{"vulnerability": "CVE-2024-47191", "sightings": [{"uuid": "b1fff431-14d9-467c-aafa-09530988fa58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47191", "type": "seen", "source": "https://lwn.net/Articles/992948/", "content": "", "creation_timestamp": "2024-10-04T15:28:07.000000Z"}, {"uuid": "b5e5d8fe-c741-4e1e-a274-ca31a2a435c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47191", "type": "seen", "source": "https://t.me/cvedetector/7428", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47191 - Apache pam_oath.so Root Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-47191 \nPublished : Oct. 9, 2024, 5:15 a.m. | 42\u00a0minutes ago \nDescription : pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T08:07:12.000000Z"}, {"uuid": "1ec46a99-7dab-49d0-82c2-835798a07f25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47191", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/15380", "content": "\u200aCVE-2024-47191: Critical Flaw in OATH-Toolkit PAM Module Could Lead to Root Exploits\n\nhttps://securityonline.info/cve-2024-47191-critical-flaw-in-oath-toolkit-pam-module-could-lead-to-root-exploits/", "creation_timestamp": "2024-10-08T03:27:20.000000Z"}]}