Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2023-32784

Disclosure Date: May 15, 2023 (last updated October 08, 2023)
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
Attacker Value
Unknown

CVE-2023-35866

Disclosure Date: June 19, 2023 (last updated November 08, 2023)
In KeePassXC through 2.7.5, a local attacker can make changes to the Database security settings, including master password and second-factor authentication, within an authenticated KeePassXC Database session, without the need to authenticate these changes by entering the password and/or second-factor authentication to confirm changes. NOTE: the vendor's position is "asking the user for their password prior to making any changes to the database settings adds no additional protection against a local attacker."
Attacker Value
Unknown

CVE-2023-24055

Disclosure Date: January 22, 2023 (last updated November 08, 2023)
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
Attacker Value
Unknown

CVE-2022-0725

Disclosure Date: March 10, 2022 (last updated November 29, 2024)
A flaw was found in keepass. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.
Attacker Value
Unknown

CVE-2019-20184

Disclosure Date: June 19, 2019 (last updated February 21, 2025)
KeePass 2.4.1 allows CSV injection in the title field of a CSV export.
Attacker Value
Unknown

CVE-2018-1000835

Disclosure Date: December 20, 2018 (last updated November 27, 2024)
KeePassDX version <= 2.5.0.0beta17 contains a XML External Entity (XXE) vulnerability in kdbx file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
Attacker Value
Unknown

CVE-2017-1000066

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information.
0
Attacker Value
Unknown

CVE-2015-8378

Disclosure Date: April 10, 2017 (last updated November 26, 2024)
In KeePassX before 0.4.4, a cleartext copy of password data is created upon a cancel of an XML export action. This allows context-dependent attackers to obtain sensitive information by reading the .xml dotfile.
0
Attacker Value
Unknown

CVE-2016-5119

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update.
0
Attacker Value
Unknown

CVE-2010-5200

Disclosure Date: September 06, 2012 (last updated October 05, 2023)
Untrusted search path vulnerability in KeePass Password Safe before 1.18 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .kdb file. NOTE: some of these details are obtained from third party information.
0