mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 11:11:27 +00:00
36 lines
1.1 KiB
JSON
36 lines
1.1 KiB
JSON
{
|
|
"id": "CVE-2024-33900",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-05-20T21:15:09.177",
|
|
"lastModified": "2024-06-06T18:15:16.170",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "KeePassXC 2.7.7 allows an attacker (who has the privileges of the victim) to recover cleartext credentials via a memory dump. NOTE: the vendor disputes this because memory-management constraints make this unavoidable in the current design and other realistic designs."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": " KeePassXC 2.7.7 permite a los atacantes recuperar credenciales de texto plano."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/keepassxreboot/keepassxc/issues/10784",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://keepassxc.org/blog/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://keepassxc.org/blog/2019-02-21-memory-security/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |