[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-18708":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":46,"name":47,"published":48,"updated":34},18708,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":35,"public_description":36,"public_recommendation":37,"recommendation":34,"references":38,"cvssv3":34,"epss_score":41,"epss_percentile":42,"cve":43,"in_cisa_catalog":45,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"The flaw is caused by improper validation of user-supplied input via the fltr[] parameter to phpThumb.php, which allow attackers to inject and execute arbitrary shell commands via specially crafted requests. Successful exploitation will allow attacker to inject and execute arbitrary shell commands via specially crafted requests in the context of the web server.","phpThumb is prone to a command injection vulnerability.","Update to version 1.7.9 or later.",[39,40],"http://secunia.com/advisories/39556","http://xforce.iss.net/xforce/xfdb/58040",0.0075,0.73125,[44],"CVE-2010-1598",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.801233","phpThumb \u003C 1.7.9 Command Injection Vulnerability","2018-01-02T00:00:00Z"]