Vulnerabilities
Vulnerable Software
Security Vulnerabilities
Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40497, Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186.
CVSS Score
4.4
EPSS Score
0.0
Published
2026-03-06
Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.
CVSS Score
4.4
EPSS Score
0.0
Published
2026-03-06
Sensitive information disclosure and manipulation due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.
CVSS Score
5.5
EPSS Score
0.0
Published
2026-03-06
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 41124.
CVSS Score
7.3
EPSS Score
0.0
Published
2026-03-06
Payment Orchestrator Service Elevation of Privilege Vulnerability
CVSS Score
8.6
EPSS Score
0.001
Published
2026-03-05
Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
CVSS Score
6.7
EPSS Score
0.001
Published
2026-03-05
Initialization of a resource with an insecure default in Azure Compute Gallery allows an authorized attacker to disclose information over a network.
CVSS Score
6.5
EPSS Score
0.005
Published
2026-03-05
'.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally.
CVSS Score
6.7
EPSS Score
0.001
Published
2026-03-05
Microsoft Devices Pricing Program Remote Code Execution Vulnerability
CVSS Score
9.8
EPSS Score
0.005
Published
2026-03-05
A vulnerability has been found in Ettercap 0.8.4-Garofalo. Affected by this vulnerability is the function add_data_segment of the file src/ettercap/utils/etterfilter/ef_output.c of the component etterfilter. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
3.3
EPSS Score
0.0
Published
2026-03-05


Contact Us

Shodan ® - All rights reserved