KeePass 1.13

CPE Details

KeePass 1.13
1.13
2012-09-17
21h38 +00:00
2012-09-17
21h38 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:keepass:keepass:1.13:*:*:*:*:*:*:*

Informations

Vendor

keepass

Product

keepass

Version

1.13

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-24055 2023-01-21 23h00 +00:00 KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
5.5
Moyen
CVE-2016-5119 2017-01-23 20h00 +00:00 The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update.
7.5
Haute
CVE-2010-5200 2012-09-06 10h00 +00:00 Untrusted search path vulnerability in KeePass Password Safe before 1.18 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .kdb file. NOTE: some of these details are obtained from third party information.
6.9