![]() ![]() The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979.Įxcessive attack surface due to binding to an unrestricted IP address. Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30991, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Cloud Manager (Windows) before build 9.203. ![]() ![]() Sensitive information disclosure due to improper input validation. Remote command execution due to improper input validation. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047. Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Windows) before build 32047. Sensitive information disclosure due to improper token expiration validation. Improper access controls in the entry duplication component in Devolutions Remote Desktop Manager 2023.2.19 and earlier versions on Windows allows an authenticated user, under specific circumstances, to inadvertently share their personal vault entry with shared vaults via an incorrect vault in the duplication write process.īroadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Windows The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35433. Sensitive information leak through log files. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |