Meta 内部使用的辅助编程工具 Metamate 同时使用了 OpenAI 的 GPT-4 以及自己开发的 Llama AI。Llama 和 GPT-4 是竞争对手关系,Meta CEO 扎克伯格(Mark Zuckerberg)曾公开宣称 Llama 是领先的 AI 模型。此外扎克伯格的慈善机构 Chan Zuckerberg Initiative 正使用 OpenAI 的技术开发一款教育 AI 工具,而 OpenAI CEO Sam Altman 加入了其 AI 顾问委员会。
A vulnerability was found in Image Access Scan2Net. It has been rated as problematic. This issue affects some unknown processing of the component Login Page. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-36494. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Image Access Scan2Net. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to sql injection.
This vulnerability was named CVE-2024-50584. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Image Access Scan2Net. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-36498. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Image Access Scan2Net and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2024-47946. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Image Access Scan2Net and classified as critical. Affected by this vulnerability is an unknown functionality of the component Firmware Update Handler. The manipulation leads to hard-coded credentials.
This vulnerability is known as CVE-2024-28146. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Image Access Scan2Net. Affected is an unknown function of the file dbconnector.php of the component GET Parameter Handler. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2024-28145. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Image Access Scan2Net. This issue affects some unknown processing of the component Reboot/Shutdown. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2024-28144. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as problematic was found in Image Access Scan2Net. This vulnerability affects unknown code of the component Password Change Handler. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-28143. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Image Access Scan2Net. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-47947. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Image Access Scan2Net. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-28142. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Image Access Scan2Net. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Application. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2024-28141. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Image Access Scan2Net. It has been classified as critical. Affected is an unknown function of the component Kiosk Mode. The manipulation leads to permission issues.
This vulnerability is traded as CVE-2024-28140. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Image Access Scan2Net and classified as critical. This issue affects some unknown processing of the component mount Command Handler. The manipulation leads to insecure inherited permissions.
The identification of this vulnerability is CVE-2024-28139. The attack needs to be done within the local network. There is no exploit available.