Hcltech Sametime
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Hcltech Sametime.
By the Year
In 2025 there have been 0 vulnerabilities in Hcltech Sametime. Last year, in 2024 Sametime had 6 security vulnerabilities published. Right now, Sametime is on track to have less security vulnerabilities in 2025 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 6 | 6.42 |
2023 | 0 | 0.00 |
2022 | 6 | 6.50 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Sametime vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Hcltech Sametime Security Vulnerabilities
HCL Sametime is impacted by the error messages containing sensitive information
CVE-2023-50355
5.3 - Medium
- October 23, 2024
HCL Sametime is impacted by the error messages containing sensitive information. An attacker can use this information to launch another, more focused attack.
Generation of Error Message Containing Sensitive Information
HCL Sametime is impacted by misconfigured security related HTTP headers
CVE-2024-30122
5.3 - Medium
- October 23, 2024
HCL Sametime is impacted by misconfigured security related HTTP headers. It was identified that some HTTP headers were missing on web service responses. This will lead to less secure browser default treatment for the policies controlled by these headers.
Sametime is impacted by sensitive fields with autocomplete enabled in the Legacy web chat client
CVE-2023-45696
7.5 - High
- February 10, 2024
Sametime is impacted by sensitive fields with autocomplete enabled in the Legacy web chat client. By default, this allows user entered data to be stored by the browser.
Sametime is impacted by sensitive information passed in URL.
CVE-2023-45716
4.1 - Medium
- February 09, 2024
Sametime is impacted by sensitive information passed in URL.
Cleartext Transmission of Sensitive Information
Sametime is impacted by a failure to invalidate sessions
CVE-2023-45718
7.5 - High
- February 09, 2024
Sametime is impacted by a failure to invalidate sessions. The application is setting sensitive cookie values in a persistent manner in Sametime Web clients. When this happens, cookie values can remain valid even after a user has closed out their session.
Session Fixation
Sametime is impacted by a Cross Site Request Forgery (CSRF) vulnerability
CVE-2023-50349
8.8 - High
- February 09, 2024
Sametime is impacted by a Cross Site Request Forgery (CSRF) vulnerability. Some REST APIs in the Sametime Proxy application can allow an attacker to perform malicious actions on the application.
Session Riding
Starting with Sametime 12, anonymous users are enabled by default
CVE-2022-42446
6.5 - Medium
- December 12, 2022
Starting with Sametime 12, anonymous users are enabled by default. After logging in as an anonymous user, one has the ability to browse the User Directory and potentially create chats with internal users.
Incorrect Default Permissions
This vulnerability allows users to execute a clickjacking attack in the meeting's chat.
CVE-2021-27773
4.3 - Medium
- May 12, 2022
This vulnerability allows users to execute a clickjacking attack in the meeting's chat.
Clickjacking
Users are able to read group conversations without actively taking part in them
CVE-2021-27772
6.5 - Medium
- May 12, 2022
Users are able to read group conversations without actively taking part in them. Next to one to one conversations, users are able to start group conversations with multiple users. It was found possible to obtain the contents of these group conversations without being part of it. This could lead to information leakage where confidential information discussed in private groups is read by other users without the users knowledge.
User SID can be modified resulting in an Arbitrary File Upload or deletion of directories causing a Denial of Service
CVE-2021-27771
7.6 - High
- May 12, 2022
User SID can be modified resulting in an Arbitrary File Upload or deletion of directories causing a Denial of Service. When interacting in a normal matter with the Sametime chat application, users hold a cookie containing their session ID (SID). This value is also used when sending chat messages, receiving notifications and/or transferring files.
Unrestricted File Upload
The vulnerability was discovered within the FaviconService
CVE-2021-27770
8.8 - High
- May 12, 2022
The vulnerability was discovered within the FaviconService. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the meetings-function where users can specify an external URL where the online meeting will take place.
Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system
CVE-2021-27769
5.3 - Medium
- May 12, 2022
Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system. This information may or may not be sensitive and does not automatically mean a breach is likely to occur. Overall, any information that could be used for an attack should be limited whenever possible.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Hcltech Sametime or by Hcltech? Click the Watch button to subscribe.