Описание
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.
Ссылки
- Exploit
- PatchVendor Advisory
- Exploit
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:novell:zenworks_configuration_management:10.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.74401
Высокий
6.8 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
github
больше 3 лет назад
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.
EPSS
Процентиль: 99%
0.74401
Высокий
6.8 Medium
CVSS2
Дефекты
CWE-22