KeePass brengt oplossing uit voor wachtwoordlekkende beveiligingsbug

Over the weekend, the password management tool KeePass was updated to address a high-severity vulnerability which allowed threat actors to exfiltrate the master password in cleartext. 

Users with KeePass versions 2.x are advised to bring their instances to version 2.54 to eliminate the threat. Those using KeePass 1.x, Strongbox, or KeePass XC, are not vulnerable to the flaw and thus don’t need to migrate to the new version, if they don’t want to.