npm package
total.js
pkg:npm/total.js
Vulnerabilities (7)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-32831 | — | < 3.4.9 | 3.4.9 | Aug 30, 2021 | Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to cod | ||
| CVE-2021-23389 | — | < 3.4.9 | 3.4.9 | Jul 12, 2021 | The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. | ||
| CVE-2021-23344 | — | < 3.4.8 | 3.4.8 | Mar 4, 2021 | The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. | ||
| CVE-2020-28494 | — | < 3.4.7 | 3.4.7 | Feb 2, 2021 | This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option s | ||
| CVE-2020-28495 | — | < 3.4.7 | 3.4.7 | Feb 2, 2021 | This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the applicat | ||
| CVE-2019-10260 | — | < 3.3.0-13 | 3.3.0-13 | Mar 28, 2019 | Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format). | ||
| CVE-2019-8903 | — | < 3.2.3 | 3.2.3 | Feb 18, 2019 | index.js in Total.js Platform before 3.2.3 allows path traversal. |
- CVE-2021-32831Aug 30, 2021affected < 3.4.9fixed 3.4.9
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to cod
- CVE-2021-23389Jul 12, 2021affected < 3.4.9fixed 3.4.9
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
- CVE-2021-23344Mar 4, 2021affected < 3.4.8fixed 3.4.8
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
- CVE-2020-28494Feb 2, 2021affected < 3.4.7fixed 3.4.7
This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option s
- CVE-2020-28495Feb 2, 2021affected < 3.4.7fixed 3.4.7
This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the applicat
- CVE-2019-10260Mar 28, 2019affected < 3.3.0-13fixed 3.3.0-13
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format).
- CVE-2019-8903Feb 18, 2019affected < 3.2.3fixed 3.2.3
index.js in Total.js Platform before 3.2.3 allows path traversal.