6.3
CVE-2026-28712 - DLL Hijacking Enables Local Privilege Escalation in Acronis Cyber Protect 17
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
6.3
CVE-2026-28711 - Local Privilege Escalation via DLL Hijacking in Acronis Cyber Protect 17
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.
9.8
CVE-2026-28710 - Authentication Bypass Causing Sensitive Data Exposure in Acronis Cyber Protect 17
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
4.3
CVE-2026-28709 - Improper Authorization Allows Unauthorized Resource Manipulation in Acronis Cyber Protect
Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
4.4
CVE-2025-11790 -
Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.
7.1
CVE-2025-11791 -
Sensitive information disclosure and manipulation due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.
7.3
CVE-2025-11792 -
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 41124.
7.8
CVE-2026-28727 - Local Privilege Escalation via Improper Unix Socket Permissions in Acronis Cyber Protect
Local privilege escalation due to insecure Unix socket permissions. The following products are affected: Acronis Cyber Protect 17 (macOS) before build 41186, Acronis Cyber Protect Cloud Agent (macOS) before build 41124, Acronis True Image (macOS) before build 42902.
6.9
CVE-2026-27770 - ePower epower.ie Insufficiently Protected Credentials
Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
6.9
CVE-2026-24912 - ePower epower.ie Insufficient Session Expiration
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connectβ¦