[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-13840":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":46,"name":47,"published":48,"updated":34},13840,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":35,"public_description":36,"public_recommendation":37,"recommendation":34,"references":38,"cvssv3":34,"epss_score":41,"epss_percentile":42,"cve":43,"in_cisa_catalog":45,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"An attacker may be able to exploit this issue to execute arbitrary commands on the remote host subject to the privileges of the web server user id, typically nobody.","According to its version, the installation of Discuz! on the remote host fails to properly check for multiple extensions in uploaded files.","Upgrade to the latest version of this software.",[39,40],"http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0440.html","http://www.securityfocus.com/bid/14564",0.02162,0.84238,[44],"CVE-2005-2614",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.19751","Discuz! \u003C= 4.0.0 rc4 Arbitrary File Upload Flaw","2018-01-02T00:00:00Z"]