CVE-2025-55271
- EPSS 0.02%
- Veröffentlicht 26.03.2026 12:59:30
- Zuletzt bearbeitet 26.03.2026 20:31:41
HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response..
CVE-2025-55272
- EPSS 0.01%
- Veröffentlicht 26.03.2026 12:55:37
- Zuletzt bearbeitet 26.03.2026 19:43:11
HCL Aftermarket DPC is affected by Banner Disclosure vulnerability where attackers gain insights into the system’s software and version details which would allow them to craft software specific attacks.
CVE-2025-55273
- EPSS 0.04%
- Veröffentlicht 26.03.2026 12:52:59
- Zuletzt bearbeitet 26.03.2026 20:30:24
HCL Aftermarket DPC is affected by Cross Domain Script Include vulnerability where an attacker using external scripts can tamper with the DOM, altering the content or behavior of the application. Malicious scripts can steal cookies or session tokens,...
CVE-2025-55274
- EPSS 0.01%
- Veröffentlicht 26.03.2026 12:47:40
- Zuletzt bearbeitet 26.03.2026 20:19:07
HCL Aftermarket DPC is affected by Cross-Origin Resource Sharing vulnerability. CORS misconfigurations includes the exposure of sensitive user information to attackers, unauthorized access to APIs, and possible data manipulation or leakage. If an att...
CVE-2025-55275
- EPSS 0.01%
- Veröffentlicht 26.03.2026 12:47:08
- Zuletzt bearbeitet 26.03.2026 20:25:24
HCL Aftermarket DPC is affected by Admin Session Concurrency vulnerability using which an attacker can exploit concurrent sessions to hijack or impersonate an admin user.
CVE-2025-55276
- EPSS 0.01%
- Veröffentlicht 26.03.2026 12:46:30
- Zuletzt bearbeitet 26.03.2026 20:08:16
HCL Aftermarket DPC is affected by Internal IP Disclosure vulnerability will give attackers a clearer map of the organization’s network layout.
CVE-2025-55277
- EPSS 0.02%
- Veröffentlicht 26.03.2026 12:45:23
- Zuletzt bearbeitet 26.03.2026 20:23:30
HCL Aftermarket DPC is affected by Use of Vulnerable/Outdated Versions vulnerability using which an attacker may make use of the exploits available across the internet and craft attacks against the application.