Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown
CVE-2022-26565
Disclosure Date: April 01, 2022 (last updated October 07, 2023)
A cross-site scripting (XSS) vulnerability in Totaljs all versions before commit 95f54a5commit, allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Name text field when creating a new page.
0
Attacker Value
Unknown
CVE-2021-32831
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
0
Attacker Value
Unknown
CVE-2021-23390
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
0
Attacker Value
Unknown
CVE-2021-23389
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
0
Attacker Value
Unknown
CVE-2021-23344
Disclosure Date: March 04, 2021 (last updated February 22, 2025)
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
0
Attacker Value
Unknown
CVE-2020-28495
Disclosure Date: February 02, 2021 (last updated February 22, 2025)
This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
0
Attacker Value
Unknown
CVE-2020-28494
Disclosure Date: February 02, 2021 (last updated February 22, 2025)
This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
0
Attacker Value
Unknown
CVE-2020-9381
Disclosure Date: February 24, 2020 (last updated February 21, 2025)
controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954.
0
Attacker Value
Unknown
CVE-2019-15954
Disclosure Date: September 05, 2019 (last updated November 27, 2024)
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script>
0
Attacker Value
Unknown
CVE-2019-15952
Disclosure Date: September 05, 2019 (last updated November 27, 2024)
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.
0