Filtered by vendor Eramba Subscriptions
Total 10 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-36255 1 Eramba 1 Eramba 2024-10-17 8.8 High
An issue in Eramba Limited Eramba Enterprise and Community edition v.3.19.1 allows a remote attacker to execute arbitrary code via the path parameter in the URL.
CVE-2018-7894 1 Eramba 1 Eramba 2024-09-17 N/A
Eramba e1.0.6.033 has Reflected XSS in reviews/filterIndex/ThirdPartyRiskReview via the advanced_filter parameter (aka the Search Parameter).
CVE-2018-7741 1 Eramba 1 Eramba 2024-09-17 N/A
Eramba e1.0.6.033 has Reflected XSS in the Date Filter via the created parameter to the /crons URI.
CVE-2018-7996 1 Eramba 1 Eramba 2024-09-16 N/A
Eramba e1.0.6.033 has Stored XSS on the tooltip box via the /programScopes description parameter.
CVE-2018-7997 1 Eramba 1 Eramba 2024-09-16 N/A
Eramba e1.0.6.033 has Reflected XSS on the Error page of the CSV file inclusion tab of the /importTool/preview URI, with a CSV file polluted with malicious JavaScript.
CVE-2020-28031 1 Eramba 1 Eramba 2024-08-04 4.3 Medium
eramba through c2.8.1 allows HTTP Host header injection with (for example) resultant wkhtml2pdf PDF printing by authenticated users.
CVE-2020-25105 1 Eramba 1 Eramba 2024-08-04 9.8 Critical
eramba c2.8.1 and Enterprise before e2.19.3 has a weak password recovery token (createHash has only a million possibilities).
CVE-2020-25104 1 Eramba 1 Eramba 2024-08-04 5.4 Medium
eramba c2.8.1 and Enterprise before e2.19.3 allows XSS via a crafted filename for a file attached to an object. For example, the filename has a complete XSS payload followed by the .png extension.
CVE-2022-43342 1 Eramba 1 Eramba 2024-08-03 5.4 Medium
A stored cross-site scripting (XSS) vulnerability in the Add function of Eramba GRC Software c2.8.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the KPI Title text field.
CVE-2024-27593 1 Eramba 1 Eramba 2024-08-02 5.4 Medium
A stored cross-site scripting (XSS) vulnerability in the Filter function of Eramba Version 3.22.3 Community Edition allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the filter name field. This vulnerability has been fixed in version 3.23.0.