Intel Distribution For Python
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Intel Distribution For Python.
By the Year
In 2026 there have been 0 vulnerabilities in Intel Distribution For Python. Last year, in 2025 Distribution For Python had 1 security vulnerability published. Right now, Distribution For Python is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 6.70 |
| 2024 | 1 | 0.00 |
| 2023 | 2 | 7.55 |
| 2022 | 1 | 7.80 |
| 2021 | 0 | 0.00 |
| 2020 | 0 | 0.00 |
| 2019 | 0 | 0.00 |
| 2018 | 2 | 7.80 |
It may take a day or so for new Distribution For Python vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Intel Distribution For Python Security Vulnerabilities
Intel Distribution for Python <2025.2.0: Uncontrolled Search Path PrivEscalation
CVE-2025-30182
6.7 - Medium
- November 11, 2025
Uncontrolled search path for some Intel(R) Distribution for Python software installers before version 2025.2.0 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
DLL preloading
Intel(R) Distribution for Python: Incorrect Default Permissions Leading to Privilege Escalation
CVE-2024-29083
- November 13, 2024
Incorrect default permissions in some Intel(R) Distribution for Python software before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Incorrect Default Permissions
Uncontrolled Search Path in Intel oneAPI Toolkit <4.3.0.251, local escalation
CVE-2023-22355
7.8 - High
- May 10, 2023
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.
DLL preloading
Intel Distribution for Python <2022.1 Uncontrolled Search Path Element
CVE-2022-26032
7.3 - High
- February 16, 2023
Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access.
DLL preloading
Intel Dist for Python <2022.0.3: Unc Search Path Enables Priv Escalation
CVE-2022-28696
7.8 - High
- August 18, 2022
Uncontrolled search path in the Intel(R) Distribution for Python before version 2022.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
DLL preloading
Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may
CVE-2018-12175
7.8 - High
- September 12, 2018
Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may allow an unprivileged user to escalate privileges via local access.
Incorrect Default Permissions
Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2
CVE-2018-3650
7.8 - High
- August 01, 2018
Insufficient Input Validation in Bleach module in INTEL Distribution for Python versions prior to IDP 2018 Update 2 allows unprivileged user to bypass URI sanitization via local vector.
Improper Input Validation
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Intel Distribution For Python or by Intel? Click the Watch button to subscribe.