5.5
CVE-2023-30767
- EPSS 0.06%
- Published 14.02.2024 14:15:50
- Last modified 21.11.2024 08:00:51
- Source secure@intel.com
- Teams watchlist Login
- Open Login
Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Vendorn/a
≫
Product
TensorFlow
Default Statusunaffected
Version
before version 2.13.0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.179 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@intel.com | 5.5 | 0.8 | 4.7 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L
|
CWE-92 DEPRECATED: Improper Sanitization of Custom Special Characters
This entry has been deprecated. It originally came from PLOVER, which sometimes defined "other" and "miscellaneous" categories in order to satisfy exhaustiveness requirements for taxonomies. Within the context of CWE, the use of a more abstract entry is preferred in mapping situations. CWE-75 is a more appropriate mapping.