
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2023-46277) affects the 'please' (also known as pleaser) Rust package through version 0.5.4. The vulnerability was published on October 20, 2023, and allows for privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl interfaces (Ubuntu CVE).
The vulnerability has been assigned a CVSS 3.1 base score of 7.8 (High). The attack vector is Local, with low attack complexity and low privileges required. The vulnerability requires no user interaction and has an unchanged scope. The vulnerability impacts confidentiality, integrity, and availability, all rated as High. The complete CVSS vector string is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Ubuntu CVE).
The vulnerability allows for local privilege escalation, which could lead to unauthorized elevation of privileges on affected systems. The impact ratings indicate high potential for compromise of system confidentiality, integrity, and availability (Ubuntu CVE).
The vulnerability affects multiple Ubuntu releases including 25.04 (plucky), 24.04 LTS (noble), and 22.04 LTS (jammy), which are currently marked as 'Needs evaluation'. Several older releases have been marked as 'Ignored end of life' or 'Not in release' (Ubuntu CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."