4 results (0.014 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Bitwarden Desktop 2023.7.0 and below allows an attacker with local access to obtain sensitive information via the Bitwarden.exe process. Bitwarden Desktop 2023.7.0 e inferiores permiten a un atacante con acceso local obtener información sensible a través del proceso Bitwarden.exe. • https://github.com/bitwarden/clients/pull/5813 https://github.com/bitwarden/desktop/issues/476 https://github.com/markuta/bw-dump https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

Bitwarden Windows desktop application versions prior to v2023.4.0 store biometric keys in Windows Credential Manager, accessible to other local unprivileged processes. • https://github.com/bitwarden/clients https://github.com/bitwarden/clients/blob/8b5a223ad4ca0f89b6c9bcdbddef464d1755d2c0/apps/desktop/desktop_native/src/biometric/windows.rs#L19 https://github.com/bitwarden/clients/blob/8b5a223ad4ca0f89b6c9bcdbddef464d1755d2c0/apps/desktop/desktop_native/src/password/windows.rs#L16 https://hackerone.com/reports/1874155 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Bitwarden through 2023.2.1 offers password auto-fill when the second-level domain matches, e.g., a password stored for an example.com hosting provider when customer-website.example.com is visited. NOTE: the vendor's position is that "Auto-fill on page load" is not enabled by default. • https://flashpoint.io/blog/bitwarden-password-pilfering https://github.com/bitwarden/clients/releases https://news.ycombinator.com/item?id=35075861 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Bitwarden through 2023.2.1 offers password auto-fill within a cross-domain IFRAME element. NOTE: the vendor's position is that there have been important legitimate cross-domain configurations (e.g., an apple.com IFRAME element on the icloud.com website) and that "Auto-fill on page load" is not enabled by default. • https://cdn.bitwarden.net/misc/Bitwarden%20Security%20Assessment%20Report.pdf https://flashpoint.io/blog/bitwarden-password-pilfering https://github.com/bitwarden/clients/releases https://news.ycombinator.com/item?id=35075861 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •