Vulnerabilities (CVE)

Filtered by vendor Eramba Subscribe
Filtered by product Eramba
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-36255 1 Eramba 1 Eramba 2024-02-28 N/A 8.8 HIGH
An issue in Eramba Limited Eramba Enterprise and Community edition v.3.19.1 allows a remote attacker to execute arbitrary code via the path parameter in the URL.
CVE-2022-43342 1 Eramba 1 Eramba 2024-02-28 N/A 5.4 MEDIUM
A stored cross-site scripting (XSS) vulnerability in the Add function of Eramba GRC Software c2.8.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the KPI Title text field.
CVE-2020-28031 1 Eramba 1 Eramba 2024-02-28 4.0 MEDIUM 4.3 MEDIUM
eramba through c2.8.1 allows HTTP Host header injection with (for example) resultant wkhtml2pdf PDF printing by authenticated users.
CVE-2020-25105 1 Eramba 1 Eramba 2024-02-28 5.0 MEDIUM 9.8 CRITICAL
eramba c2.8.1 and Enterprise before e2.19.3 has a weak password recovery token (createHash has only a million possibilities).
CVE-2020-25104 1 Eramba 1 Eramba 2024-02-28 3.5 LOW 5.4 MEDIUM
eramba c2.8.1 and Enterprise before e2.19.3 allows XSS via a crafted filename for a file attached to an object. For example, the filename has a complete XSS payload followed by the .png extension.
CVE-2018-7894 1 Eramba 1 Eramba 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
Eramba e1.0.6.033 has Reflected XSS in reviews/filterIndex/ThirdPartyRiskReview via the advanced_filter parameter (aka the Search Parameter).
CVE-2018-7996 1 Eramba 1 Eramba 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
Eramba e1.0.6.033 has Stored XSS on the tooltip box via the /programScopes description parameter.
CVE-2018-7741 1 Eramba 1 Eramba 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
Eramba e1.0.6.033 has Reflected XSS in the Date Filter via the created parameter to the /crons URI.
CVE-2018-7997 1 Eramba 1 Eramba 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
Eramba e1.0.6.033 has Reflected XSS on the Error page of the CSV file inclusion tab of the /importTool/preview URI, with a CSV file polluted with malicious JavaScript.