Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Vtune_profiler
(Intel)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 10 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-06-09 | CVE-2021-0077 | Insecure inherited permissions in the installer for the Intel(R) VTune(TM) Profiler before version 2021.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 | ||
2021-11-17 | CVE-2021-33062 | Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 | ||
2022-08-18 | CVE-2022-21807 | Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 | ||
2022-11-11 | CVE-2022-26028 | Uncontrolled search path in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.3 | ||
2023-05-10 | CVE-2022-41658 | Insecure inherited permissions in the Intel(R) VTune(TM) Profiler software before version 2023.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 | ||
2023-05-10 | CVE-2022-41982 | Uncontrolled search path element in the Intel(R) VTune(TM) Profiler software before version 2023.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 | ||
2023-05-10 | CVE-2023-22355 | Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access. | Advisor, Cpu_runtime, Distribution_for_python, Dpc\+\+_compatibility_tool, Embree_ray_tracing_kernel_library, Fortran_compiler, Implicit_spmd_program_compiler, Inspector, Integrated_performance_primitives, Integrated_performance_primitives_cryptography, Mpi_library, Oneapi_base_toolkit, Oneapi_data_analytics_library, Oneapi_deep_neural_network_library, Oneapi_dpc\+\+\/c\+\+_compiler, Oneapi_dpc\+\+_library, Oneapi_hpc_toolkit, Oneapi_iot_toolkit, Oneapi_math_kernel_library, Oneapi_rendering_toolkit, Oneapi_threading_building_blocks, Oneapi_toolkit_and_component_software_installers, Oneapi_video_processing_library, Open_image_denoise, Open_volume_kernel_library, Ospray, Ospray_studio, Trace_analyzer_and_collector, Vtune_profiler | 7.8 | ||
2024-08-14 | CVE-2024-29015 | Uncontrolled search path in some Intel(R) VTune(TM) Profiler software before versions 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | Oneapi_base_toolkit, Vtune_profiler | 7.8 | ||
2020-01-17 | CVE-2019-14613 | Improper access control in driver for Intel(R) VTune(TM) Amplifier for Windows* before update 8 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 | ||
2020-11-12 | CVE-2020-12329 | Uncontrolled search path in the Intel(R) VTune(TM) Profiler before version 2020 Update 1 may allow an authenticated user to potentially enable escalation of privilege via local access. | Vtune_profiler | 7.8 |