Patching for Windows Mac Linux
CVE Vulnerabilities for KeePass Password Safe 2
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2023‑32784 | 2023‑05‑15 06:15:10 | HIGH (8) | In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation. | 4 | 4 | NETWORK |
CVE‑2023‑24055 | 2023‑01‑22 04:15:12 | MEDIUM (6) | KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC. | 2 | 4 | LOCAL |
CVE‑2022‑0725 | 2022‑03‑10 17:44:57 | HIGH (8) | A flaw was found in keepass. The vulnerability occurs due to logging the plain text passwords in system log and leads to an Information Exposure vulnerability. This flaw allows an attacker to interact and read sensitive passwords and logs. | 4 | 4 | NETWORK |
CVE‑2019‑20184 | 2020‑01‑09 22:15:13 | HIGH (8) | KeePass 2.4.1 allows CSV injection in the title field of a CSV export. | 2 | 6 | LOCAL |
CVE‑2017‑100006 | 2017‑07‑17 13:18:18 | MEDIUM (5) | The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information. | 0 | 0 | NETWORK |
CVE‑2016‑5119 | 2017‑01‑23 21:59:02 | MEDIUM (5) | The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update. | 0 | 0 | NETWORK |
CVE‑2010‑5200 | 2012‑09‑06 10:41:55 | MEDIUM (7) | Untrusted search path vulnerability in KeePass Password Safe before 1.18 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .kdb file. NOTE: some of these details are obtained from third party information. | 0 | 0 | LOCAL |
What applications does Lavawall® monitor?
Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.