Cisco Talos discovered that hdf5, a file format and library for
storing scientific data, contained several vulnerabilities that could
lead to arbitrary code execution when handling untrusted data.
Monthly Archives: November 2016
Vuln: Dell iDRAC7 and iDRAC8 Devices CVE-2016-5685 Code Injection Vulnerability
Dell iDRAC7 and iDRAC8 Devices CVE-2016-5685 Code Injection Vulnerability
Vuln: Multiple Emerson Products CVE-2016-9347 Security Bypass Vulnerability
Multiple Emerson Products CVE-2016-9347 Security Bypass Vulnerability
Vuln: Emerson DeltaV CVE-2016-9345 Local Privilege Escalation Vulnerability
Emerson DeltaV CVE-2016-9345 Local Privilege Escalation Vulnerability
Vuln: Apache Subversion CVE-2016-8734 XML External Entity Denial of Service Vulnerability
Apache Subversion CVE-2016-8734 XML External Entity Denial of Service Vulnerability
CVE-2016-9480
libdwarf 2016-10-21 allows context-dependent attackers to obtain sensitive information or cause a denial of service by using the “malformed dwarf file” approach, related to a “Heap Buffer Over-read” issue affecting the dwarf_util.c component, aka DW201611-006.
CVE-2016-9481
In framework/modules/core/controllers/expCommentController.php of Exponent CMS 2.4.0, content_id input is passed into showComments. The method showComments is defined in the expCommentControllercontroller with the parameter ‘$this->params[‘content_id’]’ used directly in SQL. Impact is a SQL injection.
CVE-2016-1251
There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
CVE-2016-8223
During an internal security review, Lenovo identified a local privilege escalation vulnerability in Lenovo System Interface Foundation software installed on some Windows 10 PCs where a user with local privileges could run arbitrary code with administrator level privileges.
CVE-2016-8224
A vulnerability has been identified in some Lenovo Notebook and ThinkServer systems where an attacker with administrative privileges on a system could install a program that circumvents Intel Management Engine (ME) protections. This could result in a denial of service or privilege escalation attack on the system.