Eramba e1.0.6.033 has Reflected XSS in the Date Filter via the created parameter to the /crons URI.
6.1CVSS
6AI Score
0.001EPSS
Eramba e1.0.6.033 has Reflected XSS in reviews/filterIndex/ThirdPartyRiskReview via the advanced_filter parameter (aka the Search Parameter).
6.1CVSS
6AI Score
0.001EPSS
Eramba e1.0.6.033 has Stored XSS on the tooltip box via the /programScopes description parameter.
6.1CVSS
5.9AI Score
0.001EPSS
Eramba e1.0.6.033 has Reflected XSS on the Error page of the CSV file inclusion tab of the /importTool/preview URI, with a CSV file polluted with malicious JavaScript.
6.1CVSS
6AI Score
0.001EPSS
eramba c2.8.1 and Enterprise before e2.19.3 allows XSS via a crafted filename for a file attached to an object. For example, the filename has a complete XSS payload followed by the .png extension.
5.4CVSS
5.2AI Score
0.001EPSS
eramba c2.8.1 and Enterprise before e2.19.3 has a weak password recovery token (createHash has only a million possibilities).
9.8CVSS
9.4AI Score
0.002EPSS
eramba through c2.8.1 allows HTTP Host header injection with (for example) resultant wkhtml2pdf PDF printing by authenticated users.
4.3CVSS
4.8AI Score
0.001EPSS
A stored cross-site scripting (XSS) vulnerability in the Add function of Eramba GRC Software c2.8.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the KPI Title text field.
5.4CVSS
5.2AI Score
0.001EPSS
An issue in Eramba Limited Eramba Enterprise and Community edition v.3.19.1 allows a remote attacker to execute arbitrary code via the path parameter in the URL.
8.8CVSS
8.8AI Score
0.006EPSS