Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
idrix veracrypt vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2019-1010208
IDRIX, Truecrypt Veracrypt, Truecrypt before 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally exec...
Idrix Truecrypt
Idrix Veracrypt
392
VMScore
CVE-2016-1281
Untrusted search path vulnerability in the installer for TrueCrypt 7.2 and 7.1a, VeraCrypt prior to 1.17-BETA, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct DLL hijacking attacks via a Trojan horse DLL in the &q...
Idrix Truecrypt 7.1
Idrix Veracrypt
Idrix Truecrypt 7.2
409
VMScore
CVE-2019-19501
VeraCrypt 1.24 allows Local Privilege Escalation during execution of VeraCryptExpander.exe.
Idrix Veracrypt 1.24
725
VMScore
CVE-2015-7358
The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt prior to 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter a...
Ciphershed Ciphershed
Truecrypt Truecrypt 7.0
Idrix Veracrypt
1 EDB exploit
1 Article
409
VMScore
CVE-2015-7359
The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in Ntdriver.c in TrueCrypt 7.0, VeraCrypt prior to 1.15, and CipherShed, when running on Windows, do not check the impersonation level of impersonation tokens, which allows local users to impersonate a user at Se...
Truecrypt Truecrypt 7.0
Ciphershed Ciphershed
Idrix Veracrypt
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started