Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-46306

The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105.

CVE
#web#php#pdf#auth

%PDF-1.5 %���� 10 0 obj << /Length 1418 /Filter /FlateDecode >> stream xڭXYs�6~���[ɩ��&�&v���xRY�>�y`$�bJ�*IEu}e�:j�� �����.��A7gė� �H��)C����&����0���vD�j��y���������7�u]Q’3� }7��,F K��� �Tb�bs�)�x�>�U�U�i됒 kF,NJ�/�_���ㄺ��#N(u���*2(��S��X?�n����TfEVN�P@�`)R¡T�b ������3���ܼ����O�n�tUh�O����a�|-T�$MZ�m��x�f�^����.Kx�qH t��Qxи/�D� ��#��RK�C ���lAt���7=h�%�J���,��xK$D��(J�%sv�t���En������p5L�3��qρ� F�%�ࡦYR�W�b� Tk4�v�� ��Ȕ[絓%���k˧:t�oz�z+���0z���&S�0,�ى�Z7l�#��ERa1hG�� ��M�G�)�� ��c�=:�yބgq0�&��.[��^ֺ�O���u���4����4;߮]�n?:����j��ڍ��f��8cV�� �8�Dʃ_Z��ŋ�օ��*��R$׮q�*’m^�Y���Hpn��J)��rk�Tu���ơo"�V�*+cӺt�yӬ�S�\�Z�L�,��|�IM^��I ~0����+�’�ԙ��1�BPH�~ln2k�M֧��3�~�f�; �Vs� �nME�4>qދ��tS�#k���������I�Uٺ�(.6�͗8���a�P���/���r���3�?Rj������ ��9���C����L,�D�P�ɩ�2�9?$��ez]x4� ��X�,0�o^�G�p�.[�`��Q�؀>���Ar����J�p��;�����G����r’A2$I��\�ޏ�K��ļ��� A4��l7����ئ��P�z% $��4� �� �ڬ]5�x��]D _�I��h�;��&�� �H�l�(�S�9/k����@�c1��� ���Srҕ��7�Qu0�N�vCy_�9b�g�h�;P�_�: ���7�K0�vgA����9�c���ʯ�r]������j9�O�ц�d����tp��OC�R��6bW�?���l(�p t�Ω�L掠�٪Yde������A�PB�&C�. 7>��˥;L����oW�ߘaN���b���$K ��dy���=�,�ֺu�`���u� ��$�IS0Hx�����O5\�����[�~~Na`����w���-r�|�h ]���x+��22$;�H�’�n��4W5аe� V�ϟL�’�h�nC�������B���μQ 8 ����k���ۦ���k���)�!ය4���~���tp��i�A���ɛB�v� ~\]��yk4�] $���տ endstream endobj 6 0 obj << /Type /XObject /Subtype /Form /BBox [0 0 784.998 145] /FormType 1 /Matrix [1 0 0 1 0 0] /Resources 16 0 R /Length 33 /Filter /FlateDecode >> stream x�+�2�0U0BC��˥�k�����cAb endstream endobj 4 0 obj << /Type /XObject /Subtype /Image /Width 785 /Height 145 /BitsPerComponent 8 /ColorSpace /DeviceRGB /SMask 17 0 R /Length 2178 /Filter /FlateDecode >> stream x���Ar�0EA^+>���3f��S�E�gЪ�� �)L�DI>$������K�tZ棄L�$d��I��L2I��IB&I2I�$IB& �$I�$!�$ �$dB&I2I�$IB& �$I�$!�$ �$d�$!��L�$d��I��L2I��IB&d�$!��L�$d��I��L2I��IB&I2I�$IB& �$I�$!�}C��I2I��IB&I2I�$IB& �$I�$!�$ �$d�$!��L�$d�� �$ �$!�$ �$d�$!��L�$d��I��L2I��IB&I2IȤ9�В�IB&}���N��L��麢sgIW�݂��Lj��x2?V=1�C���IyQ6?��HMȄL�����oƾ=z$!2!S�R� ��"Sǭu�n?{x!2!S2mP2!�2%�i������PȄLȄLȄL{6�F�*Zt^ȄLȔM��)�LȄL]>}6{3?�� ��i�PF&dB��=6g����XȄLȴh(#2!S�f��vu&D&dB��q�L�4�L�u� c��� �� ���;����? /dB&d� ��� � 6�C�t��"2!S$��MdB��d��?��kc�7|�!2!�Cy$���Y�생F�뚼�������DdB&?ˋLȄL��t]3W��՞ë� � ���HMȄL�T�*}�o6?�"E&dB���A&dB����e㍆W�E&dB�"5!2�’S��C����Q�HF&dB&dB&djM��7kj�4����LȄL�d�?|� �N!S�]�%�f��J;��D&dB�T2ݜ�ȄL�T��,Ƀ��N>2!2m��DdB&dzd[{�1�%�4Q 2!2�$ 2!S���&|�珞������C�� �� ����f��8���2�\bdB&d*R2!�2-�o<[���]~� �� ��i�`}ZMȄLȴl���2�\edB&d��`}TMȄLsȴjd��$�t�I@&dB����LȄL���������]ޕC&dB&d���)�L9��#So2���L�FL��P{��4�s��6�L�edB��d�p32Ŋ�� ��’�CjB&dB�e/� 2!2!S�`]ndB��d*�"JdB&dB&dJ�ȄLȴ�0K61dB&dB&djK��32!�d2}~!2!2!ӱdZ�&dB��dZ���7XdB&dB���� ȄLȴl�B&dB&dB����LȄL�1s�ؽ1�LȄL�ԟL��B&d�=y7l\ȄLȄLȔ:X����2���P�� ����/��T2!2�w�LȄLȄL��$r��gy�)�nꐙ>x� 2����dZ�&dB�s���K��t�B��� ��ЄL�t�^|��Kطۉ��"2!������� �N$�+ON ȄLȄLC����� ����,��Bӣ�L8�p�ܐ �b�sw�#2M۬�djG���y�� �� ��i��m�fz)� �?@dB������� �fnV��T�{#2!25�ȄL�����M��jz�p�&���i�`E&dB����I5�|��p��طy� �A2�A��jB&d�Yu"���2�;O{��E&dB&dB&d|�z���� ���d

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907