Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
idrix veracrypt vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv3
CVE-2019-1010208
IDRIX, Truecrypt Veracrypt, Truecrypt before 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally exec...
Idrix Truecrypt
Idrix Veracrypt
7.8
CVSSv3
CVE-2016-1281
Untrusted search path vulnerability in the installer for TrueCrypt 7.2 and 7.1a, VeraCrypt prior to 1.17-BETA, and possibly other products allows local users to execute arbitrary code with administrator privileges and conduct DLL hijacking attacks via a Trojan horse DLL in the &q...
Idrix Truecrypt 7.1
Idrix Truecrypt 7.2
Idrix Veracrypt
7.8
CVSSv3
CVE-2019-19501
VeraCrypt 1.24 allows Local Privilege Escalation during execution of VeraCryptExpander.exe.
Idrix Veracrypt 1.24
7.8
CVSSv3
CVE-2015-7358
The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt prior to 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter a...
Ciphershed Ciphershed
Idrix Veracrypt
Truecrypt Truecrypt 7.0
1 EDB exploit
1 Article
7.8
CVSSv3
CVE-2015-7359
The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in Ntdriver.c in TrueCrypt 7.0, VeraCrypt prior to 1.15, and CipherShed, when running on Windows, do not check the impersonation level of impersonation tokens, which allows local users to impersonate a user at Se...
Ciphershed Ciphershed
Idrix Veracrypt
Truecrypt Truecrypt 7.0
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30078
CVE-2024-37896
code injection
CVE-2024-3080
CVE-2024-5172
cross-site request forgery
CVE-2024-6111
firmware
CVE-2024-38504
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started