Hcltech

Sametime

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 09.02.2024 21:15:07
  • Zuletzt bearbeitet 17.06.2025 20:15:28

Sametime is impacted by a Cross Site Request Forgery (CSRF) vulnerability. Some REST APIs in the Sametime Proxy application can allow an attacker to perform malicious actions on the application.

  • EPSS 0.24%
  • Veröffentlicht 12.12.2022 13:15:14
  • Zuletzt bearbeitet 24.04.2025 15:15:49

Starting with Sametime 12, anonymous users are enabled by default. After logging in as an anonymous user, one has the ability to browse the User Directory and potentially create chats with internal users.

  • EPSS 0.15%
  • Veröffentlicht 12.05.2022 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:58:32

This vulnerability allows users to execute a clickjacking attack in the meeting's chat.

  • EPSS 0.2%
  • Veröffentlicht 12.05.2022 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:58:32

Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system. This information may or may not be sensitive and does not automatically mean a breach is likely to occur. Overall, any information...

  • EPSS 0.18%
  • Veröffentlicht 12.05.2022 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:58:32

Users are able to read group conversations without actively taking part in them. Next to one to one conversations, users are able to start group conversations with multiple users. It was found possible to obtain the contents of these group conversati...

  • EPSS 0.3%
  • Veröffentlicht 12.05.2022 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:58:32

User SID can be modified resulting in an Arbitrary File Upload or deletion of directories causing a Denial of Service. When interacting in a normal matter with the Sametime chat application, users hold a cookie containing their session ID (SID). This...

  • EPSS 0.35%
  • Veröffentlicht 12.05.2022 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:58:32

The vulnerability was discovered within the “FaviconService”. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the “meetings”-function where users can specify an external URL where the...