Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a zenworks-fileupload request with a crafted directory name in the type parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323.
Use CWE-22, Novell vendor hub and Zenworks Configuration Management product page to widen CVE-2010-5324 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2015-0779, CVE-2015-0786 and CVE-2015-0782 for nearby disclosures in the same product family.