![]() ![]() Bleeping Computer reports that the creator of the proof-of-concept exploit tool cannot reproduce the issue with the fixes in place. An unstable test version of KeePass with the security mitigations is available now. Dominick Reichl, the developer of KeePass, gave this estimate in a sourceforge forum along with the caveat that the timeframe is not guaranteed. Meanwhile, KeePass 1.x (an older edition of the program that’s still being maintained), KeePassXC, and Strongbox, which are other password managers compatible with KeePass database files, are not affected according to vdohney.Ī fix for this vulnerability will come in KeePass version 2.54, which is likely to launch in early June. They are both still maintained, though 2.x is the newer edition with more available features.Īll existing versions of KeePass 2.x (e.g., 2.53.1) are affected. ![]() KeePass comes in two editions, 2.x and 1.x. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |