Hcltech

Sametime

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 17.03.2026 11:29:21
  • Zuletzt bearbeitet 31.03.2026 21:06:04

HCL Sametime is vulnerable to broken server-side validation. While the application performs client-side input checks, these are not enforced by the web server. An attacker can bypass these restrictions by sending manipulated HTTP requests directly to...

  • EPSS 0.02%
  • Veröffentlicht 10.03.2026 10:10:58
  • Zuletzt bearbeitet 07.05.2026 20:05:12

HCL Sametime for Android is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URL

  • EPSS 0.02%
  • Veröffentlicht 05.03.2026 07:15:55
  • Zuletzt bearbeitet 09.03.2026 18:41:33

HCL Sametime for iOS is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URLs.

  • EPSS 0.32%
  • Veröffentlicht 23.10.2024 23:15:12
  • Zuletzt bearbeitet 31.10.2024 15:18:27

HCL Sametime is impacted by the error messages containing sensitive information. An attacker can use this information to launch another, more focused attack.

  • EPSS 0.08%
  • Veröffentlicht 23.10.2024 16:15:05
  • Zuletzt bearbeitet 08.01.2026 19:46:12

HCL Sametime is impacted by insecure services in-use on the UIM client by default. An unused legacy REST service was enabled by default using the HTTP protocol. An attacker could potentially use this service endpoint maliciously.

  • EPSS 0.16%
  • Veröffentlicht 23.10.2024 15:15:30
  • Zuletzt bearbeitet 25.11.2024 18:15:11

HCL Sametime is impacted by misconfigured security related HTTP headers. It was identified that some HTTP headers were missing on web service responses. This will lead to less secure browser default treatment for the policies controlled by these head...

  • EPSS 0.08%
  • Veröffentlicht 23.02.2024 07:15:47
  • Zuletzt bearbeitet 09.01.2026 13:51:50

Sametime Connect desktop chat client includes, but does not use or require, the use of an Eclipse feature called Secure Storage. Using this Eclipse feature to store sensitive data can lead to exposure of that data.

  • EPSS 0.21%
  • Veröffentlicht 10.02.2024 03:15:07
  • Zuletzt bearbeitet 03.06.2025 19:15:33

Sametime is impacted by sensitive fields with autocomplete enabled in the Legacy web chat client. By default, this allows user entered data to be stored by the browser.

  • EPSS 0.21%
  • Veröffentlicht 09.02.2024 22:15:08
  • Zuletzt bearbeitet 03.06.2025 19:15:34

Sametime is impacted by a failure to invalidate sessions. The application is setting sensitive cookie values in a persistent manner in Sametime Web clients. When this happens, cookie values can remain valid even after a user has closed out their ses...

  • EPSS 0.06%
  • Veröffentlicht 09.02.2024 22:15:07
  • Zuletzt bearbeitet 03.06.2025 19:15:33

Sametime is impacted by sensitive information passed in URL.