Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 05 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:anaconda:anaconda3:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
Thu, 18 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-732 CWE-77 |
|
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anaconda
Anaconda anaconda3 Apple Apple macos |
|
| Vendors & Products |
Anaconda
Anaconda anaconda3 Apple Apple macos |
Wed, 17 Dec 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Anaconda3 macOS installers before 2024.06-1 contain a local privilege escalation vulnerability when installed outside the user's home directory. During installation, world-writable files are created and executed with root privileges. This allows a local low-privileged user to inject arbitrary commands, leading to code execution as the root user. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-18T18:52:56.399Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-46060
Updated: 2025-12-18T16:03:19.870Z
Status : Analyzed
Published: 2025-12-17T19:16:00.160
Modified: 2026-01-05T14:42:39.110
Link: CVE-2024-46060
No data.
OpenCVE Enrichment
Updated: 2025-12-18T09:57:03Z