<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Fri, 03 Apr 2026 16:37:18 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-10-301: Trend Micro Control Manager Server-agent Communication Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-995</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-301/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trent Micro Control Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 17 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-300: Novell iPrint Client Netscape/ActiveX Plugin HTTP_CONNECTION Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-979</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-300/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Sun, 26 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-299: Novell iPrint Client Netscape/ActiveX Plugin Wide Character IPP Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-981</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-299/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Sun, 26 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-298: Novell iPrint Client Netscape Plugin call-back-url Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-980</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-298/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Sun, 26 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-297: Novell iPrint Client Netscape/ActiveX Location Header Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-978</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-297/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Sun, 26 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-296: Novell iPrint Client Netscape/ActiveX IPP Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-983</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-296/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Sun, 26 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-295: Novell iPrint Client Netscape/ActiveX printer-state-reasons Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-985</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-295/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Sun, 26 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-294: Rocket U2 Uni RPC Service Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-368</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-294/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of multiple products from multiple vendors that utilize the Uni RPC protocol. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 23 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-293: HP StorageWorks Storage Mirroring DoubleTake.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-958</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-293/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks Storage Mirroring. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 23 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-292: Hewlett-Packard Power Manager Administration Web Server Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-697</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-292/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Power Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-4113.]]></description>
      <pubDate>Thu, 16 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-291: Symantec Endpoint Protection Manager Reporting Server fw_charts.php Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-756</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-291/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Endpoint Protection. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0114.]]></description>
      <pubDate>Wed, 15 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-290: SAP NetWeaver Business Client SapThemeRepository ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-939</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-290/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP NetWeaver Business Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Tue, 14 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-289: Microsoft Internet Explorer HTML+Time Element outerText Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-725</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-289/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must be convinced of visiting a malicious page or opening a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3346.]]></description>
      <pubDate>Tue, 14 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-288: Microsoft Internet Explorer Recursive Select Element Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-825</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-288/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3345.]]></description>
      <pubDate>Tue, 14 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-287: Microsoft SharePoint Server Arbitrary File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-706</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-287/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Sharepoint Server utilizing Microsoft&#x27;s Office Document Load Balancer. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3964.]]></description>
      <pubDate>Tue, 14 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-286: Microsoft Exchange 2007 Infinite Loop Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-598</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-286/</link>
      <description><![CDATA[This vulnerability allows attackers to deny services on vulnerable installations of Microsoft Exchange Server 2007. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2010-3937.]]></description>
      <pubDate>Tue, 14 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-285: Novell ZENworks Desktop Management Linux TFTPD Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-847</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-285/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Desktop Management. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 13 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-284: Novell ZENWorks Remote Management Agent DN Name Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-751</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-284/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 13 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-283: Novell ZENWorks Remote Management Agent Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-749</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-283/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 13 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-282: RealNetworks RealPlayer RealPix Server Header Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-911</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-282/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4394.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-281: RealNetworks RealPlayer RMX Header Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-913</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-281/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4391.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-280: RealNetworks RealPlayer ImageMap Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-916</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-280/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4392.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-279: RealNetworks RealPlayer Cook Codec Initialization Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-881</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-279/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4389.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-278: RealNetworks RealPlayer Custsupport.html Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-845</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-278/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4388.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-277: RealNetworks RealPlayer Main.html Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-844</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-277/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4388.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-276: RealNetworks RealPlayer Upsell.htm getqsval Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-843</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-276/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4388.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-275: RealNetworks RealPlayer Cross-Zone Scripting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-771</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-275/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is requires in that a target must navigate to a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4396.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-274: RealNetworks Realplayer RV20 Stream Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-646</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-274/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4378.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-273: RealNetworks RealPlayer AAC MLLT Atom Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-569</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-273/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2999.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-272: RealNetworks RealPlayer Cook Audio Codec Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-506</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-272/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious media file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4377.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-271: RealNetworks RealPlayer RTSP GIF Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-508</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-271/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious media file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4376.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-270: RealNetworks RealPlayer ICY Protocol StreamTitle Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-509</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-270/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerability installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must open a malicious SHOUTcast Stream. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2997.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-269: RealNetworks RealPlayer AAC TIT2 Atom Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-490</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-269/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of the RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4397.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-268: RealNetworks RealPlayer Media Properties Header Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-434</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-268/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4384.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-267: RealNetworks RealPlayer Advanced Audio Coding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-922</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-267/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4395.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-266: RealNetworks RealPlayer Multi-Rate Audio Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-473</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-266/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4375.]]></description>
      <pubDate>Fri, 10 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-265: Mozilla Firefox NewIdArray Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-884</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-265/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3767.]]></description>
      <pubDate>Thu, 09 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-264: Mozilla Firefox nsDOMAttribute MutationObserver Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-898</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-264/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3766.]]></description>
      <pubDate>Thu, 09 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-263: CA Multiple Products create_session_bab SOAP Request Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-878</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-263/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA ARCserve Replication and High Availability. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3984.]]></description>
      <pubDate>Thu, 09 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-262: Apple QuickTime PICT directBitsRect Pack3 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-977</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-262/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3800.]]></description>
      <pubDate>Tue, 07 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-261: Apple QuickTime PICT File PackBits Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-790</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-261/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3800.]]></description>
      <pubDate>Tue, 07 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-260: Apple QuickTime Panorama Atom Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-734</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-260/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that a user must be coerced into visiting a malicious page or opening a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3802.]]></description>
      <pubDate>Tue, 07 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-259: Apple QuickTime FPX Subimage Count Out-of-bounds Counter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-681</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-259/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required in that a user must be coerced into opening up a malicious document or visiting a malicious website. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3801.]]></description>
      <pubDate>Tue, 07 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-258: Apple QuickTime 3GP Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-645</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-258/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1508.]]></description>
      <pubDate>Tue, 07 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-257: Apple Webkit WholeText Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-874</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-257/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3812.]]></description>
      <pubDate>Tue, 23 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-256: Novell iPrint Activex GetDriverSettings Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-959</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-256/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4321.]]></description>
      <pubDate>Thu, 23 Dec 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-255: Apple QuickTime m1s Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-839</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-255/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3792.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-254: Apple QuickTime ELST MediaRate Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-838</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-254/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3791.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-253: Apple QuickTime GIF LZW Decompression Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-828</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-253/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required in that a target must open a malicious media file or visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3795.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-252: Apple QuickTime JP2 SIZ Chunk Uninitialized Object Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-812</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-252/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3788.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-251: Apple QuickTime FlashPix Max Uninitialized Jpeg Table Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-778</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-251/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3794.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-250: Apple Quicktime rec Chunk Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-739</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-250/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3789.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-249: Apple Quicktime Sorenson Video Codec Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-732</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-249/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3793.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-248: Apple Mac OS X IPv6 PIM Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-857</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-248/</link>
      <description><![CDATA[This vulnerability allows remote attackers to denial of service the IPv6 stack of an installation of Apple Mac OSX. No authentication or user interaction is required in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2010-1843.]]></description>
      <pubDate>Wed, 10 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-247: Novell Groupwise GWPOA HTTP Request Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-770</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-247/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 09 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-246: Microsoft Excel MSODrawing Improper Exception Handling Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-855</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-246/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3335.]]></description>
      <pubDate>Tue, 09 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-245: Microsoft Office PowerPoint Unknown Animation Node Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-748</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-245/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Powerpoint 2003. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2573.]]></description>
      <pubDate>Tue, 09 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-244: Apple Quicktime Movie Malformed H.264 Sample Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-602</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-244/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-0515.]]></description>
      <pubDate>Tue, 09 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-243: Novell GroupWise Internet Agent TZNAME Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-954</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-243/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-242: Novell Groupwise Internet Agent IMAP LIST Command Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-846</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-242/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise Internet Agent. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-241: Novell GroupWise Internet Agent Content-Type Parsing Integer Signedness Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-953</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-241/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-240: Novell GroupWise Internet Agent COMMENT Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-961</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-240/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-239: Novell GroupWise Internet Agent RRULE Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-960</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-239/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-238: Novell GroupWise Internet Agent Content-Type String Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-952</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-238/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-237: Novell GroupWise Internet Agent Content-Type Multiple Value Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-951</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-237/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-236: SAP NetWeaver Composition Environment sapstartsrv.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-896</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-236/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP NetWeaver Composition Environment. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 08 Nov 2010 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-235: Cisco ICM Setup Manager Agent.exe HandleUpgradeTrace Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-795</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-235/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco ICM. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3040.]]></description>
      <pubDate>Sun, 07 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-234: Cisco ICM Setup Manager Agent.exe HandleQueryNodeInfoReq Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-794</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-234/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco ICM. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3040.]]></description>
      <pubDate>Sun, 07 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-233: Cisco ICM Setup Manager Agent.exe AgentUpgrade Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-793</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-233/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified ICM. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3040.]]></description>
      <pubDate>Sun, 07 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-232: Cisco ICM Setup Manager Agent.exe HandleUpgradeAll Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-796</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-232/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco ICM. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3040.]]></description>
      <pubDate>Sun, 07 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-231: Juniper Secure Access Series meeting_testjava.cgi XSS Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-886</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-231/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Juniper SA Series devices. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.4.]]></description>
      <pubDate>Sun, 07 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-230: Novell ZENworks Handheld Management ZfHIPCND.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-709</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-230/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Handheld Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Sun, 07 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-229: ProFTPD TELNET_IAC Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-925</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-229/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ProFTPD. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 02 Nov 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-228: Adobe Shockwave Player Director File SetVertexArray Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-894</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-228/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2010-4090.]]></description>
      <pubDate>Fri, 29 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-227: Adobe Shockwave Player Lnam Chunk String Processing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-909</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-227/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3655.]]></description>
      <pubDate>Fri, 29 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-226: Symantec IM Manager rdServer.dll sGetDefinition SQL Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-943</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-226/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject arbitrary SQL into the backend database on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-225: Symantec IM Manager Administrative Interface DetailReportGroup.lgx Definition File SQL Injection Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-873</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-225/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-224: Symantec IM Manager Administrative Interface SummaryReportGroup.lgx Definition File SQL Injection Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-872</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-224/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-223: Symantec IM Manager Administrative Interface LoggedInUsers.lgx Definition  File SQL Injection Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-871</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-223/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-222: Symantec IM Manager Administrative Interface rdpageimlogic.aspx SQL Injection Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-870</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-222/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-221: Symantec IM Manager Administrative Interface IMAdminReportTrendFormRun.asp SQL Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-773</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-221/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject arbitrary SQL into the packaged database on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-220: Symantec IM Manager Administrative Interface IMAdminScheduleReport.asp SQL Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-752</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-220/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject arbitrary SQL into the packaged database on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0112.]]></description>
      <pubDate>Wed, 27 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-219: Mozilla Firefox LookupGetterOrSetter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-929</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-219/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3183.]]></description>
      <pubDate>Tue, 19 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-218: IBM DB2 install_jar Arbitrary File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-743</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-218/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM DB2. Authentication is required in that a user must have the ability to connect to the database. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2008-2154.]]></description>
      <pubDate>Tue, 19 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-217: IBM Informix Dynamic Server DBINFO Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-381</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-217/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Informix Database Server. SQL query execution privileges are required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 18 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-216: IBM Informix Dynamic Server oninit.exe EXPLAIN Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-288</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-216/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Informix Dynamic Server. Authentication is required in that an attacker must have valid credentials to connect to the database. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 18 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-215: IBM Informix Dynamic Server librpc.dll Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-200</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-215/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Informix Dynamic Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 18 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-214: IBM Rational Quality Manager and Test Lab Manager Backdoor Account Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-699</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-214/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute code on vulnerable installations of Rational Quality Manager and Rational Test Lab Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 18 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-213: RealNetworks RealPlayer Multiple Protocol Handlers Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-724</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-213/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3751.]]></description>
      <pubDate>Fri, 15 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-212: RealNetworks RealPlayer RJMDSections Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-677</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-212/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a target must open a malicious website or media file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3750.]]></description>
      <pubDate>Fri, 15 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-211: RealNetworks Realplayer RecordClip Parameter Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-643</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-211/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3749.]]></description>
      <pubDate>Fri, 15 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-210: RealNetworks RealPlayer ActiveX Control CDDA URI Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-600</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-210/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3747.]]></description>
      <pubDate>Fri, 15 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-209: RealNetworks RealPlayer Malformed IVR Pointer Index Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-568</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-209/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2998.]]></description>
      <pubDate>Fri, 15 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-208: Oracle Java Runtime HeadspaceSoundbank.nGetName BANK Record Size Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-715</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-208/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3559.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-207: Oracle Java ActiveX Plugin Uninitialized Window Handle Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-792</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-207/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle&#x27;s Java platform that utilize the ActiveX Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3555.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-206: Oracle Java IE Browser Plugin docbase Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-859</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-206/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3552.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-205: Oracle Sun JRE JPEGImageWriter.writeImage Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-809</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-205/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sun&#x27;s Java Runtime Environment. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3565.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-204: Oracle Sun JRE ICC Profile Device Information Tag Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-803</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-204/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle&#x27;s Java Runtime Environment. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3566.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-203: Oracle Sun Java ICC Profile Unicode Description Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-802</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-203/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle&#x27;s Java Runtime Environment. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3571.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-202: Sun Java Web Start BasicServiceImpl Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-705</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-202/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Sun Java Runtime. User interaction is required in that a target must visit a malicious page. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3563.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-201: Oracle Database Java Stored Procedure Race Condition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-667</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-201/</link>
      <description><![CDATA[This vulnerability allows remote attackers to break out of the Java Sandbox implemented by Oracle&#x27;s relational database. Authentication is required in that a user must be able to create a Java stored procedure to trigger the issue. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2419.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-200: Tivoli Storage Manager FastBack 0xfafbfcfd Packet Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-700</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-200/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Tivoli Storage Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-199: Microsoft Windows Media Player Network Sharing Service Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-854</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-199/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Player. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3225.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-198: Microsoft Internet Explorer EOT File hdmx Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-833</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-198/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1883.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-197: Microsoft Internet Explorer Stylesheet PrivateFind Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-826</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-197/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3328.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-196: SAP Crystal Reports JobServer GIOP Request Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-822</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-196/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-195: SAP BusinessObjects Crystal Reports Server CMS.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-787</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-195/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 12 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-194: IBM Tivoli Provisioning Manager for OS Deployment TCP to ODBC Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-781</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-194/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary SQL queries on vulnerable installations of Tivoli Provisioning Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 08 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-193: Adobe Acrobat Reader Multimedia Playing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-868</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-193/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3632.]]></description>
      <pubDate>Wed, 06 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-192: Adobe Acrobat Reader ICC mluc Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-719</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-192/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required in that a target must be coerced into opening a file or visiting a web page. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3622.]]></description>
      <pubDate>Wed, 06 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-191: Adobe Reader ICC Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-718</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-191/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required in that a target must be coerced into opening a file or visiting a web page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3621.]]></description>
      <pubDate>Wed, 06 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-190: Novell iManager getMultiPartParameters Arbitrary File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-772</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-190/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iManager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 01 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-189: Novell eDirectory Server Malformed Index Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-477</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-189/</link>
      <description><![CDATA[This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory. Authentication is not required in order to trigger this vulnerability. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 01 Oct 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-188: IBM Tivoli Storage Manager FastBack Mount NULL Pointer Dereference DoS Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-701</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-188/</link>
      <description><![CDATA[This vulnerability allows remote attackers to deny service to clients on vulnerable installations of IBM Tivoli FastBack Storage Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Thu, 30 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-187: IBM TSM FastBack Server _DAS_ReadBlockReply Remote Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-664</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-187/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-186: IBM TSM FastBack _CalcHashValueWithLength Remote Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-659</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-186/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-185: IBM TSM FastBack Server _Eventlog Format String Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-657</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-185/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Fastback. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-184: IBM TSM FastBack Server USER_S_AddADGroup Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-663</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-184/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-183: IBM TSM FastBack Server FXCLI_checkIndexDBLocation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-662</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-183/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-182: IBM TSM FastBack Server FXCLI_OraBR_Exec_Command Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-661</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-182/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-181: IBM TSM FastBack Server ActivateLTScriptReply Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-660</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-181/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-180: IBM TSM FastBack Server _SendToLog Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-658</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-180/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli FastBack Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-179: IBM TSM FastBack Mount Service Arbitrary Overwrite Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-656</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-179/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Fastback. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-178: Novell PlateSpin Orchestrate Graph Rendering Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-680</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-178/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Platespin Orchestrate. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 15 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-177: IBM Lotus Domino iCalendar MAILTO Stack Overflow Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-177/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of IBM Lotus Domino. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 14 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-176: Mozilla Firefox normalizeDocument Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-866</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-176/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2766.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-175: Hewlett-Packard Data Protector Express PrvRecvRqu Remote Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-582</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-175/</link>
      <description><![CDATA[This vulnerability allows remote attackers to trigger a denial of service condition on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2010-3008.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-174: Hewlett-Packard Data Protector DtbClsLogin Utf8cpy Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-581</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-174/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3007.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-173: Mozilla Firefox nsTreeSelection Dangling Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-903</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-173/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2760.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-172: Mozilla Firefox tree Object Removal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-817</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-172/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3168.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-171: Mozilla Firefox nsTreeContentView Dangling Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-804</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-171/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-3167.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-170: Apple Safari Webkit Runin Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-806</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-170/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-1806.]]></description>
      <pubDate>Mon, 13 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-169: Novell Netware SSHD.NLM Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-674</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-169/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Wed, 01 Sep 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-168: Apple QuickTime ActiveX _Marshaled_pUnk Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-823</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-168/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-1818.]]></description>
      <pubDate>Tue, 31 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-167: RealNetworks RealPlayer FLV Parsing Multiple Integer Overflow Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-620</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-167/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-3000.]]></description>
      <pubDate>Thu, 26 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-166: RealNetworks RealPlayer Malformed IVR Object Index Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-472</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-166/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2996.]]></description>
      <pubDate>Thu, 26 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-824</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-165/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Internet Security Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Wed, 25 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-164: Adobe Shockwave Player Director File FFFFFF88 Record Processing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-864</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-164/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2876.]]></description>
      <pubDate>Tue, 24 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-163: Adobe Shockwave Director tSAC Chunk Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-840</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-163/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2874.]]></description>
      <pubDate>Tue, 24 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-162: Adobe Shockwave Director rcsL Chunk Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-836</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-162/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2873.]]></description>
      <pubDate>Tue, 24 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-161: Adobe Shockwave Director PAMI Chunk Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-161/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2872.]]></description>
      <pubDate>Tue, 24 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-160: Adobe Shockwave Player Director File FFFFFF45 Record Processing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-841</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-160/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2871.]]></description>
      <pubDate>Tue, 24 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-159: IBM Lotus Notes Autonomy KeyView WK3 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-640</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-159/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 23 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-158: IBM Lotus Notes Autonomy KeyView WK3 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-639</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-158/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 23 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-157: IBM Lotus Notes Autonomy KeyView Office Shape Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-638</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-157/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 23 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-156: IBM Lotus Notes Autonomy KeyView Word Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-637</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-156/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes Email Client. User interaction is required to exploit this vulnerability in that the target must open a malicious email attachment. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 23 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-155: Cisco WebEx Player ARF String Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-627</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-155/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 23 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-154: Apple Webkit Button First-Letter Style Rendering Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-791</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-154/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. Authentication is not required to exploit this vulnerability. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1392.]]></description>
      <pubDate>Wed, 11 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-153: Apple Webkit SVG Floating Text Element Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-785</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-153/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1787.]]></description>
      <pubDate>Wed, 11 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-152: Apple WebKit RTL LineBox Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-703</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-152/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0049.]]></description>
      <pubDate>Wed, 11 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-151: Microsoft Office Word 2007 plcffldMom Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-740</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-151/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1903.]]></description>
      <pubDate>Wed, 11 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-150: Microsoft Office Word sprmCMajority Record Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-527</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-150/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must open a malicious document. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1900.]]></description>
      <pubDate>Wed, 11 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-149: Adobe Flash Player LocalConnection Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-875</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-149/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2188.]]></description>
      <pubDate>Tue, 10 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-148: Microsoft Cinepak Codec CVDecompress Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-720</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-148/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2553.]]></description>
      <pubDate>Tue, 10 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-147: Microsoft Windows MPEG Layer-3 Audio Decoder Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-698</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-147/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required in that a target must open a malicious media file or visit a malicious page. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1882.]]></description>
      <pubDate>Tue, 10 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-146: Apple Webkit Anchor Tag Mouse Click Event Dispatch Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-783</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-146/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0048.]]></description>
      <pubDate>Mon, 09 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-145: Novell ZENWorks Remote Management Agent Weak Authentication Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-750</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-145/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks Remote Management. Access to a single node with Remote Management client installed and configured is required. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 09 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-144: Apple Webkit Rendering Counter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-784</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-144/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1784.]]></description>
      <pubDate>Mon, 09 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-143: Novell Sentinel Log Manager Multiple Servlet Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-622</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-143/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Log Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 09 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-142: Apple Webkit SVG First-Letter Style Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-782</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-142/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1785.]]></description>
      <pubDate>Thu, 05 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-141: Apple Webkit SVG ForeignObject Rendering Layout Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-766</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-141/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1786.]]></description>
      <pubDate>Thu, 05 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-140: Novell iPrint Client Browser Plugin operation Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-754</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-140/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client Browser Plugin. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-4315.]]></description>
      <pubDate>Thu, 05 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-139: Novell iPrint Client Browser Plugin Parameter Name Remote Code Execution]]></title>
      <guid isPermaLink="false">ZDI-CAN-745</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-139/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client browser plugin. User interaction is required in that a target must visit a malicious web page. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-4314.]]></description>
      <pubDate>Thu, 05 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-138: Novell iPrint Server Queue Name Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-742</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-138/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-4320.]]></description>
      <pubDate>Thu, 05 Aug 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-137: Hewlett-Packard OpenView NNM webappmon.exe execvp_nc Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-682</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-137/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2703.]]></description>
      <pubDate>Wed, 21 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-136: Novell Teaming ajaxUploadImageFile Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-777</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-136/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Teaming. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2773.]]></description>
      <pubDate>Wed, 21 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-135: Novell Groupwise WebAccess Multiple Cross-Site Scripting Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-710</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-135/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary client side script  The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2010-2778, CVE-2010-2779.]]></description>
      <pubDate>Tue, 20 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-134: Mozilla Firefox DOM Attribute Cloning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-832</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-134/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1208.]]></description>
      <pubDate>Tue, 20 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-133: Mozilla Firefox CSS font-face Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-831</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-133/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2752.]]></description>
      <pubDate>Tue, 20 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-132: Mozilla Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-821</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-132/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1214.]]></description>
      <pubDate>Tue, 20 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-131: Mozilla Firefox nsTreeSelection Dangling Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-755</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-131/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2753.]]></description>
      <pubDate>Tue, 20 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-130: Mozilla Firefox NodeIterator Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-712</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-130/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the victim must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1209.]]></description>
      <pubDate>Tue, 20 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-129: Novell Netware Groupwise Internet Gateway Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-673</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-129/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise Internet Agent. Authentication is required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-2777.]]></description>
      <pubDate>Fri, 16 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-128: Ipswitch Imail Server Queuemgr Format String Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-738</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-128/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 15 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-127: Ipswitch Imail Server Mailing List Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-737</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-127/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail. Authentication might be required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Thu, 15 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-126: Ipswitch Imail Server List Mailer Reply-To Address Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-736</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-126/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IPSwitch IMail List Mailer. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 15 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-125: IBM SolidDB solid.exe Handshake Request Username Field Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-676</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-125/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-124: Oracle Secure Backup Web Interface Various Post-Auth Command Injection Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-653</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-124/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary commands on vulnerable installations of Oracle Secure Backup. Authentication is required to exploit these vulnerabilities. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-0907.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-123: Oracle Secure Backup Administration Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-626</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-123/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0904.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-122: Oracle Secure Backup Administration Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-617</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-122/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject arbitrary commands on vulnerable installations of Oracle Secure Backup. Authentication is required to exploit this vulnerability but may be bypassed. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0906.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-121: Oracle Secure Backup Administration selector Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-616</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-121/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject arbitrary commands on vulnerable installations of Oracle Secure Backup. Authentication is required to exploit this vulnerability but may be bypassed. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0906.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-120: Oracle Secure Backup Administration objectname Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-585</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-120/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary commands on vulnerable installations of Oracle Secure Backup. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-0906.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-119: Oracle Secure Backup Administration $other Variable Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-584</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-119/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary commands on vulnerable installations of Oracle Secure Backup. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2010-0899.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-118: Oracle Secure Backup Administration uname Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-583</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-118/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.7. The following CVEs are assigned: CVE-2010-0904.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-117: Microsoft Office Access AccWizObjects ActiveX Control Uninitialized Imports Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-599</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-117/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required in that a user must browse to a malicious website. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0814.]]></description>
      <pubDate>Tue, 13 Jul 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-116: Adobe Reader CLOD Progressive Mesh Continuation Resolution Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-721</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-116/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat and Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2202.]]></description>
      <pubDate>Wed, 30 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-115: Adobe Flash Player AVM newFrameState Integer Overfow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-511</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-115/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2160.]]></description>
      <pubDate>Fri, 25 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-114: Adobe Flash Player AVM2 getouterscope Opcode Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-511</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-114/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required in that a target must visit a malicious web page. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2160.]]></description>
      <pubDate>Fri, 25 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-113: Mozilla Firefox XSLT Sort Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-747</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-113/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or otherwise render a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1199.]]></description>
      <pubDate>Wed, 23 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-112: Novell Access Manager Arbitrary File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-635</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-112/</link>
      <description><![CDATA[This vulnerability allows remote attackers to upload arbitrary files on vulnerable installations of Novell Access Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0284.]]></description>
      <pubDate>Mon, 21 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-111: Adobe Flash Player LocalConnection Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-805</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-111/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2188.]]></description>
      <pubDate>Mon, 21 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-110: Adobe Flash Player Multiple Tag JPEG Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-636</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-110/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required in that a target must visit a malicious website. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2171.]]></description>
      <pubDate>Wed, 16 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-109: Adobe Flash Player Multiple Atom MP4 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-560</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-109/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-2162.]]></description>
      <pubDate>Wed, 16 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-108: HP OpenView NNM ovwebsnmpsrv.exe Command Line Argument Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-683</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-108/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1964.]]></description>
      <pubDate>Wed, 16 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-107: Multiple Sourcefire Products Static Web SSL Keys Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-799</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-107/</link>
      <description><![CDATA[This vulnerability allows remote attackers to decrypt secure socket layer (SSL) communications directed to multiple Sourcefire products. The ZDI has assigned a CVSS rating of 7.7.]]></description>
      <pubDate>Thu, 10 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-106: Hewlett-Packard OpenView NNM ovutil.dll getProxiedStorageAddress Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-685</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-106/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1961.]]></description>
      <pubDate>Tue, 08 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-105: Hewlett-Packard OpenView NNM ovwebsnmpsrv.exe Bad Option Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-684</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-105/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1960.]]></description>
      <pubDate>Tue, 08 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-104: Microsoft Office Excel SxView Record Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-498</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-104/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must open a malicious document. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-0821.]]></description>
      <pubDate>Tue, 08 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-103: Microsoft Office Excel DBQueryExt Record Unspecified ADO Object Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-666</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-103/</link>
      <description><![CDATA[This particular vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Excel. User interaction is required in that a target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1253.]]></description>
      <pubDate>Tue, 08 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-10-102: Microsoft Internet Explorer Stylesheet Array Removal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-763</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-10-102/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required in that a target must visit a malicious page. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-1262.]]></description>
      <pubDate>Tue, 08 Jun 2010 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
