PowerDNS Authoritative Server Dot Character Denial of Service (CVE-2016-5427)

A denial-of-service vulnerability exists in PowerDNS Authoritative Server. The vulnerability is due to an error in processing queries with the dot character inside. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted DNS packet to the target application that could lead to excessive resources being consumed, resulting in a denial of service condition.

Vim modelines Remote Command Execution (CVE-2016-1248)

A remote code execution vulnerability exists in the modeline component of Vim due to insufficient input validation when parsing the filetype, syntax, and keymap options in modelines. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a file containing a malicious modeline in Vim. Successful exploitation can result in arbitrary command execution in the context of the current user.

FreePBX Framework hotelwakeup Module Directory Traversal

A directory traversal vulnerability exists in FreePBX. The vulnerability is due to an input validation issue in the “hotelwakeup” module. A remote unauthenticated attacker can exploit this vulnerability by sending maliciously crafted requests to the page that could lead to arbitrary command execution on the server under the security context of the asterisk user.