A vulnerability categorized as critical has been discovered in Azure Access BLU-IC2 and BLU-IC4 up to 1.19.5. Affected by this vulnerability is an unknown functionality of the component Busybox. Executing manipulation can lead to configuration.
This vulnerability is registered as CVE-2025-12221. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Azure Access BLU-IC2 and BLU-IC4 up to 1.19.5. It has been rated as very critical. Affected is an unknown function of the component App Handler. Performing manipulation results in insufficient or incomplete data removal within hardware component.
This vulnerability is cataloged as CVE-2025-12216. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Azure Access BLU-IC2 and BLU-IC4 up to 1.19.5. It has been declared as critical. This impacts an unknown function of the component SNMP. Such manipulation leads to use of default credentials.
This vulnerability is listed as CVE-2025-12217. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Azure Access BLU-IC2 and BLU-IC4 up to 1.19.5. It has been classified as very critical. This affects an unknown function of the component Busybox. This manipulation causes dependency on vulnerable third-party component.
This vulnerability is tracked as CVE-2025-12220. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Azure Access BLU-IC2 and BLU-IC4 up to 1.19.5 and classified as very critical. The impacted element is an unknown function. The manipulation results in dependency on vulnerable third-party component.
This vulnerability is identified as CVE-2025-12219. The attack can be executed remotely. There is not any exploit available.
A vulnerability has been found in Azure Access BLU-IC2 and BLU-IC4 up to 1.19.5 and classified as very critical. The affected element is an unknown function. The manipulation leads to use of default credentials.
This vulnerability is referenced as CVE-2025-12218. Remote exploitation of the attack is possible. No exploit is available.
A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. [...]
A vulnerability was found in Linux Kernel up to 5.18.3. It has been classified as critical. This affects an unknown part of the component ip_gre. The manipulation leads to buffer overflow.
This vulnerability is listed as CVE-2022-49340. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 5.18.1. This issue affects the function __nft_release_hooks of the file net/netfilter/core.c. Such manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2022-49558. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 4.19.238/5.4.189/5.10.111/5.15.34/5.17.3. Affected by this vulnerability is the function ip6_forward. This manipulation causes denial of service.
The identification of this vulnerability is CVE-2022-49048. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 5.15.32/5.16.18/5.17.1. This impacts the function tcp_bpf_sendmsg of the file net/core/stream.c. Performing manipulation results in memory leak.
This vulnerability is reported as CVE-2022-49207. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Gallagher Command Centre Server and classified as problematic. Impacted is an unknown function. Executing manipulation can lead to client-side enforcement of server-side security.
This vulnerability is registered as CVE-2025-41402. The attack needs to be launched locally. No exploit is available.
It is suggested to upgrade the affected component.