Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Threading_building_blocks
(Intel)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-02-28 | CVE-2017-5682 | Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges. | Advisor, Cryptography_for_intel_integrated_performance_primitives, Data_analytics_acceleration_library, Inspector, Integrated_performance_primitives, Math_kernel_library, Mpi_library, Parallel_studio_xe, System_studio, Threading_building_blocks, Trace_analyzer_and_collector, Vtune_amplifier | 7.3 | ||
2012-09-07 | CVE-2010-5269 | Untrusted search path vulnerability in tbb.dll in Intel Threading Building Blocks (TBB) 2.2.013 allows local users to gain privileges via a Trojan horse tbbmalloc.dll file in the current working directory, as demonstrated by a directory that contains a .pbk file. NOTE: some of these details are obtained from third party information. | Threading_building_blocks | N/A |