Vulnerabilities (CVE)

Filtered by vendor Hcltech Subscribe
Filtered by product Verse
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-37496 1 Hcltech 1 Verse 2024-11-21 N/A 8.3 HIGH
HCL Verse is susceptible to a Stored Cross Site Scripting (XSS) vulnerability. An attacker could execute script in a victim's web browser to perform operations as the victim and/or steal the victim's cookies, session tokens, or other sensitive information.
CVE-2023-28013 1 Hcltech 1 Verse 2024-11-21 N/A 6.5 MEDIUM
HCL Verse is susceptible to a Reflected Cross Site Scripting (XSS) vulnerability. By tricking a user into entering crafted markup a remote, unauthenticated attacker could execute script in a victim's web browser to perform operations as the victim and/or steal the victim's cookies, session tokens, or other sensitive information.
CVE-2021-27788 1 Hcltech 1 Verse 2024-11-21 N/A 8.3 HIGH
HCL Verse is susceptible to a Cross Site Scripting (XSS) vulnerability.  By tricking a user into clicking a crafted URL, a remote unauthenticated attacker could execute script in a victim's web browser to perform operations as the victim and/or steal the victim's cookies, session tokens, or other sensitive information.
CVE-2021-27768 1 Hcltech 1 Verse 2024-11-21 4.3 MEDIUM 6.3 MEDIUM
Using the ability to perform a Man-in-the-Middle (MITM) attack, which indicates a lack of hostname verification, sensitive account information was able to be intercepted. In this specific scenario, the application's network traffic was intercepted using a proxy server set up in 'transparent' mode while a certificate with an invalid hostname was active. The Android application was found to have hostname verification issues during the server setup and login flows; however, the application did not process requests post-login.
CVE-2020-4099 1 Hcltech 1 Verse 2024-11-21 N/A 5.9 MEDIUM
The application was signed using a key length less than or equal to 1024 bits, making it potentially vulnerable to forged digital signatures. An attacker could forge the same digital signature of the app after maliciously modifying the app.