Filtered by vendor Totaljs
Subscriptions
Total
27 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-11655 | 1 Totaljs | 1 Flow | 2025-10-21 | 4.7 Medium |
| A security flaw has been discovered in Total.js Flow up to 673ef9144dd25d4f4fd4fdfda5af27f230198924. The impacted element is an unknown function of the component SVG File Handler. Performing manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2025-11019 | 2 Totalcms, Totaljs | 2 Total Cms, Total.js Cms | 2025-09-29 | 2.4 Low |
| A vulnerability has been found in Total.js CMS up to 19.9.0. This impacts an unknown function of the component Files Menu. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | ||||
| CVE-2025-10940 | 2 Totalcms, Totaljs | 2 Total Cms, Total.js Cms | 2025-09-26 | 2.4 Low |
| A vulnerability was found in Total.js CMS 1.0.0. Affected by this vulnerability is the function layouts_save of the file /admin/ of the component Layout Page. Performing manipulation of the argument HTML results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2024-48655 | 1 Totaljs | 2 Total.js, Total.js Cms | 2025-05-27 | 8.8 High |
| An issue in Total.js CMS v.1.0 allows a remote attacker to execute arbitrary code via the func.js file. | ||||
| CVE-2022-44019 | 1 Totaljs | 1 Total.js | 2025-05-07 | 8.8 High |
| In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter. | ||||
| CVE-2023-27069 | 1 Totaljs | 1 Openplatform | 2025-02-27 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the account name field. | ||||
| CVE-2023-27070 | 1 Totaljs | 1 Openplatform | 2025-02-27 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field. | ||||
| CVE-2023-30097 | 1 Totaljs | 1 Messenger | 2025-01-29 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the private task field. | ||||
| CVE-2023-30096 | 1 Totaljs | 1 Messenger | 2025-01-29 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user information field. | ||||
| CVE-2023-30095 | 1 Totaljs | 1 Messenger | 2025-01-29 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the channel description field. | ||||
| CVE-2023-30094 | 1 Totaljs | 1 Flow | 2025-01-29 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in TotalJS Flow v10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field in the settings module. | ||||
| CVE-2022-41392 | 1 Totaljs | 1 Total.js | 2024-11-21 | 5.4 Medium |
| A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings. | ||||
| CVE-2022-30013 | 1 Totaljs | 1 Total.js | 2024-11-21 | 5.4 Medium |
| A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file. | ||||
| CVE-2022-26565 | 1 Totaljs | 1 Content Management System | 2024-11-21 | 4.8 Medium |
| A cross-site scripting (XSS) vulnerability in Totaljs all versions before commit 95f54a5commit, allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Name text field when creating a new page. | ||||
| CVE-2021-32831 | 1 Totaljs | 1 Total.js | 2024-11-21 | 7.5 High |
| Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9. | ||||
| CVE-2021-23390 | 1 Totaljs | 1 Total4 | 2024-11-21 | 9.8 Critical |
| The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. | ||||
| CVE-2021-23389 | 1 Totaljs | 1 Total.js | 2024-11-21 | 9.8 Critical |
| The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. | ||||
| CVE-2021-23344 | 1 Totaljs | 1 Total.js | 2024-11-21 | 9.8 Critical |
| The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. | ||||
| CVE-2020-9381 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | 7.5 High |
| controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954. | ||||
| CVE-2020-28495 | 1 Totaljs | 1 Total.js | 2024-11-21 | 7.3 High |
| This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection. | ||||