HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory. The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: HCL
Published: 2024-01-03T02:59:05.745Z
Updated: 2025-06-03T14:44:24.171Z
Reserved: 2023-10-10T21:26:10.163Z
Link: CVE-2023-45722

Updated: 2024-08-02T20:29:31.840Z

Status : Modified
Published: 2024-01-03T03:15:09.200
Modified: 2025-06-03T15:15:41.983
Link: CVE-2023-45722

No data.