Headline
CVE-2023-3722
An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.
%PDF-1.4 %���� 10 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 648.53 281.48 657.79]>> endobj 11 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 639.26 119.74 648.53]>> endobj 12 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 630 116.21 639.26]>> endobj 13 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 620.74 181.69 630]>> endobj 14 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 611.47 197.25 620.74]>> endobj 15 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 602.21 184.16 611.48]>> endobj 16 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 592.95 197.93 602.21]>> endobj 17 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 583.69 189.52 592.95]>> endobj 18 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 574.42 178.61 583.69]>> endobj 19 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 565.16 206.14 574.42]>> endobj 20 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 555.9 253.2 565.16]>> endobj 21 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 546.64 349.54 555.9]>> endobj 22 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 537.38 237.64 546.64]>> endobj 23 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 528.11 280.5 537.38]>> endobj 24 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 518.85 299.59 528.11]>> endobj 25 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 509.59 221.93 518.85]>> endobj 26 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 500.32 236.1 509.59]>> endobj 27 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[138 491.06 311.59 500.33]>> endobj 28 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 481.8 119.06 491.06]>> endobj 29 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 472.54 125.06 481.8]>> endobj 30 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 463.27 190.76 472.54]>> endobj 31 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 454.01 139.54 463.27]>> endobj 32 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 444.75 200.36 454.01]>> endobj 33 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[108 435.49 189.26 444.75]>> endobj 34 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[78 426.23 113.51 435.49]>> endobj 35 0 obj <>/A<>/Subtype/Link/C[0 0 1]/Border[0 0 0]/Rect[272.66 216.75 474.68 226.01]>> endobj 36 0 obj <>stream x��Zےܶ}���[�T�"A��&K���r��*NU����k.�X������+.��f%���ڇ����ݍ�_g_]�j��\-g__�~��:�����y=���0�ˬ�͓ٿ�S����;g63�9�ZӕU��0�]����ٖ�OM]W!�<\���n�����}*]W�k�`���/?Q�%��d�ss��ɈB�f2O;4g���՟nP�j3���P�g��&�1�f�w]כ����Z�f���s�4-1��U"B:�@T`�L�εe�|�F�4OW B���Miɔj�I�m2��9�#ΨF3�R"jP�@����䕾��9.���9��t��2��6�=��ۡP����/���Q� dʉ�L^-P3����9��t�������6�L�����