Show filters
292 Total Results
Displaying 211-220 of 292
Sort by:
Attacker Value
Unknown

CVE-2022-27238

Disclosure Date: June 24, 2022 (last updated February 24, 2025)
BigBlueButton version 2.4.7 (or earlier) is vulnerable to stored Cross-Site Scripting (XSS) in the private chat functionality. A threat actor could inject JavaScript payload in his/her username. The payload gets executed in the browser of the victim each time the attacker sends a private message to the victim or when notification about the attacker leaving room is displayed.
Attacker Value
Unknown

CVE-2022-1717

Disclosure Date: June 20, 2022 (last updated February 23, 2025)
The Custom Share Buttons with Floating Sidebar WordPress plugin before 4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed
Attacker Value
Unknown

CVE-2021-36849

Disclosure Date: June 16, 2022 (last updated February 24, 2025)
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in René Hermenau's Social Media Share Buttons plugin <= 3.8.1 at WordPress.
Attacker Value
Unknown

CVE-2022-0745

Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Like Button Rating WordPress plugin before 2.6.45 allows any logged-in user, such as subscriber, to send arbitrary e-mails to any recipient, with any subject and body
Attacker Value
Unknown

CVE-2022-27235

Disclosure Date: June 09, 2022 (last updated February 24, 2025)
Multiple Broken Access Control vulnerabilities in Social Share Buttons by Supsystic plugin <= 2.2.3 at WordPress.
Attacker Value
Unknown

CVE-2022-33960

Disclosure Date: June 09, 2022 (last updated February 24, 2025)
Multiple Authenticated (subscriber or higher user role) SQL Injection (SQLi) vulnerabilities in Social Share Buttons by Supsystic plugin <= 2.2.3 at WordPress.
Attacker Value
Unknown

CVE-2022-29236

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and prior to versions 2.3.18 and 2.4-rc-6, an attacker can circumvent access restrictions for drawing on the whiteboard. The permission check is inadvertently skipped on the server, due to a previously introduced grace period. The attacker must be a meeting participant. The problem has been patched in versions 2.3.18 and 2.4-rc-6. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-29235

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and prior to versions 2.3.18 and 2.4-rc-6, an attacker who is able to obtain the meeting identifier for a meeting on a server can find information related to an external video being shared, like the current timestamp and play/pause. The problem has been patched in versions 2.3.18 and 2.4-rc-6 by modifying the stream to send the data only for users in the meeting. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-29234

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. Starting in version 2.2 and prior to versions 2.3.18 and 2.4.1, an attacker could send messages to a locked chat within a grace period of 5s any lock setting in the meeting was changed. The attacker needs to be a participant in the meeting. Versions 2.3.18 and 2.4.1 contain a patch for this issue. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-29233

Disclosure Date: June 02, 2022 (last updated February 23, 2025)
BigBlueButton is an open source web conferencing system. In BigBlueButton starting with 2.2 but before 2.3.18 and 2.4-rc-1, an attacker can circumvent access controls to gain access to all breakout rooms of the meeting they are in. The permission checks rely on knowledge of internal ids rather than on verification of the role of the user. Versions 2.3.18 and 2.4-rc-1 contain a patch for this issue. There are currently no known workarounds.