Page 2 of 57 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Starting with Sametime 12, anonymous users are enabled by default. After logging in as an anonymous user, one has the ability to browse the User Directory and potentially create chats with internal users. A partir de Sametime 12, los usuarios anónimos están habilitados de forma predeterminada. Después de iniciar sesión como usuario anónimo, uno tiene la posibilidad de explorar el directorio de usuarios y potencialmente crear chats con usuarios internos. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0101768 • CWE-276: Incorrect Default Permissions •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows users to execute a clickjacking attack in the meeting's chat. Esta vulnerabilidad permite a usuarios ejecutar un ataque de clickjacking en el chat de la reunión • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-451: User Interface (UI) Misrepresentation of Critical Information CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Users are able to read group conversations without actively taking part in them. Next to one to one conversations, users are able to start group conversations with multiple users. It was found possible to obtain the contents of these group conversations without being part of it. This could lead to information leakage where confidential information discussed in private groups is read by other users without the users knowledge. Los usuarios pueden leer las conversaciones de grupo sin participar activamente en ellas. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-285: Improper Authorization •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

User SID can be modified resulting in an Arbitrary File Upload or deletion of directories causing a Denial of Service. When interacting in a normal matter with the Sametime chat application, users hold a cookie containing their session ID (SID). This value is also used when sending chat messages, receiving notifications and/or transferring files. El SID del usuario puede ser modificado resultando en una Carga Arbitraria de Archivos o borrado de directorios causando una Denegación de Servicio. Cuando interactúan de manera normal con la aplicación de chat de Sametime, los usuarios mantienen una cookie que contiene su ID de sesión (SID). • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The vulnerability was discovered within the “FaviconService”. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the “meetings”-function where users can specify an external URL where the online meeting will take place. Una vulnerabilidad fue detectada dentro de "FaviconService". El servicio toma una URL codificada en base64 que luego es solicitada por el servidor web. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-472: External Control of Assumed-Immutable Web Parameter •