{"api_version":"1","generated_at":"2026-05-13T13:53:48+00:00","cve":"CVE-2015-0750","urls":{"html":"https://cve.report/CVE-2015-0750","api":"https://cve.report/api/cve/CVE-2015-0750.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-0750","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-0750"},"summary":{"title":"CVE-2015-0750","description":"The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.","state":"PUBLISHED","assigner":"cisco","published_at":"2015-05-23 01:59:00","updated_at":"2026-05-06 22:30:45"},"problem_types":["CWE-264","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.5","severity":"","vector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://tools.cisco.com/security/center/viewAlert.x?alertId=38969","name":"http://tools.cisco.com/security/center/viewAlert.x?alertId=38969","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Cisco HCS Administrative Web Interface Arbitrary Command Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-0750","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0750","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"10.0\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"10.1\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"10.1\\(2\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"10.5\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"10.6\\(2\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"8.0\\(2\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"8.6\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"8.6\\(2\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"9.0\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"9.1\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"9.2\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"750","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"hosted_collaboration_solution","cpe6":"9.5\\(1\\)_base","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-06T04:17:32.840Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20150522 Cisco HCS Administrative Web Interface Arbitrary Command Execution Vulnerability","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://tools.cisco.com/security/center/viewAlert.x?alertId=38969"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2015-05-22T00:00:00.000Z","descriptions":[{"lang":"en","value":"The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2015-05-23T01:57:00.000Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"20150522 Cisco HCS Administrative Web Interface Arbitrary Command Execution Vulnerability","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://tools.cisco.com/security/center/viewAlert.x?alertId=38969"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","ID":"CVE-2015-0750","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20150522 Cisco HCS Administrative Web Interface Arbitrary Command Execution Vulnerability","refsource":"CISCO","url":"http://tools.cisco.com/security/center/viewAlert.x?alertId=38969"}]}}}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2015-0750","datePublished":"2015-05-23T01:00:00.000Z","dateReserved":"2015-01-07T00:00:00.000Z","dateUpdated":"2024-08-06T04:17:32.840Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2015-05-23 01:59:00","lastModifiedDate":"2026-05-06 22:30:45","problem_types":["CWE-264","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:8.0\\(2\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"B777BDBD-35EA-4F2D-80B5-661A048D8D36"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:8.6\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"12DAEBAA-DDE7-4DA1-B801-B444DF988431"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:8.6\\(2\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"845F02DC-13A5-418D-AE13-18B730313000"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:9.0\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"D0F0727D-0253-4721-8F2E-EBAD6E50585A"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:9.1\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"F04848B9-4693-4AB7-874D-82192E2EECC4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:9.2\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"67F7BACA-B565-4923-98D9-F31A795F7AB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:9.5\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"6CD363E4-06F5-4C7F-A3B0-D7C6F4553875"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:10.0\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"DDE9732E-4A16-44BB-ACCF-701829ED542F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:10.1\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"F3745BCC-1543-4A26-B435-B264FF9A8D46"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:10.1\\(2\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"B55D2660-62B9-4B8F-8D07-4AA47CA72E0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:10.5\\(1\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"A57D4C47-2B53-48FC-B107-74BBC71438D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:hosted_collaboration_solution:10.6\\(2\\)_base:*:*:*:*:*:*:*","matchCriteriaId":"23F2A22D-DF8D-4D1C-8FA1-366358BB8454"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"750","Ordinal":"1","Title":"CVE-2015-0750","CVE":"CVE-2015-0750","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"750","Ordinal":"1","NoteData":"The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.","Type":"Description","Title":"CVE-2015-0750"},{"CveYear":"2015","CveId":"750","Ordinal":"2","NoteData":"2015-05-22","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"750","Ordinal":"3","NoteData":"2015-05-22","Type":"Other","Title":"Modified"}]}}}