Page 2 of 7 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection. • https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set https://github.com/totaljs/framework/blob/master/utils.js%23L6606 https://github.com/totaljs/framework/blob/master/utils.js%23L6617 https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

index.js in Total.js Platform before 3.2.3 allows path traversal. index.js en la plataforma Total.js, en versiones anteriores a la 3.2.3, permite un salto de directorio. • https://github.com/ossf-cve-benchmark/CVE-2019-8903 https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903 https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7 https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •