Intel Endpoint Management Assistant (EMA) 1.3.2

CPE Details

Intel Endpoint Management Assistant (EMA) 1.3.2
1.3.2
2020-11-23
23h03 +00:00
2020-11-23
23h03 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:intel:endpoint_management_assistant:1.3.2:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

endpoint_management_assistant

Version

1.3.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-45128 2023-05-10 13h17 +00:00 Improper authorization in the Intel(R) EMA software before version 1.9.0.0 may allow an authenticated user to potentially enable denial of service via local access.
5.5
Moyen
CVE-2022-38056 2023-02-16 20h00 +00:00 Improper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access.
5.3
Moyen
CVE-2022-30297 2022-11-11 15h48 +00:00 Cross-site scripting in the Intel(R) EMA software before version 1.8.0 may allow a privileged user to potentially enable escalation of privilege via local access.
7.8
Haute
CVE-2022-26341 2022-11-11 15h47 +00:00 Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access.
8.8
Haute
CVE-2021-0013 2021-11-17 18h43 +00:00 Improper input validation for Intel(R) EMA before version 1.5.0 may allow an unauthenticated user to potentially enable denial of service via network access.
7.5
Haute
CVE-2020-12316 2020-11-12 17h14 +00:00 Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access.
5.5
Moyen
CVE-2020-12315 2020-11-12 17h14 +00:00 Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
9.8
Critique