2024-05-20 22:03:21 +00:00
{
"id" : "CVE-2024-33900" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-05-20T21:15:09.177" ,
2024-06-06 20:03:12 +00:00
"lastModified" : "2024-06-06T18:15:16.170" ,
2024-05-21 14:03:59 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-05-20 22:03:21 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-05-21 18:03:30 +00:00
"value" : "KeePassXC 2.7.7 allows an attacker (who has the privileges of the victim) to recover cleartext credentials via a memory dump. NOTE: the vendor disputes this because memory-management constraints make this unavoidable in the current design and other realistic designs."
2024-05-26 02:03:22 +00:00
} ,
{
"lang" : "es" ,
"value" : " KeePassXC 2.7.7 permite a los atacantes recuperar credenciales de texto plano."
2024-05-20 22:03:21 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838" ,
"source" : "cve@mitre.org"
} ,
2024-05-21 18:03:30 +00:00
{
"url" : "https://github.com/keepassxreboot/keepassxc/issues/10784" ,
"source" : "cve@mitre.org"
} ,
2024-05-20 22:03:21 +00:00
{
"url" : "https://keepassxc.org/blog/" ,
"source" : "cve@mitre.org"
2024-05-21 18:03:30 +00:00
} ,
{
"url" : "https://keepassxc.org/blog/2019-02-21-memory-security/" ,
"source" : "cve@mitre.org"
2024-05-20 22:03:21 +00:00
}
]
}