[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-11945":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":46},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":43,"name":44,"published":45,"updated":27},11945,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":37,"epss_score":38,"epss_percentile":39,"cve":40,"in_cisa_catalog":42,"date":27,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"critical","The flaw is due to an input passed via the uploads.php script is not properly sanitised before being used. Successful exploitation will allow remote attackers to utilize various admin functionality, execute any arbitrary script, and expose potentially sensitive information.","Berta CMS is prone to a file upload vulnerability.","Upgrade to Berta CMS version 0.8.10b or later.",[33,34,35,36],"http://seclists.org/fulldisclosure/2015/Mar/155","http://www.openwall.com/lists/oss-security/2015/03/30/7","http://packetstormsecurity.com/files/131041/Berta-CMS-File-Upload-Bypass.html","http://www.berta.me",9.8,0.31921,0.96795,[41],"CVE-2015-2780",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.805356","Berta CMS Arbitrary File Upload Vulnerability","2018-01-02T00:00:00Z",["Island",47],{"key":48,"params":49,"result":51},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":50},"{\"text-color\":\"gray\"}",{"head":52},{}]