
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.50%
||
7 Day CHG+0.01%
Published-12 Oct, 2025 | 04:24
Updated-21 Oct, 2025 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Unica 12.1.10 is affected by an exposure of sensitive information

HCL Unica 12.1.10 can expose sensitive system information. An attacker could use this information to form an attack plan by leveraging known vulnerabilities in the application.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-unicaUnica
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-52634
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.7||LOW
EPSS-0.06% / 17.59%
||
7 Day CHG+0.01%
Published-10 Oct, 2025 | 09:40
Updated-24 Oct, 2025 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL AION is susceptible to Spring Boot Actuator Endpoints Exposed

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HCL AION This issue affects HCL AION: 2.0.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-aionHCL AION
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-52632
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 6.32%
||
7 Day CHG~0.00%
Published-10 Oct, 2025 | 10:06
Updated-24 Oct, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL AION is susceptible to Missing Secure Attribute in Encrypted Session (SSL) Cookie vulnerability

A Missing Secure Attribute in Encrypted Session (SSL) Cookie vulnerability in HCL AION.This issue affects AION: 2.0.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-aionAION
CWE ID-CWE-614
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
CVE-2025-52625
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.7||LOW
EPSS-0.06% / 17.59%
||
7 Day CHG+0.01%
Published-10 Oct, 2025 | 10:28
Updated-24 Oct, 2025 | 19:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL AION is susceptible to Cacheable SSL Page Found vulnerability

A vulnerability  Cacheable SSL Page Found vulnerability has been identified in HCL AION.  Cached data may expose credentials, system identifiers, or internal file paths to attackers with access to the device or browser This issue affects AION: 2.0.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-aionAION
CWE ID-CWE-525
Use of Web Browser Cache Containing Sensitive Information
CVE-2025-52659
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-2.8||LOW
EPSS-0.03% / 8.69%
||
7 Day CHG~0.00%
Published-19 Jan, 2026 | 17:54
Updated-30 Jan, 2026 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL AION is affected by a Cacheable HTTP Response vulnerability

HCL AION version 2 is affected by a Cacheable HTTP Response vulnerability. This may lead to unintended storage of sensitive or dynamic content, potentially resulting in unauthorized access or information disclosure.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-aionAION
CWE ID-CWE-525
Use of Web Browser Cache Containing Sensitive Information
CVE-2025-52630
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.7||LOW
EPSS-0.06% / 17.59%
||
7 Day CHG+0.01%
Published-10 Oct, 2025 | 09:55
Updated-24 Oct, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL AION is susceptible to Missing or insecure "X-Content-Type-Options" header vulnerability

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HCL AION.This issue affects AION: 2.0.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-aionAION
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-30135
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.3||LOW
EPSS-0.39% / 59.38%
||
7 Day CHG~0.00%
Published-28 Jun, 2024 | 07:22
Updated-30 Oct, 2025 | 18:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive Information Disclosure vulnerability affects DRYiCE AEX v10

HCL DRYiCE AEX is potentially impacted by disclosure of sensitive information in the mobile application when a snapshot is taken.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dryice_aexDRYiCE AEX
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-30132
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.7||LOW
EPSS-0.37% / 58.10%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 12:10
Updated-30 Oct, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing default HTTP security headers affect HCL Nomad server on Domino

HCL Nomad server on Domino did not configure certain HTTP Security headers by default which could allow an attacker to obtain sensitive information via unspecified vectors.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-nomad_server_on_dominoNomad server on Domino
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2024-30111
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.3||LOW
EPSS-0.40% / 59.82%
||
7 Day CHG~0.00%
Published-28 Jun, 2024 | 06:39
Updated-30 Oct, 2025 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Root Detection vulnerability affects DRYiCE AEX v10

HCL DRYiCE AEX product is impacted by Missing Root Detection vulnerability in the mobile application. The mobile app can be installed in the rooted device due to which malicious users can gain unauthorized access to the rooted devices, compromising security and potentially leading to data breaches or other malicious activities.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dryice_aexDRYiCE AEX
CWE ID-CWE-1326
Missing Immutable Root of Trust in Hardware
CVE-2024-30130
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.7||LOW
EPSS-0.31% / 54.03%
||
7 Day CHG~0.00%
Published-19 Jul, 2024 | 00:03
Updated-30 Oct, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Nomad server on Domino is affected by a use of web browser cache containing sensitive information vulnerability

HCL Nomad server on Domino is vulnerable to the cache containing sensitive information which could potentially give an attacker the ability to acquire the sensitive information.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-nomad_server_on_dominoNomad server on Domino
CWE ID-CWE-525
Use of Web Browser Cache Containing Sensitive Information
CVE-2020-14254
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.72%
||
7 Day CHG~0.00%
Published-16 Dec, 2020 | 14:07
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TLS-RSA cipher suites are not disabled in HCL BigFix Inventory up to v10.0.2. If TLS 2.0 and secure ciphers are not enabled then an attacker can passively record traffic and later decrypt it.

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-bigfix_platformHCL BigFix Inventory
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2020-14255
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.84%
||
7 Day CHG~0.00%
Published-02 Feb, 2021 | 19:40
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HCL Digital Experience 9.5 containers include vulnerabilities that could expose sensitive data to unauthorized parties via crafted requests. These affect containers only. These do not affect traditional on-premise installations.

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-digital_experienceHCL Digital Experience
CVE-2024-23586
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.28% / 50.75%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 21:20
Updated-07 Oct, 2024 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
An insufficient session timeout vulnerability affects HCL Nomad server on Domino

HCL Nomad is susceptible to an insufficient session expiration vulnerability.   Under certain circumstances, an unauthenticated attacker could obtain old session information.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dominohcl_nomadNomad server on Dominonomad_server_on_domino
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2024-23562
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.86% / 74.56%
||
7 Day CHG~0.00%
Published-08 Jul, 2024 | 15:57
Updated-23 Oct, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Domino is susceptible to an information disclosure vulnerability

A security vulnerability in HCL Domino could allow disclosure of sensitive configuration information. A remote unauthenticated attacker could exploit this vulnerability to obtain information to launch further attacks against the affected system.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dominoDomino Serverdomino
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-31997
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-4.2||MEDIUM
EPSS-0.06% / 17.35%
||
7 Day CHG+0.01%
Published-12 Oct, 2025 | 02:27
Updated-29 Oct, 2025 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Unica Centralized Offer Management is vulnerable to Insecure Direct Object References (IDOR)

HCL Unica Centralized Offer Management is vulnerable to Insecure Direct Object References (IDOR). An attacker can bypass authorization and access resources in the system directly, for example database records or files.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-unica_centralized_offer_managementUnica Centralized Offer Management
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-31996
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.50%
||
7 Day CHG+0.01%
Published-13 Oct, 2025 | 03:46
Updated-21 Oct, 2025 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unprotected files are impacting HCL Unica Platform

HCL Unica Platform is affected by unprotected files due to improper access controls.  These files may contain sensitive information such as private or system information that can be exploited by attackers to compromise the application, infrastructure, or users.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-unicaUnica Platform
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2022-38658
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.7||HIGH
EPSS-0.16% / 36.94%
||
7 Day CHG~0.00%
Published-22 Dec, 2022 | 18:52
Updated-15 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Server Automation (SA) is affected by a security vulnerability around Notification Service

BigFix deployments that have installed the Notification Service on Windows are susceptible to disclosing SMTP BigFix operator's sensitive data in clear text. Operators who use Notification Service related content from BES Support are at risk of leaving their SMTP sensitive data exposed.

Action-Not Available
Vendor-HCL Technologies Ltd.Microsoft Corporation
Product-windowsbigfix_server_automationBigFix Server Automation
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2023-50350
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-8.2||HIGH
EPSS-0.03% / 10.15%
||
7 Day CHG~0.00%
Published-03 Jan, 2024 | 01:50
Updated-18 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A broken cryptographic algorithm impacts MyXalytics

HCL DRYiCE MyXalytics is impacted by the use of a broken cryptographic algorithm for encryption, potentially giving an attacker ability to decrypt sensitive information.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dryice_myxalyticsDRYiCE MyXalytics
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-50341
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.6||HIGH
EPSS-0.07% / 20.43%
||
7 Day CHG~0.00%
Published-03 Jan, 2024 | 02:42
Updated-18 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control affects DRYiCE MyXalytics

HCL DRYiCE MyXalytics is impacted by Improper Access Control (Obsolete web pages) vulnerability. Discovery of outdated and accessible web pages, reflects a "Missing Access Control" vulnerability, which could lead to inadvertent exposure of sensitive information and/or exposing a vulnerable endpoint.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dryice_myxalyticsDRYiCE MyXalytics
CWE ID-CWE-284
Improper Access Control
CVE-2023-45696
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-4||MEDIUM
EPSS-0.18% / 39.22%
||
7 Day CHG~0.00%
Published-10 Feb, 2024 | 03:10
Updated-03 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Sametime is impacted by an autocomplete enabled vulnerability

Sametime is impacted by sensitive fields with autocomplete enabled in the Legacy web chat client. By default, this allows user entered data to be stored by the browser.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-sametimeHCL Sametime
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CVE-2023-45718
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.9||LOW
EPSS-0.21% / 42.68%
||
7 Day CHG~0.00%
Published-09 Feb, 2024 | 21:22
Updated-03 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Sametime is impacted by a failure to invalidate sessions

Sametime is impacted by a failure to invalidate sessions. The application is setting sensitive cookie values in a persistent manner in Sametime Web clients. When this happens, cookie values can remain valid even after a user has closed out their session.  

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-sametimeHCL Sametime
CWE ID-CWE-384
Session Fixation
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2019-4326
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.84%
||
7 Day CHG~0.00%
Published-06 Oct, 2020 | 17:22
Updated-04 Aug, 2024 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"HCL AppScan Enterprise security rules update administration section of the web application console is missing HTTP Strict-Transport-Security Header."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-appscan"HCL AppScan Enterprise "
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2019-4327
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.62%
||
7 Day CHG~0.00%
Published-21 Apr, 2020 | 18:13
Updated-04 Aug, 2024 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"HCL AppScan Enterprise uses hard-coded credentials which can be exploited by attackers to get unauthorized access to application's encrypted files."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-appscan"HCL AppScan Enterprise Edition"
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-37517
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-3.2||LOW
EPSS-0.05% / 15.71%
||
7 Day CHG~0.00%
Published-30 Apr, 2025 | 21:11
Updated-30 Oct, 2025 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Domino Volt and Domino Leap are affected by missing "no cache" headers

Missing "no cache" headers in HCL Leap permits sensitive data to be cached.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-domino_leapHCL Domino Leap
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CVE-2023-28021
Matching Score-8
Assigner-HCL Software
ShareView Details
Matching Score-8
Assigner-HCL Software
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 30.19%
||
7 Day CHG~0.00%
Published-18 Jul, 2023 | 18:55
Updated-21 Oct, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BigFix WebUI is vulnerable to use of a risky cryptographic algorithm

The BigFix WebUI uses weak cipher suites.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_webuiHCL BigFix WebUI
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2025-0250
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-2.2||LOW
EPSS-0.02% / 3.24%
||
7 Day CHG~0.00%
Published-24 Jul, 2025 | 23:28
Updated-09 Oct, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL IEM is affected by an authorization token sent in cookie vulnerability

HCL IEM is affected by an authorization token sent in cookie vulnerability.  A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-intelliops_event_managementIEM
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-0252
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-2.6||LOW
EPSS-0.02% / 4.77%
||
7 Day CHG~0.00%
Published-25 Jul, 2025 | 00:08
Updated-09 Oct, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL IEM is affected by a password in cleartext vulnerability

HCL IEM is affected by a password in cleartext vulnerability.  Sensitive information is transmitted without adequate protection, potentially exposing it to unauthorized access during transit.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-intelliops_event_managementIEM
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-62330
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 3.42%
||
7 Day CHG~0.00%
Published-16 Dec, 2025 | 06:16
Updated-07 Jan, 2026 | 21:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL DevOps Deploy is susceptible to a cleartext transmission of sensitive information

HCL DevOps Deploy is susceptible to a cleartext transmission of sensitive information because the HTTP port remains accessible and does not redirect to HTTPS as intended. As a result, an attacker with network access could intercept or modify user credentials and session-related data via passive monitoring or man-in-the-middle attacks.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-hcl_devops_deployDevOps Deploy
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-14248
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 32.82%
||
7 Day CHG~0.00%
Published-16 Dec, 2020 | 14:11
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BigFix Inventory up to v10.0.2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-bigfix_platformHCL BigFix Inventory
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-31972
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 0.81%
||
7 Day CHG~0.00%
Published-28 Aug, 2025 | 16:50
Updated-29 Oct, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Service Management (SM) is affected by a Sensitive Information Exposure vulnerability

HCL BigFix SM is affected by a Sensitive Information Exposure vulnerability where internal connections do not use TLS encryption which could allow an attacker unauthorized access to sensitive data transmitted between internal components.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_service_managementBigFix Service Management (SM)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-42454
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-6.4||MEDIUM
EPSS-0.12% / 31.72%
||
7 Day CHG~0.00%
Published-19 Dec, 2022 | 21:10
Updated-16 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL BigFix Insights for Vulnerability Remediation (IVR) is vulnerable to improper certificate validation

Insights for Vulnerability Remediation (IVR) is vulnerable to man-in-the-middle attacks that may lead to information disclosure.  This requires privileged network access.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-bigfix_insights_for_vulnerability_remediationBigFix Insights for Vulnerability Remediation
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-45716
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-1.7||LOW
EPSS-0.06% / 19.72%
||
7 Day CHG~0.00%
Published-09 Feb, 2024 | 21:17
Updated-03 Jun, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL Sametime is impacted by a sensitive information disclosure

Sametime is impacted by sensitive information passed in URL.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-sametimeHCL Sametime
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-598
Use of GET Request Method With Sensitive Query Strings
CVE-2020-4092
Matching Score-6
Assigner-HCL Software
ShareView Details
Matching Score-6
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.54%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 12:30
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"If port encryption is not enabled on the Domino Server, HCL Nomad on Android and iOS Platforms will communicate in clear text and does not currently have a user interface option to change the setting to request an encrypted communication channel with the Domino server. This can potentially expose sensitive information including but not limited to server names, user IDs and document content."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-hcl_nomad"HCL Nomad"
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-32966
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-3.7||LOW
EPSS-0.10% / 28.55%
||
7 Day CHG~0.00%
Published-25 May, 2022 | 13:29
Updated-16 Apr, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Philips Interoperability Solution XDS - Clear Text Transmission of Sensitive Information

Philips Interoperability Solution XDS versions 2.5 through 3.11 and 2018-1 through 2021-1 are vulnerable to clear text transmission of sensitive information when configured to use LDAP via TLS and where the domain controller returns LDAP referrals, which may allow an attacker to remotely read LDAP system credentials.

Action-Not Available
Vendor-Philips
Product-interoperability_solution_xdsInteroperability Solution XDS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-32982
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.12% / 30.50%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 19:45
Updated-16 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Automation Direct CLICK PLC CPU Modules Cleartext Transmission of Sensitive Information

Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 passwords are sent as plaintext during unlocking and project transfers. An attacker who has network visibility can observe the password exchange.

Action-Not Available
Vendor-AutomationDirect
Product-c0-12dd1e-d_firmwarec0-10dd1e-dc0-12dd1e-1-dc0-11dd1e-dc0-11dre-d_firmwarec0-12are-1-dc0-11dd2e-d_firmwarec0-10dd1e-d_firmwarec0-11dd2e-dc0-12dre-2-dc0-12are-d_firmwarec0-12dd2e-d_firmwarec0-12dre-dc0-12are-2-dc0-10dre-d_firmwarec0-12dd1e-dc0-11dre-dc0-10dre-dc0-11are-dc0-12dd2e-dc0-12dd1e-2-d_firmwarec0-12dd1e-1-d_firmwarec0-12dre-d_firmwarec0-12are-2-d_firmwarec0-12dd2e-2-d_firmwarec0-12dd2e-1-d_firmwarec0-11dd1e-d_firmwarec0-12dd1e-2-dc0-12dd2e-1-dc0-10dd2e-dc0-12dre-2-d_firmwarec0-11are-d_firmwarec0-10are-d_firmwarec0-10dd2e-d_firmwarec0-12dd2e-2-dc0-12are-1-d_firmwarec0-12dre-1-d_firmwarec0-12dre-1-dc0-10are-dc0-12are-dCLICK PLC CPU Modules: C0-1x CPUs
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-32934
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-0.11% / 29.60%
||
7 Day CHG~0.00%
Published-19 May, 2022 | 17:20
Updated-16 Apr, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ThroughTek P2P SDK - Cleartext Transmission of Sensitive Information

The affected ThroughTek P2P products (SDKs using versions before 3.1.5, any versions with nossl tag, device firmware not using AuthKey for IOTC conneciton, firmware using AVAPI module without enabling DTLS mechanism, and firmware using P2PTunnel or RDT module) do not sufficiently protect data transferred between the local device and ThroughTek servers. This can allow an attacker to access sensitive information, such as camera feeds.

Action-Not Available
Vendor-throughtekThroughTek
Product-kalay_p2p_software_development_kitP2P SDK
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-31898
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.00% / 0.03%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 12:18
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-webstormn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2008-4390
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-3.84% / 87.91%
||
7 Day CHG~0.00%
Published-09 Dec, 2008 | 00:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Cisco Linksys WVC54GC wireless video camera before firmware 1.25 sends cleartext configuration data in response to a Setup Wizard remote-management command, which allows remote attackers to obtain sensitive information such as passwords by sniffing the network.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-linksys_wvc54gclinksys_wvc54gc_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-33022
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.21%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-16 Apr, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Philips Vue PACS Cleartext Transmission of Sensitive Information

Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Action-Not Available
Vendor-Philips
Product-myvuevue_motionspeechvue_pacsVue MotionVue PACSVue SpeechVue MyVue
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-1060
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8.7||HIGH
EPSS-0.09% / 25.51%
||
7 Day CHG~0.00%
Published-13 Feb, 2025 | 05:53
Updated-13 Feb, 2025 | 15:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists that could result in the exposure of data when network traffic is being sniffed by an attacker.

Action-Not Available
Vendor-Schneider Electric SE
Product-ASCO 5350 Eight Channel Remote AnnunciatorASCO 5310 Single-Channel Remote Annunciator
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2008-3289
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.73% / 72.27%
||
7 Day CHG~0.00%
Published-24 Jul, 2008 | 17:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

EMC Dantz Retrospect Backup Client 7.5.116 sends the password hash in cleartext at an unspecified point, which allows remote attackers to obtain sensitive information via a crafted packet.

Action-Not Available
Vendor-storcentricn/a
Product-retrospect_backup_clientn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-31671
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.26% / 48.67%
||
7 Day CHG+0.01%
Published-27 Apr, 2021 | 02:43
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.

Action-Not Available
Vendor-pgsync_projectn/a
Product-pgsyncn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-7731
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-01 Sep, 2025 | 03:57
Updated-02 Sep, 2025 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure Vulnerability in MELSEC iQ-F Series CPU module

Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-MELSEC iQ-F Series FX5U-32MT/ESSMELSEC iQ-F Series FX5U-32MT/DSMELSEC iQ-F Series FX5U-32MT/DSSMELSEC iQ-F Series FX5S-80MT/DSSMELSEC iQ-F Series FX5U-64MR/DSMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC iQ-F Series FX5UJ-60MR/DSMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC iQ-F Series FX5S-40MT/ESMELSEC iQ-F Series FX5S-60MT/ESSMELSEC iQ-F Series FX5S-80MT/DSMELSEC iQ-F Series FX5S-30MT/DSMELSEC iQ-F Series FX5U-32MR/DSMELSEC iQ-F Series FX5UJ-24MR/DSMELSEC iQ-F Series FX5S-30MT/ESMELSEC iQ-F Series FX5UJ-24MT/DSMELSEC iQ-F Series FX5UJ-40MT/DSMELSEC iQ-F Series FX5UJ-60MT/DSSMELSEC iQ-F Series FX5UJ-24MT/DSSMELSEC iQ-F Series FX5U-80MT/DSMELSEC iQ-F Series FX5UJ-60MT/DSMELSEC iQ-F Series FX5U-64MT/ESMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC iQ-F Series FX5S-60MT/ESMELSEC iQ-F Series FX5S-80MT/ESSMELSEC iQ-F Series FX5U-64MT/ESSMELSEC iQ-F Series FX5UC-64MT/DMELSEC iQ-F Series FX5U-64MT/DSSMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC iQ-F Series FX5S-30MR/ESMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-F Series FX5S-60MT/DSMELSEC iQ-F Series FX5U-80MT/ESMELSEC iQ-F Series FX5S-30MT/ESSMELSEC iQ-F Series FX5U-64MT/DSMELSEC iQ-F Series FX5UJ-24MR/ES-AMELSEC iQ-F Series FX5UJ-40MR/DSMELSEC iQ-F Series FX5UJ-40MT/ESSMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC iQ-F Series FX5S-60MR/DSMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-F Series FX5U-80MT/ESSMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC iQ-F Series FX5U-32MT/ESMELSEC iQ-F Series FX5U-80MR/ESMELSEC iQ-F Series FX5UC-32MT/DMELSEC iQ-F Series FX5S-40MR/ESMELSEC iQ-F Series FX5S-30MT/DSSMELSEC iQ-F Series FX5S-80MR/ESMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC iQ-F Series FX5S-30MR/DSMELSEC iQ-F Series FX5S-40MT/DSSMELSEC iQ-F Series FX5U-80MR/DSMELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC iQ-F Series FX5S-40MT/DSMELSEC iQ-F Series FX5S-60MT/DSSMELSEC iQ-F Series FX5U-64MR/ESMELSEC iQ-F Series FX5UJ-40MT/DSSMELSEC iQ-F Series FX5S-40MR/DSMELSEC iQ-F Series FX5S-80MR/DSMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UC-96MT/DSSMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-F Series FX5UC-96MT/DMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC iQ-F Series FX5U-32MR/ES
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found