{"uuid": "5b9834e2-1bf8-4942-8a73-f29c96c704fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/KomunitiSiber/236", "content": "KeePass Exploit Allows Attackers to Recover Master Passwords from Memory\nhttps://thehackernews.com/2023/05/keepass-exploit-allows-attackers-to.html\n\nA proof-of-concept (PoC) has been made available for a security flaw impacting the KeePass password manager that could be exploited to recover a victim's master password in cleartext under specific circumstances.\nThe issue, tracked as\u00a0CVE-2023-32784, impacts KeePass versions 2.x for Windows, Linux, and macOS, and is\u00a0expected to be patched\u00a0in version 2.54, which is likely to be released early", "creation_timestamp": "2023-05-22T10:27:44.000000Z"}