Total vulnerabilities in the database
Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system. This information may or may not be sensitive and does not automatically mean a breach is likely to occur. Overall, any information that could be used for an attack should be limited whenever possible.
Software | From | Fixed in |
---|---|---|
hcltech / sametime | 11.6 | 11.6.x |