Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-35845
Disclosure Date: September 11, 2023 (last updated October 08, 2023)
Anaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected.
0
Attacker Value
Unknown
CVE-2021-42969
Disclosure Date: May 13, 2022 (last updated February 23, 2025)
Certain Anaconda3 2021.05 are affected by OS command injection. When a user installs Anaconda, an attacker can create a new file and write something in usercustomize.py. When the user opens the terminal or activates Anaconda, the command will be executed.
0
Attacker Value
Unknown
CVE-2022-26526
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed.
0
Attacker Value
Unknown
CVE-2021-42343
Disclosure Date: October 26, 2021 (last updated February 23, 2025)
An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
0
Attacker Value
Unknown
CVE-2005-1198
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Directory traversal vulnerability in apexec.pl for Anaconda Foundation Directory allows remote attackers to read arbitrary files via hex-encoded null characters (%00) in the middle of ".." sequences in the template parameter.
0
Attacker Value
Unknown
CVE-2001-0593
Disclosure Date: August 22, 2001 (last updated February 22, 2025)
Anaconda Partners Clipper 3.3 and earlier allows a remote attacker to read arbitrary files via a '..' (dot dot) attack in the template parameter.
0
Attacker Value
Unknown
CVE-2000-0975
Disclosure Date: December 19, 2000 (last updated February 22, 2025)
Directory traversal vulnerability in apexec.pl in Anaconda Foundation Directory allows remote attackers to read arbitrary files via a .. (dot dot) attack.
0