6.6
CVE-2026-21419 -
Dell Display and Peripheral Manager (Windows) versions prior to 2.2 contain an Improper Link Resolution Before File Access ('Link Following') vulnerability in the Installer and Service. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation ofβ¦
1
CVE-2025-7432 - DPA countermeasures not reseeded under certain conditions
DPA countermeasures in Silicon Labs' Series 2 devices are not reseeded under certain conditions.Β This may allow an attacker to eventually extract secret keys through a DPA attack.
4.8
CVE-2026-2241 - janet-lang janet os.c os_strftime out-of-bounds
A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is β¦
4.8
CVE-2026-2240 - janet-lang janet compile.c janetc_pop_funcdef out-of-bounds
A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read. The attack must be carried out locally. The exploit has been disclosed to the public and may be useβ¦
5.3
CVE-2026-24095 - Missing Permission Check on Analyze Configuration Page
Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows users with the "Use WATO" permission to access the "Analyze configuration" page by directly navigating to its URL, bypassing the intended "Access analyze configuration" permissioβ¦
6.5
CVE-2025-59024 - Crafted delegations or IP fragments can poison cached delegations in Recursor
Crafted delegations or IP fragments can poison cached delegations in Recursor.
8.2
CVE-2025-59023 - Crafted delegations or IP fragments can poison cached delegations in Recursor
Crafted delegations or IP fragments can poison cached delegations in Recursor.
5.3
CVE-2025-14831 - Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
5.3
CVE-2026-24027 - Crafted zones can lead to increased incoming network traffic
Crafted zones can lead to increased incoming network traffic.
5.3
CVE-2026-0398 - Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoβ¦
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.