CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

intel

distribution_for_python

7 known vulnerabilities · sorted by CVSS score

CVE-2018-12175
HIGH7.8

Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may allow an unprivileged user to escalate privileges via local access.

intel / distribution_for_python
Local
Published Sep 12, 2018
CVE-2022-28696
HIGH7.8

Uncontrolled search path in the Intel(R) Distribution for Python before version 2022.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

intel / distribution_for_python
Local
Published Aug 18, 2022
CVE-2018-3650
HIGH7.8

Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2 allows unprivileged user to bypass URI sanitization via local vector.

intel / distribution_for_python+2
Local
Published Aug 1, 2018
CVE-2023-35121
HIGH7.8

Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access.

intel / advisor+17
Local
Published Feb 14, 2024
CVE-2022-26032
MEDIUM6.7

Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.

intel / distribution_for_python
Local
Published Feb 16, 2023
CVE-2023-22355
MEDIUM6.7

Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.

intel / advisor+29
Local
Published May 10, 2023
CVE-2023-29162
MEDIUM6.0

Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.

intel / advisor+17
Local
Published Feb 14, 2024