cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-24826,https://securityvulnerability.io/vulnerability/CVE-2025-24826,Local Privilege Escalation in Acronis Snap Deploy for Windows,"A vulnerability exists in Acronis Snap Deploy for Windows due to improper folder permissions, which could allow a local attacker to escalate privileges. This vulnerability impacts versions prior to build 4625. Users are encouraged to apply the recommended updates to safeguard their systems against potential exploitation.",Acronis,Acronis Snap Deploy,,,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-28T20:46:19.688Z,0 CVE-2024-34018,https://securityvulnerability.io/vulnerability/CVE-2024-34018,Insecure Folder Permissions Expose Sensitive Information,Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4569.,Acronis,Acronis Snap Deploy,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-29T19:15:08.649Z,0 CVE-2024-34017,https://securityvulnerability.io/vulnerability/CVE-2024-34017,Acronis Snap Deploy Vulnerability: DLL Hijacking Threat,"A vulnerability exists in Acronis Snap Deploy for Windows, which allows local privilege escalation through DLL hijacking. This vulnerability can be exploited by an attacker who has local access to the system, enabling the execution of unauthorized code with elevated privileges. Affected users should upgrade to build 4569 or later to mitigate potential security risks. Continuous monitoring and adherence to security best practices are recommended to protect sensitive systems.",Acronis,Acronis Snap Deploy,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-29T19:14:19.067Z,0 CVE-2024-34019,https://securityvulnerability.io/vulnerability/CVE-2024-34019,Acronis Snap Deploy DLL Hijacking Vulnerability,"A recent vulnerability has been identified in Acronis Snap Deploy for Windows, allowing local privilege escalation due to improper handling of DLL files, commonly known as DLL hijacking. This security flaw could enable an attacker with local access to escalate their privileges, potentially leading to unauthorized actions within the affected system. It is crucial for users of Acronis Snap Deploy to apply any available patches or updates to mitigate this vulnerability. For more detailed information, refer to the official advisory at Acronis security advisory SEC-3079.",Acronis,Acronis Snap Deploy,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-29T19:12:46.700Z,0 CVE-2023-2355,https://securityvulnerability.io/vulnerability/CVE-2023-2355,DLL Hijacking Vulnerability in Acronis Snap Deploy for Windows,"Acronis Snap Deploy for Windows is susceptible to a local privilege escalation vulnerability caused by a DLL hijacking flaw. This vulnerability allows an attacker to exploit the system by manipulating the loading of dynamic link libraries, potentially leading to unauthorized access and control over the affected product. Affected users of Acronis Snap Deploy should upgrade to build 3900 or later to mitigate this risk. For further information, consult the official advisory from Acronis.",Acronis,Acronis Snap Deploy,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-04-27T19:15:00.000Z,0 CVE-2022-30697,https://securityvulnerability.io/vulnerability/CVE-2022-30697,Local privilege escalation due to insecure folder permissions,Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 3640,Acronis,Acronis Snap Deploy,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-05-16T18:15:00.000Z,0 CVE-2022-30695,https://securityvulnerability.io/vulnerability/CVE-2022-30695,Local privilege escalation due to excessive permissions assigned to child processes,Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Snap Deploy (Windows) before build 3640,Acronis,Acronis Snap Deploy,7.8,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-05-16T18:15:00.000Z,0 CVE-2022-30696,https://securityvulnerability.io/vulnerability/CVE-2022-30696,Local privilege escalation due to a DLL hijacking vulnerability,Local privilege escalation due to a DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 3640,Acronis,Acronis Snap Deploy,7.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2022-05-13T00:00:00.000Z,0 CVE-2008-1410,https://securityvulnerability.io/vulnerability/CVE-2008-1410,,Directory traversal vulnerability in the PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to read arbitrary files via directory traversal sequences to the TFTP service.,Acronis,Snap Deploy,,,0.06139000132679939,false,,false,false,false,,,false,false,,2008-03-20T10:00:00.000Z,0 CVE-2008-1411,https://securityvulnerability.io/vulnerability/CVE-2008-1411,,"The PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to cause a denial of service (crash) via an incomplete TFTP request, which triggers a NULL pointer dereference.",Acronis,Snap Deploy,,,0.09590999782085419,false,,false,false,false,,,false,false,,2008-03-20T10:00:00.000Z,0