cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-41610,https://securityvulnerability.io/vulnerability/CVE-2022-41610,Improper Authorization in Intel EMA Configuration Tool and MC Software,"The improper authorization vulnerability in Intel EMA Configuration Tool and MC Software may allow an authenticated user with local access to potentially trigger a denial of service. This flaw affects versions of the software prior to 1.0.4 and 2.4, respectively. Adequate precautions and timely updates are necessary to mitigate the risk associated with this security issue. IT professionals and system administrators should prioritize upgrading to the latest software versions to enhance network security.",Intel,Intel(r) Ema Configuration Tool,5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-05-10T13:17:23.402Z,0 CVE-2022-45128,https://securityvulnerability.io/vulnerability/CVE-2022-45128,Improper Authorization in Intel EMA Software Prior to Version 1.9.0.0,"The Intel EMA software, before version 1.9.0.0, contains an improper authorization vulnerability that can be exploited by authenticated users. This flaw may allow an attacker to potentially initiate a denial of service attack through local access, compromising the software's normal operations and affecting the overall integrity of the system. Users are urged to update to the latest version to mitigate the risk associated with this vulnerability.",Intel,Intel(r) Ema Software,5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-05-10T13:17:21.859Z,0 CVE-2022-38056,https://securityvulnerability.io/vulnerability/CVE-2022-38056,Privilege Escalation Vulnerability in Intel EMA Software,"The vulnerability in Intel EMA software allows a privileged user to exploit improper neutralization of input. This can lead to unauthorized privilege escalation through network access, potentially compromising the integrity of the affected system. Users are advised to update to the latest version to mitigate these risks.",Intel,Intel(r) Ema Software,3.8,LOW,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-16T20:00:28.218Z,0 CVE-2022-30297,https://securityvulnerability.io/vulnerability/CVE-2022-30297,Cross-Site Scripting Vulnerability in Intel EMA Software,"A cross-site scripting vulnerability exists in Intel EMA software prior to version 1.8.0 that could allow a privileged user to enable potential privilege escalation through local access. This vulnerability can expose the system to further attacks if exploited, jeopardizing user data and system integrity.",Intel,Intel(r) Ema Software,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-11T15:48:39.241Z,0 CVE-2022-26341,https://securityvulnerability.io/vulnerability/CVE-2022-26341,"Insufficiently Protected Credentials in Intel AMT SDK, EMA, and MC Products","The vulnerability relates to insufficiently protected credentials in Intel AMT SDK, Intel EMA, and Intel MC software. These affected products prior to their respective versions may allow an authenticated user to exploit network access to potentially escalate privileges, presenting a significant risk if left unaddressed. Users and administrators are encouraged to assess their systems and apply the necessary updates to mitigate this vulnerability.",Intel,"Intel(r) Amt Sdk, Intel(r) Ema And Intel(r) Mc",8.8,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-11-11T15:47:12.330Z,0 CVE-2021-0013,https://securityvulnerability.io/vulnerability/CVE-2021-0013,Improper Input Validation in Intel EMA Affects Network Access,"Intel EMA prior to version 1.5.0 contains an improper input validation vulnerability that could allow unauthenticated users to exploit the system via network access, potentially leading to Denial of Service. This vulnerability underscores the importance of implementing strict input validation mechanisms to safeguard against unintended access threats.",Intel,Intel(r) Ema,7.5,HIGH,0.0010999999940395355,false,,false,false,false,,,false,false,,2021-11-17T19:43:18.000Z,0 CVE-2020-12316,https://securityvulnerability.io/vulnerability/CVE-2020-12316,Insufficient Credential Protection in Intel EMA Software,"The Intel EMA software prior to version 1.3.3 is affected by vulnerabilities due to insufficiently protected credentials, potentially allowing an authorized user to gain unauthorized access and disclose sensitive information via local methods. This exposes critical data and can lead to further exploitation if not promptly addressed.",Intel,Intel(r) Ema,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-11-12T18:14:55.000Z,0 CVE-2020-12315,https://securityvulnerability.io/vulnerability/CVE-2020-12315,Path Traversal Vulnerability in Intel EMA Product,"The vulnerability in Intel EMA, prior to version 1.3.3, allows an unauthenticated user to exploit path traversal flaws. This may potentially facilitate an escalation of privilege through network access, compromising the integrity and security of the system. Organizations using affected versions are urged to update their software to safeguard against this risk.",Intel,Intel(r) Ema,9.8,CRITICAL,0.0036200000904500484,false,,false,false,false,,,false,false,,2020-11-12T18:14:48.000Z,0