Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2023-32784
Disclosure Date: May 15, 2023 (last updated October 08, 2023)
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
1
Attacker Value
Unknown
CVE-2023-35866
Disclosure Date: June 19, 2023 (last updated November 08, 2023)
In KeePassXC through 2.7.5, a local attacker can make changes to the Database security settings, including master password and second-factor authentication, within an authenticated KeePassXC Database session, without the need to authenticate these changes by entering the password and/or second-factor authentication to confirm changes. NOTE: the vendor's position is "asking the user for their password prior to making any changes to the database settings adds no additional protection against a local attacker."
0
Attacker Value
Unknown
CVE-2023-24055
Disclosure Date: January 22, 2023 (last updated November 08, 2023)
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
0
Attacker Value
Unknown
CVE-2022-0725
Disclosure Date: March 10, 2022 (last updated November 29, 2024)
A flaw was found in keepass. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.
0
Attacker Value
Unknown
CVE-2020-16272
Disclosure Date: August 03, 2020 (last updated February 21, 2025)
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 is missing validation for a client-provided parameter, which allows remote attackers to read and modify data in the KeePass database via an A=0 WebSocket connection.
0
Attacker Value
Unknown
CVE-2020-16271
Disclosure Date: August 03, 2020 (last updated February 21, 2025)
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.
0
Attacker Value
Unknown
CVE-2019-20184
Disclosure Date: June 19, 2019 (last updated February 21, 2025)
KeePass 2.4.1 allows CSV injection in the title field of a CSV export.
0
Attacker Value
Unknown
CVE-2018-1000835
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
KeePassDX version <= 2.5.0.0beta17 contains a XML External Entity (XXE) vulnerability in kdbx file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
0
Attacker Value
Unknown
CVE-2017-1000066
Disclosure Date: July 17, 2017 (last updated November 26, 2024)
The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information.
0
Attacker Value
Unknown
CVE-2015-8378
Disclosure Date: April 10, 2017 (last updated November 26, 2024)
In KeePassX before 0.4.4, a cleartext copy of password data is created upon a cancel of an XML export action. This allows context-dependent attackers to obtain sensitive information by reading the .xml dotfile.
0