Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
idrix vulnerabilities and exploits
(subscribe to this query)
392
VMScore
CVE-2016-1281
Untrusted search path vulnerability in the installer for TrueCrypt 7.2 and 7.1a, VeraCrypt prior to 1.17-BETA, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct DLL hijacking attacks via a Trojan horse DLL in the &q...
Idrix Truecrypt 7.1
Idrix Veracrypt
Idrix Truecrypt 7.2
187
VMScore
CVE-2019-1010208
IDRIX, Truecrypt Veracrypt, Truecrypt before 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally exec...
Idrix Truecrypt
Idrix Veracrypt
409
VMScore
CVE-2019-19501
VeraCrypt 1.24 allows Local Privilege Escalation during execution of VeraCryptExpander.exe.
Idrix Veracrypt 1.24
725
VMScore
CVE-2015-7358
The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt prior to 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter a...
Ciphershed Ciphershed
Truecrypt Truecrypt 7.0
Idrix Veracrypt
1 EDB exploit
1 Article
409
VMScore
CVE-2015-7359
The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in Ntdriver.c in TrueCrypt 7.0, VeraCrypt prior to 1.15, and CipherShed, when running on Windows, do not check the impersonation level of impersonation tokens, which allows local users to impersonate a user at Se...
Truecrypt Truecrypt 7.0
Ciphershed Ciphershed
Idrix Veracrypt
1 Article
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started