Page 5 of 58 results (0.016 seconds)

CVSS: 8.8EPSS: 0%CPEs: 13EXPL: 0

Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40278, Acronis Agent (Windows) before build 31637, Acronis Cyber Protect 15 (Windows) before build 35979. Escalada de privilegios locales debido a permisos inseguros del puerto de comunicación del conductor. Los siguientes productos se ven afectados: Acronis Cyber ??Protect Home Office (Windows) antes de la compilación 40278, Acronis Agent (Windows) antes de la compilación 31637, Acronis Cyber ?? • https://security-advisory.acronis.com/SEC-4858 https://security-advisory.acronis.com/advisories/SEC-5487 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 1

Local privilege escalation due to insecure driver communication port permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40173, Acronis Agent (Windows) before build 30600, Acronis Cyber Protect 15 (Windows) before build 30984. • https://github.com/alfarom256/CVE-2022-45451 https://security-advisory.acronis.com/SEC-5487 https://security-advisory.acronis.com/advisories/SEC-4858 • CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Excessive attack surface due to binding to an unrestricted IP address. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 30430, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. • https://security-advisory.acronis.com/advisories/SEC-4351 • CWE-668: Exposure of Resource to Wrong Sphere CWE-1327: Binding to an Unrestricted IP Address •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable. • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-787: Out-of-bounds Write •