Description
please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2716 | please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.) |
Github GHSA |
GHSA-cgf8-h3fp-h956 | Pleaser privilege escalation vulnerability |
References
History
Thu, 26 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:edneville:please:0.5.4:*:*:*:*:rust:*:* | |
| Metrics |
ssvc
|
Thu, 12 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-12T14:43:57.551Z
Reserved: 2023-10-20T00:00:00.000Z
Link: CVE-2023-46277
Updated: 2024-08-02T20:37:40.184Z
Status : Modified
Published: 2023-10-20T05:15:08.487
Modified: 2024-11-21T08:28:12.653
Link: CVE-2023-46277
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA