目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-32784 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
KeePass 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
KeePass是一款开源的密码管理器。 KeePass 2.54之前的2.x版本存在安全漏洞,该漏洞源于即使工作区被锁定或不再运行,也可以从内存转储中恢复明文主密码。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
-n/a n/a -
二、漏洞 CVE-2023-32784 的公开POC
#POC 描述源链接神龙链接
1Original PoC for CVE-2023-32784https://github.com/vdohney/keepass-password-dumperPOC详情
2KeePass Master Password Extraction PoC for Linuxhttps://github.com/CTM1/CVE-2023-32784-keepass-linuxPOC详情
3This script complements the results obtained through the keepass-password-dumper tool when exploiting the CVE-2023-32784 vulnerability affecting KeePass.https://github.com/und3sc0n0c1d0/BruteForce-to-KeePassPOC详情
4KeePass 2.X dumper (CVE-2023-32784)https://github.com/z-jxy/keepass_dumpPOC详情
5A CVE-2023-32784 proof-of-concept implementation in Rusthttps://github.com/LeDocteurDesBits/cve-2023-32784POC详情
6Re-write of original KeePass 2.X Master Password Dumper (CVE-2023-32784) POC in python.https://github.com/hau-zy/KeePass-dump-pyPOC详情
7Retrieve the master password of a keepass database <= 2.53.1https://github.com/dawnl3ss/CVE-2023-32784POC详情
8Nonehttps://github.com/ValentinPundikov/poc-CVE-2023-32784POC详情
9Nonehttps://github.com/mister-turtle/cve-2023-32784POC详情
10year 2 semester 1 Systems and Network Programming Assignmenthttps://github.com/Cmadhushanka/CVE-2023-32784-ExploitationPOC详情
11Nonehttps://github.com/le01s/poc-CVE-2023-32784POC详情
12A Python console program that exploits the security vulnerability CVE-2023-32784 in the password manager KeePass. This exploit reconstructs the master password in plain text based on memory dumps (.DMP).https://github.com/SarahZimmermann-Schmutzler/exploit_keepassPOC详情
13Nonehttps://github.com/dev0558/CVE-2023-32784-EXPLOIT-REPORTPOC详情
14After using the KeePass password dumper maybe some character parsed as ● is incorrect and you want to know the real characterhttps://github.com/G4sp4rCS/CVE-2023-32784-password-combinator-fixerPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-32784 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-32784

暂无评论


发表评论