CVE-2023-49343
14.12.2023, 22:15
Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
Vendor | Product | Version |
---|---|---|
ubuntubudgie | budgie_extras | 1.4.0 ≤ 𝑥 < 1.7.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-337 - Predictable Seed in Pseudo-Random Number Generator (PRNG)A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.
- CWE-335 - Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)The software uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.
References