Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
acronis true image 2021 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2020-25736
Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.
Acronis True Image 2019
Acronis True Image 2021
Acronis True Image 2020
409
VMScore
CVE-2020-15496
Acronis True Image for Mac prior to 2021 Update 4 allowed local privilege escalation due to insecure folder permissions.
Acronis True Image 2021
Acronis True Image
409
VMScore
CVE-2021-32576
Acronis True Image before 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2).
Acronis True Image 2021
409
VMScore
CVE-2021-32577
Acronis True Image before 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions.
Acronis True Image 2021
409
VMScore
CVE-2021-32578
Acronis True Image before 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2).
Acronis True Image 2021
409
VMScore
CVE-2021-32579
Acronis True Image before 2021 Update 4 for Windows and Acronis True Image before 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API.
Acronis True Image 2021
392
VMScore
CVE-2021-32580
Acronis True Image before 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking.
Acronis True Image 2021
641
VMScore
CVE-2020-10139
Acronis True Image 2021 includes an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis True Image contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories ...
Acronis True Image 2021
614
VMScore
CVE-2020-10140
Acronis True Image 2021 fails to properly set ACLs of the C:\ProgramData\Acronis directory. Because some privileged processes are executed from the C:\ProgramData\Acronis, an unprivileged user can achieve arbitrary code execution with SYSTEM privileges by placing a DLL in one of ...
Acronis True Image 2021
392
VMScore
CVE-2021-44205
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
Acronis True Image 2021
Acronis Cyber Protect Home Office -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »