** DISPUTED ** KeePass through 2.53 (in a default...
Moderate severity
Unreviewed
Published
Jan 22, 2023
to the GitHub Advisory Database
•
Updated Mar 30, 2024
Description
Published by the National Vulnerability Database
Jan 22, 2023
Published to the GitHub Advisory Database
Jan 22, 2023
Last updated
Mar 30, 2024
** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
References