Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:8.0\\(2\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "B777BDBD-35EA-4F2D-80B5-661A048D8D36", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:8.6\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "12DAEBAA-DDE7-4DA1-B801-B444DF988431", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:8.6\\(2\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "845F02DC-13A5-418D-AE13-18B730313000", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:9.0\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "D0F0727D-0253-4721-8F2E-EBAD6E50585A", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:9.1\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "F04848B9-4693-4AB7-874D-82192E2EECC4", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:9.2\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "67F7BACA-B565-4923-98D9-F31A795F7AB6", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:9.5\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "6CD363E4-06F5-4C7F-A3B0-D7C6F4553875", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.0\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "DDE9732E-4A16-44BB-ACCF-701829ED542F", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.1\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "F3745BCC-1543-4A26-B435-B264FF9A8D46", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.1\\(2\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "B55D2660-62B9-4B8F-8D07-4AA47CA72E0C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\\(1\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "A57D4C47-2B53-48FC-B107-74BBC71438D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:hosted_collaboration_solution:10.6\\(2\\)_base:*:*:*:*:*:*:*", "matchCriteriaId": "23F2A22D-DF8D-4D1C-8FA1-366358BB8454", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786."}, {"lang": "es", "value": "La interfaz web administrativa en Cisco Hosted Collaboration Solution (HCS) 10.6(1) y anteriores permite a usuarios remotos autenticados ejecutar comandos arbitrarios a trav\u00e9s de entradas manipuladas en campos no especificados, tambi\u00e9n conocido como Bug ID CSCut02786."}], "id": "CVE-2015-0750", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2015-05-23T01:59:00.077", "references": [{"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38969"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38969"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}