KeePass 2.48

CPE Details

KeePass 2.48
2.48
2022-03-14
18h09 +00:00
2022-03-15
14h07 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:keepass:keepass:2.48:*:*:*:*:*:*:*

Informations

Vendor

keepass

Product

keepass

Version

2.48

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-32784 2023-05-15 00h00 +00:00 In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
7.5
High
CVE-2023-24055 2023-01-21 23h00 +00:00 KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
5.5
Medium
CVE-2022-0725 2022-03-07 13h00 +00:00 A flaw was found in keepass. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs.
7.5
High