Filtered by vendor Hcltech Subscriptions
Filtered by product Unica Subscriptions
Total 15 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-52616 1 Hcltech 1 Unica 2025-10-21 5.3 Medium
HCL Unica 12.1.10 can expose sensitive system information. An attacker could use this information to form an attack plan by leveraging known vulnerabilities in the application.
CVE-2025-31996 1 Hcltech 1 Unica 2025-10-21 5.3 Medium
HCL Unica Platform is affected by unprotected files due to improper access controls.  These files may contain sensitive information such as private or system information that can be exploited by attackers to compromise the application, infrastructure, or users.
CVE-2025-31969 1 Hcltech 1 Unica 2025-10-21 4 Medium
HCL Unica Platform is impacted by misconfigured Content Security Policy (CSP). These can result in malicious resources getting loaded and browsers may come across certain types of attacks, such as cross-site scripting and clickjacking.
CVE-2025-52614 1 Hcltech 1 Unica 2025-10-21 3.5 Low
HCL Unica Platform is affected by a Cookie without HTTPOnly Flag Set vulnerability. A malicious agent may be able to induce this event by feeding a user suitable links, either directly or via another web site.
CVE-2025-31998 1 Hcltech 1 Unica 2025-10-21 3.5 Low
HCL Unica Centralized Offer Management is vulnerable to poor unhandled exceptions which exposes sensitive information. An attacker can exploit use this information to exploit known vulnerabilities launch targeted attacks, such as remote code execution or denial of service.
CVE-2025-31997 1 Hcltech 1 Unica 2025-10-21 4.2 Medium
HCL Unica Centralized Offer Management is vulnerable to Insecure Direct Object References (IDOR). An attacker can bypass authorization and access resources in the system directly, for example database records or files.
CVE-2025-52615 1 Hcltech 1 Unica 2025-10-21 3.5 Low
HCL Unica Platform is impacted by misconfigured security related HTTP headers. This can lead to less secure browser default treatment for the policies controlled by these headers.
CVE-2025-31993 1 Hcltech 1 Unica 2025-10-21 3.5 Low
HCL Unica Centralized Offer Management is vulnerable to a potential Server-Side Request Forgery (SSRF). An attacker can exploit improper input validation by submitting maliciously crafted input to a target application running on a server.
CVE-2025-31994 1 Hcltech 1 Unica 2025-10-21 4.3 Medium
HCL Unica Campaign 12.1.10 is vulnerable to Reflected Cross-Site Scripting (XSS) where an attacker injects malicious script into an HTTP request, which is then reflected unsafely in the server's immediate response to the victim's browser, executing the script as if it originated from the trusted website.
CVE-2023-37501 1 Hcltech 1 Unica 2024-11-21 8.1 High
A Persistent XSS vulnerability can be carried out in a certain field of Unica Campaign.  An attacker could hijack a user's session and perform other attacks.
CVE-2023-37500 1 Hcltech 1 Unica 2024-11-21 8.1 High
A Persistent Cross-site Scripting (XSS) vulnerability can be carried out on certain pages of Unica Platform.  An attacker could hijack a user's session and perform other attacks.
CVE-2023-37499 1 Hcltech 1 Unica 2024-11-21 8.1 High
A Persistent Cross-site Scripting (XSS) vulnerability can be carried out in a certain field of the Unica Platform.  An attacker could hijack a user's session and perform other attacks.
CVE-2023-37498 1 Hcltech 1 Unica 2024-11-21 8.1 High
A user is capable of assigning him/herself to arbitrary groups by reusing a POST request issued by an administrator.  It is possible that an attacker could potentially escalate their privileges.
CVE-2023-37497 1 Hcltech 1 Unica 2024-11-21 8.1 High
The Unica application exposes an API which accepts arbitrary XML input. By manipulating the given XML, an authenticated attacker with certain rights can successfully perform XML External Entity attacks (XXE) against the backend service.
CVE-2021-27777 1 Hcltech 1 Unica 2024-11-21 7.5 High
XML External Entity (XXE) injection vulnerabilities occur when poorly configured XML parsers process user supplied input without sufficient validation. Attackers can exploit this vulnerability to manipulate XML content and inject malicious external entity references.