漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Untrusted search path vulnerability in the installation functionality in ActivePython 3.2.2.3, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Python27 or C:\Python27\Scripts directory, which may be added to the PATH system environment variable by an administrator, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. NOTE: CVE disputes this issue because the unsafe PATH is established only by a separate administrative action that is not a default part of the ActivePython installation
漏洞信息
N/A
漏洞
N/A
漏洞
ActivePython 不安全文件系统权限漏洞
漏洞信息
ActivePython是ActiveState软件公司发布的二进制Python执行版本。 ActivePython中存在漏洞,可被恶意人员利用,本地攻击者以提升的权限执行一定的操作。该漏洞源于应用程序在安装目录设置不安全文件系统权限,攻击者可利用该漏洞重写文件(如‘C:\Python27\’或‘C:\Python32\’) 并以其他用户的权限执行程序。2.7.2.5和3.2.2.3版本中存在漏洞,其他版本也可能受到影响。
漏洞信息
N/A
漏洞
N/A