![]() ![]() Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107.ĬSV Injection vulnerability in Activity Log Team Activity Log = V1.17.0), Mendix SAML Module (Mendix 8 compatible) (All versions = V2.3.0 = V3.3.1 = V3.3.0 License > Encryption Key or (2) > DbEncryptKeyPrimary > Encryption Key. Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107. Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900. Local privilege escalation due to insecure folder permissions. An attacker can provide a malicious file to trigger this vulnerability. ![]() ![]() A specially-crafted malformed file can lead to memory corruption. An out-of-bounds write vulnerability exists in the PICT parsing pctwread_14841 functionality of Accusoft ImageGear 20.0. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |