Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2022-36029

Disclosure Date: April 25, 2024 (last updated April 26, 2024)
Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.
0
Attacker Value
Unknown

CVE-2022-36028

Disclosure Date: April 25, 2024 (last updated April 26, 2024)
Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.
0
Attacker Value
Unknown

CVE-2022-31039

Disclosure Date: June 27, 2022 (last updated October 07, 2023)
Greenlight is a simple front-end interface for your BigBlueButton server. In affected versions an attacker can view any room's settings even though they are not authorized to do so. Only the room owner and administrator should be able to view a room's settings. This issue has been patched in release version 2.12.6.
Attacker Value
Unknown

CVE-2022-26497

Disclosure Date: June 02, 2022 (last updated October 07, 2023)
BigBlueButton Greenlight 2.11.1 allows XSS. A threat actor could have a username containing a JavaScript payload. The payload gets executed in the browser of the victim in the "Share room access" dialog if the victim has shared access to the particular room with the attacker previously.
Attacker Value
Unknown

CVE-2020-27642

Disclosure Date: October 22, 2020 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability exists in the 'merge account' functionality in admins.js in BigBlueButton Greenlight 2.7.6.
Attacker Value
Unknown

CVE-2020-26163

Disclosure Date: September 30, 2020 (last updated February 22, 2025)
BigBlueButton Greenlight before 2.5.6 allows HTTP header (Host and Origin) attacks, which can result in Account Takeover if a victim follows a spoofed password-reset link.