V2rayl Project : Security Vulnerabilities CVSS score >= 1
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
Max Base Score | 7.8 |
Published | 2020-03-15 |
Updated | 2020-03-17 |
EPSS | 0.04% |
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
Max Base Score | 7.8 |
Published | 2020-03-15 |
Updated | 2020-03-17 |
EPSS | 0.04% |
2 vulnerabilities found