Filtered by vendor Hcltech
Subscriptions
Filtered by product Sametime
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-30122 | 1 Hcltech | 1 Sametime | 2024-11-06 | 5.8 Medium |
HCL Sametime is impacted by misconfigured security related HTTP headers. It was identified that some HTTP headers were missing on web service responses. This will lead to less secure browser default treatment for the policies controlled by these headers. | ||||
CVE-2023-50355 | 1 Hcltech | 1 Sametime | 2024-10-31 | 3.6 Low |
HCL Sametime is impacted by the error messages containing sensitive information. An attacker can use this information to launch another, more focused attack. | ||||
CVE-2021-27772 | 1 Hcltech | 1 Sametime | 2024-09-17 | 7.1 High |
Users are able to read group conversations without actively taking part in them. Next to one to one conversations, users are able to start group conversations with multiple users. It was found possible to obtain the contents of these group conversations without being part of it. This could lead to information leakage where confidential information discussed in private groups is read by other users without the users knowledge. | ||||
CVE-2021-27771 | 1 Hcltech | 1 Sametime | 2024-09-17 | 8.2 High |
User SID can be modified resulting in an Arbitrary File Upload or deletion of directories causing a Denial of Service. When interacting in a normal matter with the Sametime chat application, users hold a cookie containing their session ID (SID). This value is also used when sending chat messages, receiving notifications and/or transferring files. | ||||
CVE-2021-27773 | 1 Hcltech | 1 Sametime | 2024-09-16 | 4.2 Medium |
This vulnerability allows users to execute a clickjacking attack in the meeting's chat. | ||||
CVE-2021-27770 | 1 Hcltech | 1 Sametime | 2024-09-16 | 6.8 Medium |
The vulnerability was discovered within the “FaviconService”. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the “meetings”-function where users can specify an external URL where the online meeting will take place. | ||||
CVE-2021-27769 | 1 Hcltech | 1 Sametime | 2024-09-16 | 5.3 Medium |
Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system. This information may or may not be sensitive and does not automatically mean a breach is likely to occur. Overall, any information that could be used for an attack should be limited whenever possible. | ||||
CVE-2023-45696 | 1 Hcltech | 1 Sametime | 2024-09-05 | 4 Medium |
Sametime is impacted by sensitive fields with autocomplete enabled in the Legacy web chat client. By default, this allows user entered data to be stored by the browser. | ||||
CVE-2023-45718 | 1 Hcltech | 1 Sametime | 2024-09-05 | 3.9 Low |
Sametime is impacted by a failure to invalidate sessions. The application is setting sensitive cookie values in a persistent manner in Sametime Web clients. When this happens, cookie values can remain valid even after a user has closed out their session. | ||||
CVE-2023-45716 | 1 Hcltech | 1 Sametime | 2024-08-22 | 1.7 Low |
Sametime is impacted by sensitive information passed in URL. | ||||
CVE-2022-42446 | 1 Hcltech | 1 Sametime | 2024-08-03 | 6.5 Medium |
Starting with Sametime 12, anonymous users are enabled by default. After logging in as an anonymous user, one has the ability to browse the User Directory and potentially create chats with internal users. | ||||
CVE-2023-50349 | 1 Hcltech | 1 Sametime | 2024-08-02 | 5.9 Medium |
Sametime is impacted by a Cross Site Request Forgery (CSRF) vulnerability. Some REST APIs in the Sametime Proxy application can allow an attacker to perform malicious actions on the application. |
Page 1 of 1.