The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of TrueCrypt

Truecrypt, VeraCrypt: buffer overflow via veracrypt.sys
An attacker can trigger a buffer overflow via veracrypt.sys of Truecrypt, in order to trigger a denial of service, and possibly to run code...
CVE-2019-1010208, VIGILANCE-VUL-29866
TrueCrypt: detecting hidden partition
An attacker can detect hidden partitions of TrueCrypt...
VIGILANCE-VUL-20432
Windows: code execution during application installation
An attacker can invite the victim to download malicious libraries on Windows, in order to run code during the installation of an application requiring these DLL...
sk110055, VIGILANCE-VUL-18671
TrueCrypt: privilege escalation
A local attacker can bypass restrictions of TrueCrypt, in order to escalate his privileges...
CVE-2015-7358, CVE-2015-7359, VIGILANCE-VUL-17959
TrueCrypt: multiple vulnerabilities
An attacker can use several vulnerabilities of TrueCrypt...
CVE-2014-2884, CVE-2014-2885, VIGILANCE-VUL-14595
TrueCrypt: several vulnerabilities
Several vulnerabilities were announced in TrueCrypt...
VIGILANCE-VUL-8279
GRUB, LILO, TrueCrypt: password disclosure
A vulnerability of GRUB, LILO and TrueCrypt can be used by a local attacker to obtain the password entered when the system starts...
CVE-2008-3895, CVE-2008-3896, CVE-2008-3897, CVE-2008-3898, CVE-2008-3899, CVE-2008-3900, CVE-2008-3901, IVIZ-08-001, IVIZ-08-002, IVIZ-08-003, IVIZ-08-004, IVIZ-08-005, IVIZ-08-006, IVIZ-08-007, IVIZ-08-008, IVIZ-08-009, VIGILANCE-VUL-8065
TrueCrypt: detecting a DFS
A local attacker can detect if a Deniable File System exists in the TrueCrypt partition...
VIGILANCE-VUL-7954
TrueCrypt: unchecked mount point
Under Linux, a local attacker can mount a volume on a sensitive directory in order to generate a denial of service or to create a Trojan...
BID-23180, CVE-2007-1738, VIGILANCE-VUL-6696
TrueCrypt: umounting volume
Under Linux, a local attacker can umount the volume mounted by another user...
BID-23128, VIGILANCE-VUL-6663
Our database contains other pages. You can request a free trial to read them.

Display information about TrueCrypt: