Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2005-0583
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in Computer Associates (CA) License Client 0.1.0.15 allows remote attackers to create arbitrary files via .. (dot dot) sequences in a PUTOLF request.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CA License Client 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CA License Client是美国CA公司的一个许可证客户端。 CA License Client PUTOLF存在安全漏洞,漏洞的起因是处理PUTOLF请求中文件名的方法。PUTOLF请求格式如下:A0 PUTOLF 1 H A 10 name 2700 Test Data Goes Here<EOM> 如果发送前缀中包含有"../../../../"的文件名的话,攻击者就可以在正常情况4级目录以下创建文件。所创建的文件在末尾添加有".olf",其内容中包含有"Test Data Goes Her
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2005-0583
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2005-0583
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2005-0583

No comments yet


Leave a comment