A vulnerability, which was classified as critical, was found in Comfast CF-AC100 2.6.0.8. This affects the function sub_44AC14 of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component Request Path Handler. The manipulation results in command injection.
This vulnerability is cataloged as CVE-2026-3798. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in budibase up to 3.23.22 and classified as critical. The affected element is an unknown function of the file packages/server/src/integrations/postgres.ts. Such manipulation of the argument Password leads to os command injection.
This vulnerability is referenced as CVE-2026-25041. It is possible to launch the attack remotely. No exploit is available.
A patch should be applied to remediate this issue.
A vulnerability was found in budibase up to 3.32.3. It has been declared as very critical. This vulnerability affects unknown code of the file /api/global/users. Such manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2026-25045. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as critical was found in budibase up to 3.24.0. Impacted is an unknown function. The manipulation results in client-side enforcement of server-side security.
This vulnerability is known as CVE-2026-25737. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Microsoft Windows up to Server 2019. It has been classified as critical. The impacted element is an unknown function of the component Kerberos. This manipulation causes race condition.
This vulnerability is registered as CVE-2026-24297. Remote exploitation of the attack is possible. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability identified as problematic has been detected in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Graphics. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2026-25168. An attack has to be approached locally. There is no exploit available.
It is suggested to install a patch to address this issue.
A vulnerability labeled as problematic has been found in Microsoft Windows. Affected by this issue is some unknown functionality of the component Graphics. The manipulation results in divide by zero.
This vulnerability is known as CVE-2026-25169. Attacking locally is a requirement. No exploit is available.
A patch should be applied to remediate this issue.
Rising Liability Risks Are Reshaping the CISO Role and Cybersecurity Leadership As regulators pursue accountability after major breaches, CISOs face growing personal liability. This is changing how security leaders report risk, weakening security culture and making the role less attractive to experienced practitioners.
Real and intense financial pressures on rural and small healthcare clinics mandate making difficult decisions on allocating funds to cybersecurity, said Greg Sieg, CISO at the University of Michigan Regional Health Network. "The funding is just not there."
Attorneys can conduct security risks assessments under the color of client privilege, making it less likely to surface in discovery during litigation. But healthcare firms should consider the cons before they take that route, said attorney Adam Greene, partner at the law firm Davis Wright Tremaine.
An identity-based microsegmentation deployment at Main Line Health in Philadelphia is helping to control how its roughly 60,000 devices communicate across the network in order to protect clinical operations and limit the impact of potential cyberattacks, said Main Line Health CISO Aaron Weismann.
Cybersecurity Requirements Could Clash With Right-to-Repair Automakers are generally on track to implement new EU cybersecurity requirements in tailpipe emissions regulations instigated by the long shadow of Volkswagen's emissions scandal, but there could be a clash between those new rules and others that are intended to guarantee the right-to-repair.
Bold Plan Raises Hard Questions About Execution, Liability and Oversight The Trump administration's national cyber strategy calls for a stronger partnership between the federal government and private companies, heralding a shift in the ways private enterprise could participate in offensive operations against nation-state adversaries, ransomware gangs and cybercriminals.