An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable. #IPHONE BACKUP EXTRACTOR 4.6.6.0 SOFTWARE#The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287ĪMD Radeon Software may be vulnerable to DLL Hijacking through path variable. Local privilege escalation due to race condition on application startup. The following products are affected: Acronis Cyber Protect Home Office (macOS) before build 39605, Acronis True Image 2021 (macOS) before build 39287 Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 Local privilege escalation due to DLL hijacking vulnerability. Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 Local privilege escalation via named pipe due to improper access control checks. Local privilege escalation due to excessive permissions assigned to child processes. Improper Handling of Exceptional Conditions, Improper Check for Unusual or Exceptional Conditions vulnerability in the ABB SPIET800 and PNI800 module that allows an attacker to cause the denial of service or make the module unresponsive. Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive. #IPHONE BACKUP EXTRACTOR 4.6.6.0 CODE#Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server. For more information, see /zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj Unauthenticated SQL Injection (SQLi) vulnerability discovered in AutoResponder WordPress plugin (versions = v2.6.0 contain Heap-based Buffer Overflow (CWE-122).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |