V2rayl Project : Security Vulnerabilities CVSS score >= 1

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
Max Base Score
7.8
Published 2020-03-15
Updated 2020-03-17
EPSS 0.04%
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
Max Base Score
7.8
Published 2020-03-15
Updated 2020-03-17
EPSS 0.04%
2 vulnerabilities found
This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!