{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T03:37:58.987","vulnerabilities":[{"cve":{"id":"CVE-2023-49582","sourceIdentifier":"security@apache.org","published":"2024-08-26T14:15:07.050","lastModified":"2025-03-13T15:15:39.267","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. \n\nThis issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h)\n\nUsers are recommended to upgrade to APR version 1.7.5, which fixes this issue."},{"lang":"es","value":"Los permisos laxos establecidos por la librería Apache Portable Runtime en plataformas Unix permitirían a los usuarios locales acceso de lectura a segmentos de memoria compartida con nombre, lo que podría revelar datos confidenciales de la aplicación. Este problema no afecta a plataformas que no son Unix ni a compilaciones con APR_USE_SHMEM_SHMGET=1 (apr.h). Se recomienda a los usuarios actualizar a la versión 1.7.5 de APR, que soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*","versionStartIncluding":"0.9.0","versionEndExcluding":"1.7.5","matchCriteriaId":"CD6DB048-3EE7-4014-80B7-B6935B2B5661"}]}]}],"references":[{"url":"https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4","source":"security@apache.org","tags":["Mailing List"]},{"url":"http://www.openwall.com/lists/oss-security/2024/08/26/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20241101-0004/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}