{"vulnerability": "CVE-2023-49582", "sightings": [{"uuid": "10853fba-d0b4-479f-b155-3dce35832b11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49582", "type": "seen", "source": "https://t.me/cvedetector/4146", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-49582 - Apache Portable Runtime (APR) Unix Privilege Escalation and Information Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-49582 \nPublished : Aug. 26, 2024, 2:15 p.m. | 35\u00a0minutes ago \nDescription : Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data.   \n  \nThis issue does not affect non-Unix platforms, or builds with\u00a0APR_USE_SHMEM_SHMGET=1 (apr.h)  \n  \nUsers are recommended to upgrade to APR version 1.7.5, which fixes this issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T17:04:16.000000Z"}]}