The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.Referenceshttps://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040https://danzinger.wien/exploiting-keepassrpc/