A deeper look at the first three pillars and outlining how our capabilities directly support government agencies working to bring this strategy to life.
A vulnerability marked as problematic has been reported in angular ssr. Affected is an unknown function of the component Relative URL Handler. Performing a manipulation results in injection.
This vulnerability is cataloged as CVE-2026-33397. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in Nsauditor Local SEH Buffer Overflow 3.0.28.0. The affected element is an unknown function. This manipulation of the argument DNS Query causes out-of-bounds write.
This vulnerability appears as CVE-2018-25213. The attack requires local access. In addition, an exploit is available.
A vulnerability classified as critical was found in riverpast River Past CamDo 3.7.6. This impacts an unknown function in the library Lame_enc.dll. Executing a manipulation of the argument Name can lead to out-of-bounds write.
This vulnerability is handled as CVE-2019-25650. It is possible to launch the attack on the local host. Additionally, an exploit exists.
A vulnerability was found in Ivideogo MyVideoConverter Pro 3.14 and classified as critical. This affects an unknown part. Such manipulation leads to out-of-bounds write.
This vulnerability is referenced as CVE-2019-25648. The attack can only be performed from a local environment. Furthermore, an exploit is available.
A vulnerability labeled as critical has been found in Firecrawl up to 2.8.0. This impacts an unknown function of the component Playwright Scraping Service. Executing a manipulation can lead to server-side request forgery.
This vulnerability is tracked as CVE-2026-32857. The attack can be launched remotely. No exploit exists.
A vulnerability was found in zenc-lang zenc up to 0.4.3. It has been declared as critical. This affects an unknown function of the component Zen C Source File Handler. Such manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2026-33491. Local access is required to approach this attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Red Hat OpenShift AI. This affects an unknown part of the component Llama Stack Service. Such manipulation leads to improper isolation or compartmentalization.
This vulnerability is uniquely identified as CVE-2025-12805. The attack can be launched remotely. No exploit exists.
A vulnerability marked as critical has been reported in libssh. The impacted element is the function ssh_get_hexa. Performing a manipulation results in buffer overflow.
This vulnerability was named CVE-2026-0966. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as critical, has been found in libssh. This issue affects some unknown processing of the component Path Handler. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2026-0964. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability identified as problematic has been detected in activestorage Gem on Rails. This impacts an unknown function. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2026-33658. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability identified as critical has been detected in Open-Xchange OX Dovecot Pro up to 2.4.0/3.1.0. This affects an unknown function. This manipulation causes improper authentication.
This vulnerability is registered as CVE-2025-59028. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Dataease SQLBot up to 1.7.0. It has been rated as critical. This vulnerability affects unknown code of the component Text2SQL Chat Interface. Performing a manipulation of the argument question results in sql injection.
This vulnerability is identified as CVE-2026-33324. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in PHPOffice PhpSpreadsheet up to 1.30.3/2.1.15/2.4.4/3.10.4/5.6.0. It has been rated as problematic. The affected element is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-35453. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability identified as problematic has been detected in OpenStack Ironic up to 26.1.5/29.0.4/32.0.0/35.0.0. Impacted is an unknown function of the component idrac. The manipulation leads to incorrect resource transfer.
This vulnerability is listed as CVE-2026-42997. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow.
This vulnerability is identified as CVE-2026-7855. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability, which was classified as critical, was found in Bitcoin Core up to 28.x. This issue affects some unknown processing. Such manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2024-52911. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as critical was found in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow.
This vulnerability is referenced as CVE-2026-7854. It is possible to launch the attack remotely. Furthermore, an exploit is available.