A vulnerability was found in Mozilla Convict up to 6.2.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Object Prototype Handler. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution').
This vulnerability is handled as CVE-2023-0163. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Advantech EKI-6333AC-2G, EKI-6333AC-2GD and EKI-6333AC-1GPO. It has been classified as very critical. Affected is the function restore_config_from_utility. The manipulation leads to os command injection.
This vulnerability is traded as CVE-2024-50373. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Advantech EKI-6333AC-2G, EKI-6333AC-2GD and EKI-6333AC-1GPO and classified as very critical. This issue affects the function backup_config_to_utility. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2024-50372. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Advantech EKI-6333AC-2G, EKI-6333AC-2GD and EKI-6333AC-1GPO. This affects the function cfg_cmd_set_eth_conf of the component edgserver Service. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-50370. It is possible to initiate the attack remotely. There is no exploit available.
What Is Network Slicing? Network slicing is a virtual networking technique that creates multiple logical networks on the same physical network infrastructure, providing flexibility in the allocation and use of network resources. Network slicing involves creating slices in a network according to the various needs of...