📦 True Image
by Acronis
🔍 What is True Image?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows local attackers to escalate privileges on macOS systems by exploiting unrestricted loading of unsigned libraries in Acronis software. It affects users of Acronis Cyber Protec...
This CVE describes a local privilege escalation vulnerability in Acronis Windows products where child processes receive excessive permissions. An attacker with local access can exploit this to gain SY...
This vulnerability allows local attackers to escalate privileges on Windows systems by exploiting improper access control checks on named pipes. Attackers can gain SYSTEM-level privileges by connectin...
This CVE describes a DLL hijacking vulnerability in Acronis Media Builder service that allows local attackers to escalate privileges on Windows systems. Attackers can place malicious DLLs in directori...
This vulnerability allows an unauthenticated attacker with local code execution capability to tamper with the micro-service API in Acronis True Image backup software. This affects Windows users runnin...
This vulnerability allows man-in-the-middle attackers to intercept and manipulate communications between Acronis products and their servers due to missing SSL certificate validation. Affected users in...
CVE-2021-32577 is a local privilege escalation vulnerability in Acronis True Image for Windows where insecure folder permissions allow authenticated local users to gain SYSTEM privileges. This affects...
This vulnerability allows local attackers on macOS systems to escalate privileges from a standard user account to root due to insecure XPC service configuration in Acronis True Image. It affects macOS...