Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Moderate

CVE-2019-8903

Disclosure Date: February 18, 2019 (last updated October 06, 2023)
index.js in Total.js Platform before 3.2.3 allows path traversal.
1
Attacker Value
Unknown

CVE-2022-44019

Disclosure Date: October 30, 2022 (last updated December 22, 2024)
In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter.
Attacker Value
Unknown

CVE-2022-41392

Disclosure Date: October 07, 2022 (last updated December 22, 2024)
A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings.
Attacker Value
Unknown

CVE-2022-30013

Disclosure Date: May 16, 2022 (last updated October 07, 2023)
A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file.
Attacker Value
Unknown

CVE-2021-32831

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
Attacker Value
Unknown

CVE-2021-23389

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
Attacker Value
Unknown

CVE-2021-23344

Disclosure Date: March 04, 2021 (last updated February 22, 2025)
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
Attacker Value
Unknown

CVE-2020-28495

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
0
Attacker Value
Unknown

CVE-2020-28494

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
0
Attacker Value
Unknown

CVE-2020-9381

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954.