{"vulnerability": "cve-2023-32784", "sightings": [{"uuid": "f41b0ca2-2ecd-4001-b923-f17d28afa191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/tech_cyber_ai_israel/119", "content": "\u05d1\u05ea\u05d0\u05e8\u05d9\u05da \u05d4- 15.05.2023 \u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05d7\u05d5\u05dc\u05e9\u05d4 \u05d1\u05ea\u05d5\u05db\u05e0\u05d4:\nKeePass\n\n\u05d4\u05ea\u05d5\u05db\u05e0\u05d4 \u05d4\u05d6\u05d5 \u05d9\u05d5\u05e9\u05d1\u05ea \u05dc\u05d5\u05e7\u05d0\u05dc\u05d9\u05ea \u05e2\u05dc \u05d4\u05de\u05d7\u05e9\u05d1, \u05d5\u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05de\u05e9\u05ea\u05de\u05e9 \u05dc\u05e0\u05d4\u05dc \u05e1\u05e1\u05de\u05d0\u05d5\u05ea.\n(\u05d9\u05e9 \u05e9\u05d9\u05de\u05d5\u05e9 \u05e8\u05d7\u05d1 \u05de\u05d0\u05d5\u05d3 \u05d1\u05ea\u05d5\u05db\u05e0\u05d4 \u05d4\u05d6\u05d5 \u05d1\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e8\u05d1\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd).\n\n(\u05de\u05ea\u05d7\u05d1\u05e8\u05d9\u05dd \u05dc\u05ea\u05d5\u05db\u05e0\u05d4 \u05e2\u05dd \u05e1\u05e1\u05de\u05d0 \u05e8\u05d0\u05e9\u05d5\u05e0\u05d9\u05ea, \u05d5\u05e9\u05de\u05d4 \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e8\u05d0\u05d5\u05ea \u05d0\u05ea \u05db\u05dc \u05d4\u05e1\u05e1\u05de\u05d0\u05d5\u05ea \u05dc\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9\u05dd \u05d4\u05e9\u05d5\u05e0\u05d9\u05dd)\n\n\u05de\u05e1\u05e4\u05e8 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4: CVE-2023-32784\n[https://nvd.nist.gov/vuln/detail/cve-2023-32784]\n\n\u05d1\u05ea\u05d0\u05e8\u05d9\u05da \u05d4- 16.05.2023 (\u05e9\u05d9\u05ea\u05e4\u05ea\u05d9 \u05d0\u05ea \u05d4\u05e1\u05e8\u05d8\u05d5\u05df \u05d4\u05d6\u05d4 [\u05d1\u05d0\u05e0\u05d2\u05dc\u05d9\u05ea]) , \u05e9\u05de\u05e1\u05d1\u05d9\u05e8 \u05d0\u05d9\u05da \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e0\u05e6\u05dc \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05db\u05d3\u05d9 \u05dc\u05d2\u05e0\u05d5\u05d1 \u05d0\u05ea \u05d4\u05e1\u05e1\u05de\u05d0 \u05d4\"\u05e8\u05d0\u05e9\u05d5\u05e0\u05d9\u05ea\" \u05e9\u05dc \u05d4-\nKeePASS\n\u05e9\u05de\u05d5\u05ea\u05e7\u05df \u05e2\u05dc \u05d4\u05de\u05d7\u05e9\u05d1, \u05d5\u05db\u05db\u05d4 \u05d1\u05e2\u05e6\u05dd \u05dc\u05e7\u05d1\u05dc \u05d2\u05d9\u05e9\u05d4 \u05dc\u05db\u05dc \u05e9\u05d0\u05e8 \u05d4\u05e1\u05e1\u05de\u05d0\u05d5\u05ea \u05e9\u05e9\u05de\u05d5\u05e8\u05d5\u05ea \u05d1\u05ea\u05d5\u05db\u05e0\u05d4.\n\n\u05e6\u05e4\u05d9\u05d9\u05d4 \u05de\u05d4\u05e0\u05d4 \ud83d\ude00\n\n\u05dc\u05e6\u05e4\u05d9\u05d9\u05d4 \u05d1\u05d9\u05d5\u05d8\u05d9\u05d5\u05d1:\nhttps://youtu.be/esHlu-7Bd0c\n\n#KeePass\n#KeePass_CVE\n\n\u05d0\u05d4\u05d1\u05ea\u05dd? \u05e9\u05d9\u05de\u05d5 \u05dc\u05d9\u05d9\u05e7 \u2665\ufe0f\n\u05de\u05d5\u05d6\u05de\u05e0\u05d9\u05dd \u05dc\u05e9\u05ea\u05e3 \u05e2\u05dd \u05d7\u05d1\u05e8\u05d9\u05dd \u05d5\u05de\u05e9\u05e4\u05d7\u05d4.\n\n\u05dc\u05d9\u05e0\u05e7 \u05dc\u05e2\u05e8\u05d5\u05e5 \u05d1\u05d8\u05dc\u05d2\u05e8\u05dd:\nhttps://t.me/tech_cyber_ai_israel\n\n\u05dc\u05d9\u05e0\u05e7 \u05dc\u05e2\u05e8\u05d5\u05e5 \u05d1\u05d9\u05d5\u05d8\u05d9\u05d5\u05d1:\nhttps://www.youtube.com/@\u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4-\u05e1\u05d9\u05d9\u05d1\u05e8-\u05d1\u05d9\u05e0\u05d4-\u05de\u05dc\u05d0\u05db\u05d5\u05ea\u05d9\u05ea\n\n\u05dc\u05e8\u05e9\u05d9\u05de\u05ea \u05d4\u05e4\u05d5\u05e1\u05d8\u05d9\u05dd/\u05e1\u05e8\u05d8\u05d5\u05e0\u05d9\u05dd \u05d4\u05de\u05dc\u05d0\u05d4:\nhttps://t.me/tech_cyber_ai_israel/19", "creation_timestamp": "2024-09-15T21:17:11.000000Z"}, {"uuid": "be847343-d8ad-4ad0-907b-4f7c26e34714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10999", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 KeePass 2.X Master Password Dumper (CVE-2023-32784).\n\nhttps://github.com/vdohney/keepass-password-dumper", "creation_timestamp": "2023-05-17T11:40:29.000000Z"}, {"uuid": "ad9a11d0-ef47-413a-ae07-f03a02f4a6b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/BleepingComputer/16889", "content": "Latest news and stories from BleepingComputer.com\nKeePass v2.54 fixes bug that leaked cleartext master password\n\nKeePass has released version 2.54, fixing the CVE-2023-32784 vulnerability that allows the extraction of the cleartext master password from the application's memory. [...]", "creation_timestamp": "2023-06-05T17:24:25.000000Z"}, {"uuid": "ff904594-8727-4fe9-acb9-5af2b8eacc52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/BleepingComputer/16885", "content": "\u200aKeePass v2.54 fixes bug that leaked cleartext master password\n\nKeePass has released version 2.54, fixing the CVE-2023-32784 vulnerability that allows the extraction of the cleartext master password from the application's memory. [...]\n\nhttps://www.bleepingcomputer.com/news/security/keepass-v254-fixes-bug-that-leaked-cleartext-master-password/", "creation_timestamp": "2023-06-05T16:47:19.000000Z"}, {"uuid": "9e7624a2-410d-4e58-9166-110aa57b5eb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4410", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aA CVE-2023-32784 proof-of-concept implementation in Rust\nURL\uff1ahttps://github.com/LeDocteurDesBits/cve-2023-32784\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-23T20:16:54.000000Z"}, {"uuid": "7e0ff0f8-4d9d-4b60-9289-87808170cd1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2819", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-32784\n\ud83d\udd39 Description: In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.\n\ud83d\udccf Published: 2023-05-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T19:29:40.475Z\n\ud83d\udd17 References:\n1. https://github.com/vdohney/keepass-password-dumper\n2. https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/\n3. https://github.com/keepassxreboot/keepassxc/discussions/9433", "creation_timestamp": "2025-01-23T20:03:42.000000Z"}, {"uuid": "adc6d7ba-0a3b-468b-80a7-5866b3ffa0b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/tech_cyber_ai_israel/66", "content": "\u05d1\u05ea\u05d0\u05e8\u05d9\u05da \u05d4- 15.05.2023 \u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05d7\u05d5\u05dc\u05e9\u05d4 \u05d1\u05ea\u05d5\u05db\u05e0\u05d4:\nKeePass\n\n\u05d4\u05ea\u05d5\u05db\u05e0\u05d4 \u05d4\u05d6\u05d5 \u05d9\u05d5\u05e9\u05d1\u05ea \u05dc\u05d5\u05e7\u05d0\u05dc\u05d9\u05ea \u05e2\u05dc \u05d4\u05de\u05d7\u05e9\u05d1, \u05d5\u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05de\u05e9\u05ea\u05de\u05e9 \u05dc\u05e0\u05d4\u05dc \u05e1\u05e1\u05de\u05d0\u05d5\u05ea.\n(\u05d9\u05e9 \u05e9\u05d9\u05de\u05d5\u05e9 \u05e8\u05d7\u05d1 \u05de\u05d0\u05d5\u05d3 \u05d1\u05ea\u05d5\u05db\u05e0\u05d4 \u05d4\u05d6\u05d5 \u05d1\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05e8\u05d1\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd).\n\n(\u05de\u05ea\u05d7\u05d1\u05e8\u05d9\u05dd \u05dc\u05ea\u05d5\u05db\u05e0\u05d4 \u05e2\u05dd \u05e1\u05e1\u05de\u05d0 \u05e8\u05d0\u05e9\u05d5\u05e0\u05d9\u05ea, \u05d5\u05e9\u05de\u05d4 \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e8\u05d0\u05d5\u05ea \u05d0\u05ea \u05db\u05dc \u05d4\u05e1\u05e1\u05de\u05d0\u05d5\u05ea \u05dc\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9\u05dd \u05d4\u05e9\u05d5\u05e0\u05d9\u05dd)\n\n\u05de\u05e1\u05e4\u05e8 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4: CVE-2023-32784\n[https://nvd.nist.gov/vuln/detail/cve-2023-32784]\n\n\u05d1\u05ea\u05d0\u05e8\u05d9\u05da \u05d4- 16.05.2023 (\u05e9\u05d9\u05ea\u05e4\u05ea\u05d9 \u05d0\u05ea \u05d4\u05e1\u05e8\u05d8\u05d5\u05df \u05d4\u05d6\u05d4 [\u05d1\u05d0\u05e0\u05d2\u05dc\u05d9\u05ea]) , \u05e9\u05de\u05e1\u05d1\u05d9\u05e8 \u05d0\u05d9\u05da \u05d0\u05e4\u05e9\u05e8 \u05dc\u05e0\u05e6\u05dc \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05db\u05d3\u05d9 \u05dc\u05d2\u05e0\u05d5\u05d1 \u05d0\u05ea \u05d4\u05e1\u05e1\u05de\u05d0 \u05d4\"\u05e8\u05d0\u05e9\u05d5\u05e0\u05d9\u05ea\" \u05e9\u05dc \u05d4-\nKeePASS\n\u05e9\u05de\u05d5\u05ea\u05e7\u05df \u05e2\u05dc \u05d4\u05de\u05d7\u05e9\u05d1, \u05d5\u05db\u05db\u05d4 \u05d1\u05e2\u05e6\u05dd \u05dc\u05e7\u05d1\u05dc \u05d2\u05d9\u05e9\u05d4 \u05dc\u05db\u05dc \u05e9\u05d0\u05e8 \u05d4\u05e1\u05e1\u05de\u05d0\u05d5\u05ea \u05e9\u05e9\u05de\u05d5\u05e8\u05d5\u05ea \u05d1\u05ea\u05d5\u05db\u05e0\u05d4.\n\n\u05e6\u05e4\u05d9\u05d9\u05d4 \u05de\u05d4\u05e0\u05d4 \ud83d\ude00\n\n\u05dc\u05e6\u05e4\u05d9\u05d9\u05d4 \u05d1\u05d9\u05d5\u05d8\u05d9\u05d5\u05d1:\nhttps://youtu.be/esHlu-7Bd0c\n\n#KeePass\n#KeePass_CVE\n\n\u05d0\u05d4\u05d1\u05ea\u05dd? \u05e9\u05d9\u05de\u05d5 \u05dc\u05d9\u05d9\u05e7 \u2665\ufe0f\n\u05de\u05d5\u05d6\u05de\u05e0\u05d9\u05dd \u05dc\u05e9\u05ea\u05e3 \u05e2\u05dd \u05d7\u05d1\u05e8\u05d9\u05dd \u05d5\u05de\u05e9\u05e4\u05d7\u05d4.\n\n\u05dc\u05d9\u05e0\u05e7 \u05dc\u05e2\u05e8\u05d5\u05e5 \u05d1\u05d8\u05dc\u05d2\u05e8\u05dd:\nhttps://t.me/tech_cyber_ai_israel\n\n\u05dc\u05d9\u05e0\u05e7 \u05dc\u05e2\u05e8\u05d5\u05e5 \u05d1\u05d9\u05d5\u05d8\u05d9\u05d5\u05d1:\nhttps://www.youtube.com/@\u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d4-\u05e1\u05d9\u05d9\u05d1\u05e8-\u05d1\u05d9\u05e0\u05d4-\u05de\u05dc\u05d0\u05db\u05d5\u05ea\u05d9\u05ea\n\n\u05dc\u05e8\u05e9\u05d9\u05de\u05ea \u05d4\u05e4\u05d5\u05e1\u05d8\u05d9\u05dd/\u05e1\u05e8\u05d8\u05d5\u05e0\u05d9\u05dd \u05d4\u05de\u05dc\u05d0\u05d4:\nhttps://t.me/tech_cyber_ai_israel/19", "creation_timestamp": "2024-09-15T21:17:11.000000Z"}, {"uuid": "ee784274-63e1-4c73-b543-b3998d903b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/road_to_oscp/222", "content": "KeePwn \n\u0423\u043c\u0435\u0435\u0442 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0442\u044c \u0445\u043e\u0441\u0442\u044b \u0432 \u0434\u043e\u043c\u0435\u043d\u0435 , \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u0430\u043f\u0443\u0449\u0435\u043d KeePass.\n\n\u0412 C$ \u0438\u0449\u0435\u0442 \u0444\u0430\u0439\u043b\u044b, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 KeePass. \u0422\u0440\u0435\u0431\u0443\u044e\u0442\u0441\u044f \u043f\u0440\u0430\u0432\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0445\u043e\u0441\u0442\u0430\u0445.\n\n\u0412\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f:\nKeePass Plugin Abuse\nKeePass Trigger Abuse \nKeePass Dump Parsing (CVE-2023-32784) \n\n\nhttps://github.com/Orange-Cyberdefense/KeePwn", "creation_timestamp": "2023-07-04T17:20:57.000000Z"}, {"uuid": "aeac5010-34ca-4487-8d37-692a74cb8e95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/5007", "content": "\u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0441\u0441\u044b\u043b\u043e\u043a \u0441 \u043d\u043e\u0432\u043e\u0441\u0442\u044f\u043c\u0438 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0438, \u0434\u043e \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0435 \u0434\u043e\u0448\u043b\u0438 \u0440\u0443\u043a\u0438 \u0432\u043e\u0432\u0440\u0435\u043c\u044f:\n\n- \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0422\u0432\u0438\u0442\u0442\u0435\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0434\u0430\u043b\u044f\u043b\u0438 \u0441\u0432\u043e\u0438 \u0442\u0432\u0438\u0442\u044b, \u043e\u043d\u0438 (\u0442\u0432\u0438\u0442\u044b) \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u044e\u0442\u0441\u044f\nhttps://www.theverge.com/2023/5/22/23732497/twitter-bug-restoring-deleted-tweets-retweets\n\n- PoC \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438 master password \u0443 KeePass, \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0433\u043e \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0430 \u043f\u0430\u0440\u043e\u043b\u0435\u0439\nhttps://github.com/vdohney/keepass-password-dumper\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32784\n\n- \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0442\u0440\u0435\u043a\u0438\u043d\u0433\u0430 \u043b\u0443\u0447\u0448\u0435\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0434\u043b\u044f \u0437\u0430\u0447\u0430\u0442\u0438\u044f \u0440\u0435\u0431\u0435\u043d\u043a\u0430, \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f, \u0441\u043b\u0438\u0432\u0430\u043b\u043e \u0434\u0430\u043d\u043d\u044b\u0435 \u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u0445 \u0432 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0440\u0435\u043a\u043b\u0430\u043c\u043d\u044b\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \nhttps://techcrunch.com/2023/05/18/ftc-premom-fertility-tracking-shared-data-google/", "creation_timestamp": "2023-05-23T14:06:14.000000Z"}, {"uuid": "6dd6d353-e1e0-48eb-84be-349fecac3d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/netrunnerz/479", "content": "\u200b\u200b\ud83d\udd34KeePass 2.X Master Password Dumper \nCVE-2023-32784\n\n\u041a\u0440\u0430\u0442\u043a\u043e:\nCVE-2023-32784 - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 KeePass. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0438\u0437\u0432\u043b\u0435\u0447\u044c \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u0434\u0430\u0436\u0435 \u043a\u043e\u0433\u0434\u0430 \u0440\u0430\u0431\u043e\u0447\u0435\u0435 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u043e \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u0438\u043b\u0438 \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442. \u042d\u0442\u043e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0442\u0430\u043a \u043a\u0430\u043a \u043e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u043f\u0430\u0440\u043e\u043b\u044f\u043c, \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 KeePass. \n\n\u0420\u0430\u0437\u0431\u043e\u0440:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 KeePass. \u041a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0432\u0432\u043e\u0434\u0438\u0442 \u0441\u0432\u043e\u0439 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c, KeePass \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0435\u0433\u043e \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435. \u042d\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u0430\u0440\u043e\u043b\u044c \u043d\u0435 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d \u0438 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043b\u0435\u0433\u043a\u043e \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u043d \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u0435\u0441\u043b\u0438 \u0443 \u043d\u0435\u0433\u043e \u0435\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 KeePass. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u043c\u0435\u0435\u0442 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443 \u0436\u0435\u0440\u0442\u0432\u044b. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0432\u044b\u0433\u0440\u0443\u0437\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 KeePass, \u0430 \u0437\u0430\u0442\u0435\u043c \u0438\u0441\u043a\u0430\u0442\u044c \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c \u0432 \u0432\u044b\u0433\u0440\u0443\u0437\u043a\u0435. \u041a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043f\u043e\u043b\u0443\u0447\u0438\u0442 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c, \u043e\u043d \u0441\u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u043f\u0430\u0440\u043e\u043b\u044f\u043c, \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 KeePass. \n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 KeePass 2.54. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u0431\u043e\u043b\u0435\u0435 \u0441\u0442\u0430\u0440\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e KeePass, \u0434\u043e\u043b\u0436\u043d\u044b \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e 2.54, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0435\u0431\u044f \u043e\u0442 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \n\n#CVE #critical", "creation_timestamp": "2023-05-26T17:01:12.000000Z"}, {"uuid": "04f61f7a-2cd0-4c21-859c-1b329e6bda9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4394", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aKeePass 2.X dumper (CVE-2023-32784)\nURL\uff1ahttps://github.com/z-jxy/keepass_dump\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-22T00:22:53.000000Z"}, {"uuid": "f998afa4-7fdb-4e2e-bce3-6fd1a959fd5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4391", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aThis script complements the results obtained through the keepass-password-dumper tool when exploiting the CVE-2023-32784 vulnerability affecting KeePass.\nURL\uff1ahttps://github.com/und3sc0n0c1d0/BruteForce-to-KeePass\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-23T01:14:04.000000Z"}, {"uuid": "cbd2a74f-0bd5-4bfe-995b-2da414caad70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4388", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aOriginal PoC for CVE-2023-32784\nURL\uff1ahttps://github.com/vdohney/keepass-password-dumper\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-05-20T23:35:55.000000Z"}, {"uuid": "0437e0fb-c6f0-4cb8-9e41-1bc01ce07c38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4487", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aRe-write of original KeePass 2.X Master Password Dumper (CVE-2023-32784) POC in python.\nURL\uff1ahttps://github.com/hau-zy/KeePass-dump-py\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-06-04T08:29:03.000000Z"}, {"uuid": "1588d7ee-f7c3-48b6-abe9-22656df06fed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/ctinow/112671", "content": "KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784)\n\nhttps://ift.tt/43BPAu9", "creation_timestamp": "2023-05-18T11:11:30.000000Z"}, {"uuid": "941037a4-a1b8-4d0e-b2a9-a93c59eb20bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/112466", "content": "KeePass flaw allows retrieval of master password, PoC is public (CVE-2023-32784)\n\nhttps://ift.tt/43BPAu9", "creation_timestamp": "2023-05-17T15:41:22.000000Z"}, {"uuid": "65e08739-1dbb-4b04-9a83-9312c239d78f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "Telegram/DrDMVPOkPfm9vtFh1Nj-7-aXipUqQ1t_SrmiRq5-pb3VSK8", "content": "", "creation_timestamp": "2025-03-31T23:00:05.000000Z"}, {"uuid": "5b9834e2-1bf8-4942-8a73-f29c96c704fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/KomunitiSiber/236", "content": "KeePass Exploit Allows Attackers to Recover Master Passwords from Memory\nhttps://thehackernews.com/2023/05/keepass-exploit-allows-attackers-to.html\n\nA proof-of-concept (PoC) has been made available for a security flaw impacting the KeePass password manager that could be exploited to recover a victim's master password in cleartext under specific circumstances.\nThe issue, tracked as\u00a0CVE-2023-32784, impacts KeePass versions 2.x for Windows, Linux, and macOS, and is\u00a0expected to be patched\u00a0in version 2.54, which is likely to be released early", "creation_timestamp": "2023-05-22T10:27:44.000000Z"}, {"uuid": "06933f0a-c48b-445a-b9f8-4c7379dbc68b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1591", "content": "CVE-2023-32784 \nKeePass 2.X Master Password Dumper \n\u0411\u0443\u0444\u0435\u0440 \u043e\u0431\u043c\u0435\u043d\u0430 \u043f\u043e\u0434\u0432\u0435\u043b )) \nPOC", "creation_timestamp": "2023-06-26T18:43:59.000000Z"}, {"uuid": "b56eb377-b9c3-4974-8657-fa354f588d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/breachdetector/343674", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"KeePass CVE-2023-32784: What Is It ?\", \n  \"author\": \" ('BARBAROS)\",\n  \"Detection Date\": \"22 Sep 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-09-22T09:34:38.000000Z"}, {"uuid": "ef4d438c-642d-40da-b4e0-9a9d0b20d4cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/breachdetector/343224", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"KeePass CVE-2023-32784 Nedir ?\", \n  \"author\": \" ('BARBAROS)\",\n  \"Detection Date\": \"21 Sep 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-09-21T13:50:39.000000Z"}, {"uuid": "558c32e7-06ea-4a79-905e-a363a2117ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/breachdetector/330069", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"What is CVE-2023-32784 Vulnerability? (KeePass Software)\", \n  \"author\": \" ('BARBAROS)\",\n  \"Detection Date\": \"03 Sep 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-09-03T23:56:47.000000Z"}, {"uuid": "b6032752-688b-485b-8493-da98592b2d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/breachdetector/316962", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"CVE-2023-32784 A\u00e7\u0131\u011f\u0131 Nedir ? (KeePass Yaz\u0131l\u0131m\u0131)\", \n  \"author\": \" (SerasZen)\",\n  \"Detection Date\": \"14 Aug 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-08-14T13:36:05.000000Z"}, {"uuid": "e83d1947-5f47-475b-bf79-31f36e73a28d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "Telegram/Rt2uizIlLYnzhbFeqpQGh7TG8f2eXS1z6yrk9yl19CcqQiQ", "content": "", "creation_timestamp": "2023-07-29T16:01:33.000000Z"}, {"uuid": "9f573e29-d65a-4b73-a1b1-3f9d6f50180d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityIL/23472", "content": "\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d7\u05d3\u05e9\u05d4 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e3 (\u05e2\u05dd \u05d2\u05d9\u05e9\u05d4 \u05de\u05ea\u05d0\u05d9\u05de\u05d4) \u05dc\u05e9\u05d7\u05d6\u05e8 \u05d0\u05ea \u05e1\u05d9\u05e1\u05de\u05ea \u05d4\u05de\u05d0\u05e1\u05d8\u05e8 \u05e9\u05dc\u05db\u05dd \u05dc-KeePass.\n\u05d4\u05ea\u05d9\u05e7\u05d5\u05df \u05e9\u05e1\u05d5\u05d2\u05e8 \u05d0\u05ea \u05d4\u05e4\u05d9\u05e8\u05e6\u05d4 \u05d9\u05e4\u05d5\u05e8\u05e1\u05dd \u05e8\u05e7 \u05d1\u05d9\u05d5\u05dc\u05d9 \u05d0\u05d1\u05dc POC \u05db\u05d1\u05e8 \u05d1\u05d7\u05d5\u05e5 \ud83d\ude14\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2023-32784 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e3 \u05dc\u05e9\u05d7\u05d6\u05e8 \u05d0\u05ea \u05e1\u05d9\u05e1\u05de\u05ea \u05d4\u05de\u05d0\u05e1\u05d8\u05e8 \u05dc-KeePass \u05de\u05ea\u05d5\u05da \u05e7\u05d1\u05e6\u05d9 \u05d4\u05d6\u05d9\u05db\u05e8\u05d5\u05df \u05d1\u05de\u05d7\u05e9\u05d1 \u05d5\u05d1\u05db\u05da \u05dc\u05de\u05e2\u05e9\u05d4 \u05d7\u05d5\u05e9\u05e4\u05ea \u05d0\u05ea \u05db\u05dc \u05d4\u05e1\u05d9\u05e1\u05de\u05d0\u05d5\u05ea \u05e9\u05dc\u05db\u05dd \u05dc\u05e6\u05d3 \u05d2'.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d3\u05d5\u05d5\u05d7\u05d4 \u05dc-KeePass \u05e9\u05d0\u05d9\u05e9\u05e8\u05d5 \u05db\u05d9 \u05d0\u05db\u05df \u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d1\u05e2\u05d9\u05d4 \u05d0\u05da \u05d2\u05e8\u05e1\u05d4 2.54 \u05e9\u05ea\u05e1\u05d2\u05d5\u05e8 \u05d0\u05ea \u05d4\u05e4\u05d9\u05e8\u05e6\u05d4 \u05ea\u05d4\u05d9\u05d4 \u05d6\u05de\u05d9\u05e0\u05d4 \u05e8\u05e7 \u05d1\u05e2\u05d5\u05d3 \u05db\u05d7\u05d5\u05d3\u05e9\u05d9\u05d9\u05dd.\n\n\u05d1\u05d9\u05e0\u05ea\u05d9\u05d9\u05dd \u05db\u05d1\u05e8 \u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05db\u05dc\u05d9\u05dd \u05d4\u05de\u05d0\u05e4\u05e9\u05e8\u05d9\u05dd \u05dc\u05db\u05dc \u05d0\u05d7\u05d3 \u05dc\u05e0\u05e1\u05d5\u05ea \u05d0\u05ea \u05d6\u05d4 \u05d1\u05d1\u05d9\u05ea, \u05d5\u05dc\u05e9\u05d7\u05d6\u05e8 \u05d0\u05ea \u05e1\u05d9\u05e1\u05de\u05ea \u05d4\u05de\u05d0\u05e1\u05d8\u05e8 \u05e9\u05dc\u05d5 \u05d1\u05de\u05e7\u05e8\u05d4 \u05e9\u05e9\u05db\u05d7\u05ea\u05dd \u05d0\u05d5\u05ea\u05d4 \ud83d\ude09\n\n\u05ea\u05d5\u05d3\u05d4 \u05dc\u05d0\u05d5\u05e8 \u05d7\u05de\u05e8\u05d4 \u05e2\u05dc \u05d4\u05d3\u05d9\u05d5\u05d5\u05d7 \u05e9\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d1\u05e4\u05e8\u05d8\u05d9 \ud83d\ude4f\ud83c\udffb \n\n\u26a1\ufe0f\u05d0\u05d2\u05d1, \u05dc\u05de\u05d9 \u05e9\u05ea\u05d5\u05de\u05da \u05d1\u05e2\u05e8\u05d5\u05e5 \u05d5\u05e7\u05d9\u05d1\u05dc \u05d2\u05d9\u05e9\u05d4 \u05dc\u05e4\u05d9\u05d3 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea, \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05e4\u05d5\u05e8\u05e1\u05de\u05d4 \u05d1\u05e4\u05d9\u05d3 \u05d1-15.5 \u05d1\u05e9\u05e2\u05d4 13:13 \ud83d\udd54\n\nhttps://t.me/CyberSecurityIL/3109\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2023-05-17T14:24:42.000000Z"}, {"uuid": "670dcebb-4081-422d-8559-f6df7dd560fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/cibsecurity/64859", "content": "\u26a0 Serious Security: That KeePass \u201cmaster password crack\u201d, and what we can learn from it \u26a0\n\nHere, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)\n\n\ud83d\udcd6 Read\n\nvia \"Naked Security\".", "creation_timestamp": "2023-06-01T19:11:58.000000Z"}, {"uuid": "4b611653-b950-4f77-9841-cdd219d26fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/cibsecurity/64853", "content": "\u26a0 Serious Security: That KeePass \u201cmaster password crack\u201d, and what we can learn from it \u26a0\n\nHere, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)\n\n\ud83d\udcd6 Read\n\nvia \"Naked Security\".", "creation_timestamp": "2023-06-01T18:13:17.000000Z"}, {"uuid": "64538b2a-d556-42f2-ac44-b451d6029c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/cibsecurity/64827", "content": "\u26a0 Serious Security: That KeePass \u201cmaster password crack\u201d, and what we can learn from it \u26a0\n\nHere, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don't panic.)\n\n\ud83d\udcd6 Read\n\nvia \"Naked Security\".", "creation_timestamp": "2023-05-31T19:41:41.000000Z"}, {"uuid": "f0ee851f-ff59-42ed-87e2-85e03e68bc61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/cibsecurity/64080", "content": "\u203c CVE-2023-32784 \u203c\n\nIn KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-15T12:29:24.000000Z"}, {"uuid": "6d60b03b-aadd-41cc-8b08-d54e2963d4c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/poxek/2928", "content": "\u200b\u200b\ud83d\udd34KeePass 2.X Master Password Dumper \nCVE-2023-32784\n\n\u041a\u0440\u0430\u0442\u043a\u043e:\nCVE-2023-32784 - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 KeePass. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0438\u0437\u0432\u043b\u0435\u0447\u044c \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u0434\u0430\u0436\u0435 \u043a\u043e\u0433\u0434\u0430 \u0440\u0430\u0431\u043e\u0447\u0435\u0435 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u043e \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u0438\u043b\u0438 \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442. \u042d\u0442\u043e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0442\u0430\u043a \u043a\u0430\u043a \u043e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u043f\u0430\u0440\u043e\u043b\u044f\u043c, \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 KeePass. \n\n\u0420\u0430\u0437\u0431\u043e\u0440:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 KeePass. \u041a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0432\u0432\u043e\u0434\u0438\u0442 \u0441\u0432\u043e\u0439 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c, KeePass \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0435\u0433\u043e \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435. \u042d\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u0430\u0440\u043e\u043b\u044c \u043d\u0435 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d \u0438 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043b\u0435\u0433\u043a\u043e \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u043d \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u0435\u0441\u043b\u0438 \u0443 \u043d\u0435\u0433\u043e \u0435\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 KeePass. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u043c\u0435\u0435\u0442 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443 \u0436\u0435\u0440\u0442\u0432\u044b. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0432\u044b\u0433\u0440\u0443\u0437\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 KeePass, \u0430 \u0437\u0430\u0442\u0435\u043c \u0438\u0441\u043a\u0430\u0442\u044c \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c \u0432 \u0432\u044b\u0433\u0440\u0443\u0437\u043a\u0435. \u041a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043f\u043e\u043b\u0443\u0447\u0438\u0442 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c, \u043e\u043d \u0441\u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a\u043e \u0432\u0441\u0435\u043c \u043f\u0430\u0440\u043e\u043b\u044f\u043c, \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 KeePass. \n\n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435:\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 KeePass 2.54. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u0431\u043e\u043b\u0435\u0435 \u0441\u0442\u0430\u0440\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e KeePass, \u0434\u043e\u043b\u0436\u043d\u044b \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e 2.54, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0435\u0431\u044f \u043e\u0442 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \n\n#CVE #critical", "creation_timestamp": "2023-05-26T15:15:51.000000Z"}, {"uuid": "fe67cb0b-787f-43a2-ac27-d0c2954676df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/it_secur/332", "content": "\ud83d\udd11  KeePass 2.X Master Password Dumper (CVE-2023-32784).\n\nhttps://github.com/vdohney/keepass-password-dumper\n\n#KeePass", "creation_timestamp": "2023-05-17T18:40:53.000000Z"}, {"uuid": "f9584e5a-f1db-42b8-adcf-81d4dd9e78af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/arpsyndicate/1914", "content": "#ExploitObserverAlert\n\nCVE-2023-32784\n\nDESCRIPTION: Exploit Observer has 45 entries related to CVE-2023-32784. In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.\n\nFIRST-EPSS: 0.001040000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T04:43:19.000000Z"}, {"uuid": "2edf0329-cecc-43b4-8843-b89ffb9df54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "Telegram/AGyiEYw7sDVx4wJw4uTF_tUcqXvEb6Z2Eg-Yw6ks_aPJAA", "content": "", "creation_timestamp": "2023-05-22T09:36:36.000000Z"}, {"uuid": "eb5a8000-67af-4935-a843-064d5a956726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3010", "content": "Tools - Hackers Factory \n\n\nCVE-2023-32784\n\nKeePass 2.X Master Password Dumper.\n\nhttps://github.com/vdohney/keepass-password-dumper\n\n#cve #infosec #redteam\n\nPPLFaultDumpBOF\n\nTakes the original PPLFault and the original included DumpShellcode and combinds it all into a BOF targeting #CobaltStrike.\n\nhttps://github.com/trustedsec/PPLFaultDumpBOF\n\n#infosec #pentesting #redteam\n\nMonitoring the internet for new .zip domains\n\ngithub.com/trickest/zip\n\nUpdated raccoon_config to enable storing extracted #Raccoon #Infostealer as JSON. Raccoon C2 still does not seem to care about the User-Agent despite changing it regularly. \n\nhttps://github.com/NexusFuzzy/raccoon_config\n\n\nKeePass Master Password Dumper is a simple proof-of-concept tool used to dump the master password from KeePass's memory. Apart from the first password character, it is mostly able to recover the password in plaintext. RCE not required.\n\nhttps://github.com/vdohney/keepass-password-dumper\n\nExtract all URL endpoints from an application and dump them to the command-line with hakrawler!\n\nURL extraction methods:\n\ud83d\udd77 Spidering the application\n\ud83d\udce0 Querying wayback machine\n\ud83e\udd16 Parsing robots.txt files\n\ud83d\uddfa Parsing sitemap.xml files\n\nInstall now https://github.com/hakluke/hakrawler\n\n\ud83d\udce3 I just got sent the most comprehensive list of Purple Team resources I've ever seen!\n\nI'd be insufferable if I was them - \"That's DOCTOR threat hunter to you\"\n\nhttps://github.com/ch33r10/EnterprisePurpleTeaming\n\nTool to bypass 40x response codes \n\nhttps://github.com/devploit/dontgo403\n\n#infosec #cybersecurity #cybersec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-06-02T14:24:36.000000Z"}, {"uuid": "40049d92-cb63-46ce-86c4-ee96a4e90f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/3383", "content": "\ud83d\udea8 Attention KeePass users! A newly discovered security flaw (CVE-2023-32784) could expose your master password in cleartext! \n \nRead details here: https://thehackernews.com/2023/05/keepass-exploit-allows-attackers-to.html \n \nUpgrade to KeePass 2.54 once it's released.", "creation_timestamp": "2023-05-22T08:35:44.000000Z"}, {"uuid": "64e95c73-3c3e-4616-91f2-eeb6769e8704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "seen", "source": "https://t.me/xakep_ru/14162", "content": "\u0412 KeePass \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0443\u044e \u0443\u0437\u043d\u0430\u0442\u044c \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c\n\n\u041c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.54, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-32784, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0438\u0437\u0432\u043b\u0435\u0447\u044c \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044c \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 \u043f\u0440\u043e\u0441\u0442\u043e\u0433\u043e \u0442\u0435\u043a\u0441\u0442\u0430.\n\nhttps://xakep.ru/2023/06/06/v-keepass-ispravili-uyazvimost-pozvolyavshuyu-uznat-master-parol/", "creation_timestamp": "2023-06-06T17:10:24.000000Z"}, {"uuid": "72bcad38-a5be-4062-9aa4-4b65e095e443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8341", "content": "#tools\n#Offensive_security\n1. KeeFarce Reborn - standalone DLL that exports databases in cleartext once injected in the KeePass process\nhttps://github.com/d3lb3/KeeFarceReborn#make-keepass-inject-keefarce-reborn-as-a-plugin\n]-&gt; Extract Passphrase from Memory (CVE-2023-32784):\nhttps://ppn.snovvcrash.rocks/pentest/infrastructure/ad/credential-harvesting/keepass#abusing-the-keepass-plugin-cache\n2. SSH-Harvester - Harvest passwords automatically from OpenSSH server\nhttps://github.com/jm33-m0/SSH-Harvester", "creation_timestamp": "2023-05-22T10:59:01.000000Z"}]}