{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T14:44:37.642","vulnerabilities":[{"cve":{"id":"CVE-2015-0779","sourceIdentifier":"security@opentext.com","published":"2015-06-07T23:59:04.487","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en UploadServlet en Novell ZENworks Configuration Management (ZCM) 10 y 11 anterior a 11.3.2 permite a atacantes remotos ejecutar código arbitrario a través de un nombre de directorio manipulado en el parámetro uid, en conjunto con un nombre de fichero WAR en el parámetro filename y contenido WAR en los datos POST, una vulnerabilidad diferente a CVE-2010-5323 y CVE-2010-5324."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*","matchCriteriaId":"98942F6C-330F-459A-B2B4-72572DB4070E"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*","matchCriteriaId":"9A93DBC3-5C82-4396-B3D0-F32B219E2DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*","matchCriteriaId":"8C0BAB94-6521-4B57-9E56-A57BA5E20C24"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:11.2.1:*:*:*:*:*:*:*","matchCriteriaId":"128BDD11-1B9A-454E-9EE1-79AF9C47D945"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:11.2.2:*:*:*:*:*:*:*","matchCriteriaId":"E6450243-FD92-493F-9EE8-8742BD4E9B8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:zenworks_configuration_management:11.2.3:*:*:*:*:*:*:*","matchCriteriaId":"89A24691-061A-4C04-BB11-084BC08258AC"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2015/Apr/21","source":"security@opentext.com"},{"url":"https://github.com/rapid7/metasploit-framework/pull/5096","source":"security@opentext.com"},{"url":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt","source":"security@opentext.com"},{"url":"https://www.exploit-db.com/exploits/36964/","source":"security@opentext.com"},{"url":"https://www.novell.com/support/kb/doc.php?id=7016419","source":"security@opentext.com"},{"url":"http://seclists.org/fulldisclosure/2015/Apr/21","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/rapid7/metasploit-framework/pull/5096","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://raw.githubusercontent.com/pedrib/PoC/master/generic/zenworks_zcm_rce.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.exploit-db.com/exploits/36964/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.novell.com/support/kb/doc.php?id=7016419","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}