CVE-2022-26032

Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:distribution_for_python:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
References () http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - Vendor Advisory () http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - Vendor Advisory
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 6.7

28 Feb 2023, 19:25

Type Values Removed Values Added
References (MISC) http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - (MISC) http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
CWE CWE-427
CPE cpe:2.3:a:intel:distribution_for_python_programming_language:*:*:*:*:*:*:*:*

17 Feb 2023, 12:52

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-16 20:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-26032

Mitre link : CVE-2022-26032

CVE.ORG link : CVE-2022-26032


JSON object : View

Products Affected

intel

  • distribution_for_python
CWE
CWE-427

Uncontrolled Search Path Element