Skip to content

Use of Cryptographically Weak Pseudo-Random Number...

Critical severity Unreviewed Published May 25, 2023 to the GitHub Advisory Database • Updated Apr 4, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.

References

Published by the National Vulnerability Database May 25, 2023
Published to the GitHub Advisory Database May 25, 2023
Last updated Apr 4, 2024

Severity

Critical

EPSS score

0.137%
(50th percentile)

Weaknesses

CVE ID

CVE-2023-2884

GHSA ID

GHSA-9hvx-xh5r-79rw

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.