Page 21 of 174 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows users to execute a clickjacking attack in the meeting's chat. Esta vulnerabilidad permite a usuarios ejecutar un ataque de clickjacking en el chat de la reunión • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-451: User Interface (UI) Misrepresentation of Critical Information CWE-1021: Improper Restriction of Rendered UI Layers or Frames •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Users are able to read group conversations without actively taking part in them. Next to one to one conversations, users are able to start group conversations with multiple users. It was found possible to obtain the contents of these group conversations without being part of it. This could lead to information leakage where confidential information discussed in private groups is read by other users without the users knowledge. Los usuarios pueden leer las conversaciones de grupo sin participar activamente en ellas. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-285: Improper Authorization •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

User SID can be modified resulting in an Arbitrary File Upload or deletion of directories causing a Denial of Service. When interacting in a normal matter with the Sametime chat application, users hold a cookie containing their session ID (SID). This value is also used when sending chat messages, receiving notifications and/or transferring files. El SID del usuario puede ser modificado resultando en una Carga Arbitraria de Archivos o borrado de directorios causando una Denegación de Servicio. Cuando interactúan de manera normal con la aplicación de chat de Sametime, los usuarios mantienen una cookie que contiene su ID de sesión (SID). • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The vulnerability was discovered within the “FaviconService”. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the “meetings”-function where users can specify an external URL where the online meeting will take place. Una vulnerabilidad fue detectada dentro de "FaviconService". El servicio toma una URL codificada en base64 que luego es solicitada por el servidor web. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-472: External Control of Assumed-Immutable Web Parameter •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system. This information may or may not be sensitive and does not automatically mean a breach is likely to occur. Overall, any information that could be used for an attack should be limited whenever possible. Un filtrado de información es producido cuando un sitio web revela información que podría ayudar a un atacante a seguir explotando el sistema. Esta información puede ser o no confidencial y no significa automáticamente que sea producida una brecha. • https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 • CWE-472: External Control of Assumed-Immutable Web Parameter •