{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T03:19:44.188","vulnerabilities":[{"cve":{"id":"CVE-2010-5324","sourceIdentifier":"cve@mitre.org","published":"2015-06-07T23:59:01.473","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a zenworks-fileupload request with a crafted directory name in the type parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en UploadServlet en el componente Remote Management en Novell ZENworks Configuration Management (ZCM) 10 anterior a 10.3 permite a atacantes remotos ejecutar código arbitrario a través de una solicitud zenworks-fileupload con un nombre de directorio manipulado en el parámetro type, en conjunto con un nombre de fichero WAR en el parámetro filename y contenido WAR en los datos POST, uan vulnerabilidad diferente a CVE-2010-5323."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:10.0:*:*:*:*:*:*:*","matchCriteriaId":"D386621A-183F-4B76-AFB1-CA0727517B51"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:10.1:*:*:*:*:*:*:*","matchCriteriaId":"C6D9E81C-823D-4443-B523-5DCE011ED5A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*","matchCriteriaId":"4BCFE6AD-E242-4306-8DEB-7023F48BC1D3"}]}]}],"references":[{"url":"http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/39114","source":"cve@mitre.org"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-10-078/","source":"cve@mitre.org"},{"url":"https://bugzilla.novell.com/show_bug.cgi?id=578911","source":"cve@mitre.org"},{"url":"https://www.novell.com/support/kb/doc.php?id=7005573","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/39114","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.zerodayinitiative.com/advisories/ZDI-10-078/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.novell.com/show_bug.cgi?id=578911","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.novell.com/support/kb/doc.php?id=7005573","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}