Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
acronis true image 2021 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2020-25736
Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.
Acronis True Image 2019
Acronis True Image 2021
Acronis True Image 2020
4.6
CVSSv2
CVE-2020-15496
Acronis True Image for Mac prior to 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.
Acronis True Image 2021
Acronis True Image
4.4
CVSSv2
CVE-2021-32580
Acronis True Image before 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.
Acronis True Image 2021
4.6
CVSSv2
CVE-2021-32576
Acronis True Image before 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).
Acronis True Image 2021
4.6
CVSSv2
CVE-2021-32577
Acronis True Image before 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions.
Acronis True Image 2021
4.6
CVSSv2
CVE-2021-32578
Acronis True Image before 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).
Acronis True Image 2021
4.6
CVSSv2
CVE-2021-32579
Acronis True Image before 2021 Update 4 for Windows and Acronis True Image before 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.
Acronis True Image 2021
7.2
CVSSv2
CVE-2020-10139
Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories ...
Acronis True Image 2021
6.9
CVSSv2
CVE-2020-10140
Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of ...
Acronis True Image 2021
4.6
CVSSv2
CVE-2022-24115
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287
Acronis True Image 2021
Acronis Cyber Protect Home Office -
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »