8 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 3

In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter. En Total.js 4 anterior a 0e5ace7, /api/common/ping puede lograr la ejecución remota de comandos a través de metacaracteres de shell en el parámetro host. • https://github.com/totaljs/code/issues/12 https://www.edoardoottavianelli.it/CVE-2022-44019 https://www.youtube.com/watch?v=x-u3eS8-xJg • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file. Una vulnerabilidad de tipo cross-site scripting (XSS) almacenado en la función de carga de totaljs CMS versión 3.4.5, permite a atacantes ejecutar scripts web arbitrarios por medio de un archivo PDF insertado en JavaScript • https://github.com/totaljs/framework https://www.youtube.com/watch?v=E2784z7Bu2c • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9. Total.js framework (paquete npm total.js) es un framework para la plataforma Node.js escrito en JavaScript puro similar a Laravel de PHP o Django de Python o ASP.NET MVC. • https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11 https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3 https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs https://www.npmjs.com/package/total.js • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. El paquete total.js versiones anteriores a 3.4.9, son vulnerables a una ejecución de código arbitraria por medio de las funciones U.set() y U.get() • https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631 https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3 https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. El paquete total.js versiones anteriores a 3.4.8, es vulnerable a una ejecución de código remota (RCE) por medio de set • https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04 https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069 • CWE-94: Improper Control of Generation of Code ('Code Injection') •