Filtered by vendor Intel
Subscriptions
Filtered by product Endpoint Management Assistant
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-45128 | 1 Intel | 1 Endpoint Management Assistant | 2024-11-21 | 5 Medium |
Improper authorization in the Intel(R) EMA software before version 1.9.0.0 may allow an authenticated user to potentially enable denial of service via local access. | ||||
CVE-2022-38056 | 1 Intel | 1 Endpoint Management Assistant | 2024-11-21 | 3.8 Low |
Improper neutralization in the Intel(R) EMA software before version 1.8.1.0 may allow a privileged user to potentially enable escalation of privilege via network access. | ||||
CVE-2022-30297 | 1 Intel | 1 Endpoint Management Assistant | 2024-11-21 | 3.8 Low |
Cross-site scripting in the Intel(R) EMA software before version 1.8.0 may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2022-26341 | 1 Intel | 3 Active Management Technology Software Development Kit, Endpoint Management Assistant, Manageability Commander | 2024-11-21 | 8.2 High |
Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access. | ||||
CVE-2021-0013 | 1 Intel | 1 Endpoint Management Assistant | 2024-11-21 | 7.5 High |
Improper input validation for Intel(R) EMA before version 1.5.0 may allow an unauthenticated user to potentially enable denial of service via network access. | ||||
CVE-2020-12316 | 1 Intel | 1 Endpoint Management Assistant | 2024-11-21 | 5.5 Medium |
Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access. | ||||
CVE-2020-12315 | 1 Intel | 1 Endpoint Management Assistant | 2024-11-21 | 9.8 Critical |
Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access. |
Page 1 of 1.