📦 Oneapi Base Toolkit
by Intel
🔍 What is Oneapi Base Toolkit?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Intel oneAPI DPC++/C++ Compiler allows authenticated users with local access to potentially escalate privileges. It affects users of Intel oneAPI Toolkits before version 2022.3.1...
This path traversal vulnerability in Intel oneAPI Toolkits allows authenticated users with local access to potentially escalate privileges by manipulating file paths. It affects users running vulnerab...
A heap-based buffer overflow vulnerability in Intel SoC Watch software allows privileged users to potentially escalate privileges via local access. This affects systems running vulnerable versions of ...
This vulnerability in Intel VTune Profiler allows authenticated users with local access to potentially cause denial of service through improper input validation. It affects users running vulnerable ve...
This vulnerability in Intel IPP software for Windows allows authenticated local users to escalate privileges by manipulating the DLL search path. It affects systems running vulnerable versions of Inte...
This vulnerability in Intel VTune Profiler allows authenticated local users to escalate privileges by manipulating the software's search path. It affects users running vulnerable versions of VTune Pro...
This vulnerability in Intel IPP software allows authenticated local users to escalate privileges by exploiting an uncontrolled search path (DLL hijacking). It affects systems running vulnerable versio...
This vulnerability in Intel Distribution for GDB allows authenticated users to cause denial of service through improper buffer restrictions. It affects systems running vulnerable versions of this debu...
This vulnerability in Intel Distribution for GDB software allows authenticated local users to escalate privileges due to incorrect default permissions. Attackers could gain elevated system access by e...
This vulnerability in Intel IPP Cryptography software allows authenticated local users to escalate privileges by manipulating the DLL search path. It affects systems running vulnerable versions of Int...