<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Wed, 13 May 2026 11:10:33 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-11-354: HP Managed Printing Administration jobDelivery Multiple Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1066</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-354/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Managed Printing Administration. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2011-4168.]]></description>
      <pubDate>Thu, 22 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-353: HP Managed Printing Administration MPAUploader.dll Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-353/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Managed Printing Administration. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4167.]]></description>
      <pubDate>Thu, 22 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-352: HP Managed Printing Administration jobAcct Multiple Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1064</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-352/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Managed Printing Administration.  Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4166.]]></description>
      <pubDate>Thu, 22 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-351: WellinTech KingView HistoryServer.exe Opcode 3 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1261</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-351/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wellintek KingView. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-4536.]]></description>
      <pubDate>Thu, 22 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-350: Enterasys NetSight nssyslogd PRI Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1099</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-350/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Enterasys Netsight. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 19 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-349: Adobe Shockwave NPAPI Plug-in Drag and Drop Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1114</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-349/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the NPAPI version of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.3. The following CVEs are assigned: CVE-2011-2127.]]></description>
      <pubDate>Sat, 17 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-348: HP OpenView NNM nnmRptConfig.exe nameParams Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1208</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-348/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OpenView Network Node Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-3165.]]></description>
      <pubDate>Tue, 13 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-347: Microsoft Office Word Hidden Border Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1085</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-347/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word 2007/2010. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1983.]]></description>
      <pubDate>Tue, 13 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-346: Microsoft Office 2007 Office Art Shape Record Hierarchy Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1280</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-346/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office 2007. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3413.]]></description>
      <pubDate>Tue, 13 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-345: TrendMicro Control Manager CmdProcessor.exe AddTask Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1138</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-345/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trent Micro Control Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.7.]]></description>
      <pubDate>Wed, 07 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-344: RealNetworks RealPlayer RV20 Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1304</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-344/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4253.]]></description>
      <pubDate>Wed, 07 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-343: RealNetworks RealPlayer mp4arender esds channel count Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1351</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-343/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Realplayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4260.]]></description>
      <pubDate>Wed, 07 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-342: Novell ZENworks Asset Management Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1282</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-342/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Asset Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.7. The following CVEs are assigned: CVE-2011-2653.]]></description>
      <pubDate>Wed, 07 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-341: Cisco WebEx Player WRF Type 0 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1236</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-341/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3319.]]></description>
      <pubDate>Wed, 07 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-340: Apple Quicktime Font Table Signed Length Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1302</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-340/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3248.]]></description>
      <pubDate>Wed, 07 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-339: Iron Mountain Connected Backup Agent Unauthenticated Remote Command Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1023</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-339/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Iron Mountain Connected Backup. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-2397.]]></description>
      <pubDate>Thu, 01 Dec 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-338: RealNetworks RealPlayer IVR MLTI Chunk Length Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1277</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-338/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4258.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-337: RealNetworks RealPlayer RV30 Uninitialized Index Value Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1303</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-337/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4256.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-336: RealNetworks RealPlayer Invalid Codec Name Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-336/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4255.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-335: RealNetworks RealPlayer RV10 Sample Height Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1305</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-335/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4252.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-334: RealNetworks RealPlayer genr Sample Size Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1279</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-334/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4251.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-333: RealNetworks RealPlayer ATRC Code Data Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-333/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4250.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-332: RealNetworks RealPlayer Malformed AAC File Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1310</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-332/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Realplayer. AUser interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4248.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-331: RealNetwork RealPlayer MPG Width Integer Underflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1294</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-331/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Realplayer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4259.]]></description>
      <pubDate>Mon, 28 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-330: InduSoft WebStudio Unauthenticated Remote Operations Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1181</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-330/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Indusoft Web Studio. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4051.]]></description>
      <pubDate>Wed, 16 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-329: InduSoft WebStudio CEServer Operation 0x15 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1183</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-329/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Indusoft WebStudio. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4052.]]></description>
      <pubDate>Wed, 16 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-328: ProFTPD Response Pool Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1420</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-328/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the ProFTPd server. Authentication is required to exploit this vulnerability in order to have access to the ftp command set. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Fri, 11 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-327: HP Data Protector Notebook Extension Policy Server LogBackupLocationStatus Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1229</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-327/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3161.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-326: HP Data Protector Notebook Extension Policy Server LogClientInstallation Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1222</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-326/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3156.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-325: HP Data Protector Notebook Extension GetPolicies Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1225</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-325/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3157.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-324: HP Data Protector Notebook Extension Policy Server RequestCopy Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1226</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-324/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3158.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-323: HP Data Protector Notebook Extension Policy Server LogClientHealth Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1227</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-323/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3159.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-322: HP Data Protector Notebook Extension Policy Server LogCopyOperation Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1228</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-322/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3160.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-321: HP Data Protector Notebook Extension Policy Server FinishedCopy Remote SQL Injection Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1296</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-321/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Notebook Extension. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3162.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-320: GE Proficy Historian ihDataArchiver.exe Trusted Header Size Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1233</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-320/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy Historian. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1918.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-319: Novell ZENWorks Software Packaging ISGrid.Grid2.1 DoFindReplace bstrReplaceText Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1235</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-319/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3174.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-318: Novell Zenworks Software Packaging LaunchHelp.dll ActiveX Control LaunchProcess Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1204</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-318/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Software Packaging. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2657.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-317: Novell ZENWorks Software Packaging Antique ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1234</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-317/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2658.]]></description>
      <pubDate>Mon, 07 Nov 2011 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-316: Apple QuickTime H264 Matrix Conversion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1315</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-316/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3251.]]></description>
      <pubDate>Thu, 27 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-315: Apple QuickTime FLC Delta Decompression Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1275</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-315/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3249.]]></description>
      <pubDate>Thu, 27 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-314: Apple Quicktime PnPixPat PatType 3 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1090</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-314/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3247.]]></description>
      <pubDate>Thu, 27 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-313: Apple QuickTime FLC RLE Packet Count Decompression Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1274</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-313/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3223.]]></description>
      <pubDate>Thu, 27 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-312: Apple QuickTime Atom Hierarachy Argument Size Mismatch Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1220</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-312/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3221.]]></description>
      <pubDate>Thu, 27 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-311: Apple Quicktime Empty URL Data Handler Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1219</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-311/</link>
      <description><![CDATA[This vulnerability allows remote attackers to potentially disclose memory addresses on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3220.]]></description>
      <pubDate>Thu, 27 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-310: Adobe Reader Compound Glyph Index Sign Extension Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1309</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-310/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2441.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-309: Novell iPrint Client nipplib.dll GetDriverSettings Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1289</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-309/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3173.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-308: Cisco WebEx Player ATAS32.DLL linesProcessed Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1170</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-308/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4004.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-307: Oracle Java MixerSequencer.nAddControllerEventCallback Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1218</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-307/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3545.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-306: Oracle Java IIOP Deserialization Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1253</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-306/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3521.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-305: Oracle Java Applet Rhino Script Engine Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1254</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-305/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-3544.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-304: Apple Quicktime Advanced Audio Codec Frame Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1150</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-304/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. Authentication is not required to exploit this vulnerability. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.3. The following CVEs are assigned: CVE-2011-3252.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-303: Apple QuickTime H264 Stream frame_cropping Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1314</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-303/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3219.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-302: Adobe Reader U3D TIFF Resource Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1197</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-302/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2432.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-301: Adobe Reader U3D PICT 0Eh Encoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1199</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-301/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2434.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-300: Adobe Reader U3D PICT 10h Encoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1198</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-300/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2433.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-299: Adobe Reader  PICT Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1200</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-299/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2435.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-298: Adobe Reader U3D IFF RGBA Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1201</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-298/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2436.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-297: Adobe Reader U3D PCX Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1202</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-297/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2437.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-296: Adobe Reader BMP Image RLE Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1212</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-296/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2438.]]></description>
      <pubDate>Wed, 26 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-295: Apple QuickTime FlashPix JPEG Tables Selector Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1312</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-295/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3222.]]></description>
      <pubDate>Tue, 18 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-294: Symantec IM Manager ProcessAction Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1091</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-294/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0554.]]></description>
      <pubDate>Tue, 18 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-293: Avaya Identity Engines Ignition Server Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1095</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-293/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Nortel/Avaya Identity Engines Ignition Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 18 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-292: Cisco Unified Service Monitor brstart sm_read_string_length Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1258</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-292/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified Service Monitor due to bundled EMC SMARTS application server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-2738.]]></description>
      <pubDate>Tue, 18 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-291: Cisco Unified Service Monitor brstart add_dm Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1109</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-291/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified Service Monitor due to bundled EMC SMARTS application server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2738.]]></description>
      <pubDate>Tue, 18 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-290: Microsoft Internet Explorer SetExpandedClipRect Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1324</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-290/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2001.]]></description>
      <pubDate>Sat, 15 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-289: Microsoft Internet Explorer swapNode Handling Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1323</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-289/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2000.]]></description>
      <pubDate>Sat, 15 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-288: Microsoft Internet Explorer Select Element Insufficient Type Checking Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1300</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-288/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer 8. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1999.]]></description>
      <pubDate>Sat, 15 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-287: Internet Explorer Select Element Cache Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1267</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-287/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1996.]]></description>
      <pubDate>Sat, 15 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-286: Novell Groupwise Client DOCX Loader Relationship Id Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-966</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-286/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise Client. User interaction is required to exploit this vulnerability in that the target must open a malicious e-mail message. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 14 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-285: Novell Groupwise iCal COMMENT, RRULE, TZNAME Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1187</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-285/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2010-4325.]]></description>
      <pubDate>Thu, 13 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-284: Adobe Reader Compound Glyphs Array Indexing Error Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1308</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-284/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2441.]]></description>
      <pubDate>Thu, 13 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-283: Adobe Reader Image Data Buffer Allocation Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1211</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-283/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2438.]]></description>
      <pubDate>Thu, 13 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-282: Adobe Reader U3D BMP Colors Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1196</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-282/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2438.]]></description>
      <pubDate>Thu, 13 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-281: Microsoft Office Graph DataFormat Signed Index Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1251</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-281/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office 2007. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1990.]]></description>
      <pubDate>Thu, 13 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-280: Microsoft Office Excel Conditional Expression Ptg Type Confusion Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1223</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-280/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1989.]]></description>
      <pubDate>Thu, 13 Oct 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-279: (0Day) Witness Systems eQuality Unify Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1097</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-279/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Witness Systems eQuality Suite. This application is bundled with Nortel Contact Recording and Quality Monitoring Suite. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 02 Sep 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-278: Novell Cloud Manager Insufficient Framework User Validation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1154</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-278/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Cloud Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2011-2654.]]></description>
      <pubDate>Fri, 02 Sep 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-277: Apple QuickTime 3g2 &#x27;mp4v&#x27; atom size Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1285</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-277/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0258.]]></description>
      <pubDate>Wed, 31 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-276: Adobe Flash Player MP4 sequenceParameterSetNALUnit Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-975</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-276/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2140.]]></description>
      <pubDate>Tue, 23 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-275: EMC Autostart ftAgent Opcode 0x11 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1256</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-275/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC AutoStart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-2735.]]></description>
      <pubDate>Tue, 23 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-274: EMC Autostart ftAgent Opcode 0x140 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1255</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-274/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC AutoStart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-2735.]]></description>
      <pubDate>Tue, 23 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-273: EMC Autostart Domain Name Logging Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1078</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-273/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC AutoStart High Availability. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-2735.]]></description>
      <pubDate>Tue, 23 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-272: (0Day) FlexNet License Server Manager Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1050</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-272/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Flexnet License Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 17 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-271: Mozilla Firefox appendChild DOM Tree Inconsistency Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1141</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-271/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2378.]]></description>
      <pubDate>Wed, 17 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-270: Mozilla Firefox SVGTextElement.getCharNumAtPosition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-270/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0084.]]></description>
      <pubDate>Wed, 17 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-269: RealNetworks RealPlayer Cross-Zone Scripting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1152</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-269/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2947.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-268: RealNetworks RealPlayer SWF DefineFont Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1185</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-268/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2948.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-267: RealNetworks Realplayer MP3 ID3 tags Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1136</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-267/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Realplayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2949.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-266: RealNetworks RealPlayer Advanced Audio Coding Element Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-266/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2951.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-265: RealNetworks Realplayer QCP Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1153</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-265/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2950.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-264: Symantec Veritas Storage Foundation vxsvc.exe Value Unpacking Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1110</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-264/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Veritas Storage Foundation Administrator Service. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-0547.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-263: Symantec Veritas Storage Foundation vxsvc.exe ASCII String Unpacking Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1112</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-263/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Veritas Storage Foundation Administrator Service. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-0547.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-262: Symantec Veritas Storage Foundation vxsvc.exe Unicode String Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1111</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-262/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Veritas Storage Foundation. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-0547.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-261: HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1092</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-261/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Easy Printer Care. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2404.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-260: Nortel Media Application Server cstore.exe cs_anams Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1096</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-260/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Nortel Media Application Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-259: Apple QuickTime STSZ atom Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1162</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-259/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0251.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-258: Apple QuickTime STSC atom Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1160</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-258/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0249.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-257: Apple QuickTime Player H.264 Slice Header Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1231</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-257/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0247.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-256: Apple Quicktime Media Link src Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1151</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-256/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0248.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-255: Apple QuickTime Player H.264 Reference Picture List Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1232</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-255/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0247.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-254: Apple QuickTime &#x27;trun&#x27; atom sampleCount Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1262</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-254/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0256.]]></description>
      <pubDate>Tue, 16 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-253: Adobe Flash Player BitmapData.scroll Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1230</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-253/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2138.]]></description>
      <pubDate>Fri, 12 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-252: Apple QuickTime PICT Image PnSize Opcode Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1164</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-252/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0257.]]></description>
      <pubDate>Mon, 08 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-251: Apple QuickTime STSS atom Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1161</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-251/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0250.]]></description>
      <pubDate>Tue, 09 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-250: Apple QuickTime STTS atom Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1163</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-250/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0252.]]></description>
      <pubDate>Tue, 09 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-249: (Pwn2Own) Microsoft Internet Explorer Protected Mode Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1159</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-249/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escape Protected Mode on vulnerable installations of Internet Explorer. The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2011-1347.]]></description>
      <pubDate>Tue, 09 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-248: Microsoft Internet Explorer 9 STYLE Object Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1244</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-248/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1964.]]></description>
      <pubDate>Tue, 09 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-247: Microsoft Internet Explorer XSLT SetViewSlave Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1224</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-247/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1963.]]></description>
      <pubDate>Tue, 09 Aug 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-246: Sybase Adaptive Server Backup and Monitor Server NULL Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1069</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-246/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase Adaptive Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 29 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-245: Sybase Adaptive Server Backup and Monitor Server Translation Array Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1077</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-245/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase Adaptive Server Enterprise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 29 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-244: (0Day) FlexNet License Server Manager lmadmin Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1076</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-244/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Flexera Software Flexnet License Server Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Thu, 28 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-243: WebKit ContentEditable Inline Style Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1108</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-243/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit as utilized by either Apple Safari, or Google&#x27;s Chrome browser. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0232.]]></description>
      <pubDate>Wed, 27 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-242: Apple Safari Rendering Object Body Detachment Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1317</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-242/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0255.]]></description>
      <pubDate>Wed, 27 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-241: Webkit setAttributes attributeChanged Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1166</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-241/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Webkit Library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0254.]]></description>
      <pubDate>Wed, 27 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-240: Apple Safari Webkit SVG Marker Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1021</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-240/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari&#x27;s Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1453.]]></description>
      <pubDate>Wed, 27 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-239: Apple Safari Webkit FrameOwner Element Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1047</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-239/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0233.]]></description>
      <pubDate>Wed, 27 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-238: Oracle Secure Backup validate_login Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1165</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-238/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Secure Backup. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2261.]]></description>
      <pubDate>Thu, 21 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-237: CA Total Defense Suite Gateway Security Malformed HTTP Packet Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1017</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-237/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite r12. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-2667.]]></description>
      <pubDate>Wed, 20 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-236: EMC Documentum eRoom Indexing Server OpenText HummingBird Connector Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1079</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-236/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Documentum eRoom Indexing Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1741.]]></description>
      <pubDate>Mon, 18 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-235: TrendMicro Control Manager CASProcessor.exe BLOB Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-235/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 12 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-234: Trend Micro Control Manager CasLogDirectInsertHandler.cs Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1125</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-234/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 11 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-233: Symantec Web Gateway forget.php SQL Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1048</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-233/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject arbitrary SQL on vulnerable installations of the Symantec Web Gateway appliance. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0549.]]></description>
      <pubDate>Thu, 07 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-232: HP iNode Management Center iNodeMngChecker.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1082</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-232/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1867.]]></description>
      <pubDate>Fri, 01 Jul 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-231: Apple QuickTime Pict File Matrix Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-231/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2010-3790.]]></description>
      <pubDate>Wed, 29 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-230: Apple Quicktime Apple Lossless Audio Codec Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1140</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-230/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0211.]]></description>
      <pubDate>Wed, 29 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-229: Apple QuickTime RIFF fmt Chunk Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1124</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-229/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0209.]]></description>
      <pubDate>Wed, 29 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-228: Apple ColorSync ICC Profile ncl2 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-228/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on Windows and multiple applications on OSX. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0200.]]></description>
      <pubDate>Wed, 29 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-227: Novell File Reporter Engine RECORD Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1250</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-227/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell File Reporter Engine. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.7. The following CVEs are assigned: CVE-2011-2220.]]></description>
      <pubDate>Mon, 27 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-226: Citrix EdgeSight Launcher Service Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1045</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-226/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Citrix EdgeSight. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 27 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-225: Mozilla Firefox nsXULCommandDispatcher Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1203</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-225/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0085.]]></description>
      <pubDate>Tue, 21 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-224: Mozilla Firefox SVGPointList.appendItem Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1144</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-224/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2363.]]></description>
      <pubDate>Tue, 21 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-223: Mozilla Firefox SVGPathSegList.replaceItem Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1142</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-223/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0083.]]></description>
      <pubDate>Tue, 21 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-222: Adobe Shockwave Shockwave 3d Asset.x32 DEMX Chunk Substructure Count Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1194</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-222/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2113.]]></description>
      <pubDate>Wed, 15 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-221: Adobe Shockwave Shockwave 3d Asset.x32 DEMX 0xFFFFFF45 Field Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1193</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-221/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2114.]]></description>
      <pubDate>Wed, 15 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-220: Adobe Shockwave Director File rcsL Chunk Multiple Opcode Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1074</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-220/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0335.]]></description>
      <pubDate>Wed, 15 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-219: Adobe Acrobat Reader 3difr.x3d Multimedia Playing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-998</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-219/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2094.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-218: Adobe Acrobat Reader tesselate.x3d Multimedia Playing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-999</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-218/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2095.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-217: Adobe Shockwave Font Structure Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1055</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-217/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2109.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-216: Adobe Shockwave rcsL Chunk 16-bit Field Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1272</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-216/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0335.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-215: Adobe Shockwave DEMX Chunk Multiple Field Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1207</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-215/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2112.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-214: Adobe Shockwave CASt Chunk Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1205</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-214/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2112.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-213: Adobe Shockwave rcsL Trusted Offset Chunk Processing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1072</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-213/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2114.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-212: Adobe Shockwave KEY* Chunk Invalid Size Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1248</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-212/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2111.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-211: Adobe Shockwave Shockwave 3d Asset.x32 DEMX Chunk 0xFFFFFF49 Field Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1195</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-211/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2113.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-210: Adobe Shockwave rcsL Chunk Parsing Misallocation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1215</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-210/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2112.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-209: Adobe Shockwave rcsL Substructure Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1216</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-209/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0335.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-208: Adobe Shockwave rcsL Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1217</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-208/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2109.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-207: Adobe Shockwave tSAC Chunk String Termination Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-207/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2118.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-206: Adobe Shockwave GIF Decompression Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1060</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-206/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2111.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-205: Adobe Shockwave Missing Lctx Chunk Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1059</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-205/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0335.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-204: Adobe Shockwave TextXtra Text Element Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1119</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-204/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2112.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-203: Adobe Shockwave xtcL Chunk Parsing Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1113</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-203/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2112.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-202: Adobe Shockwave rcsL String Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1027</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-202/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2119.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-201: Adobe Shockwave Cursor Structure Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1056</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-201/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2120.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-200: Adobe Shockwave AudioMixer Structure Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1057</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-200/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2121.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-199: Oracle Java Soundbank Decompression Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1264</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-199/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0802.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-198: (Pwn2Own) Microsoft Internet Explorer Uninitialized Variable Information Leak Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1158</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-198/</link>
      <description><![CDATA[This vulnerability allows remote attackers to leak information on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1346.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-197: Microsoft Internet Explorer vgx.dll imagedata Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1070</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-197/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1266.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-196: Microsoft Internet Explorer HTTP 302 Redirect Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-196/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1262.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-195: Microsoft Internet Explorer  selection.empty Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1137</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-195/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1261.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-194: Microsoft Internet Explorer layout-grid-char style Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1155</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-194/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1260.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-193: Microsoft Internet Explorer DOM Modification Race Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-193/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-1256.]]></description>
      <pubDate>Tue, 14 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-192: Oracle Java Web Start Command Argument Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1098</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-192/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0863.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-191: Oracle Java ICC Screening Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1081</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-191/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-190: Oracle Java ICC Profile &#x27;crdi&#x27; Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1100</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-190/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java Runtime running on OSX or Linux. This vulnerability does not affect java running on Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-189: Oracle Java ICC Profile ncl2 DevCoords Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1088</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-189/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-188: Oracle Java ICC Profile ncl2 Count Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1087</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-188/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-187: Oracle Java ICC Profile clrt Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1086</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-187/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-186: Oracle Java ICC Profile Multi-Language &#x27;curv&#x27; Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1049</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-186/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of java. Authentication is not required to exploit this vulnerability. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-185: Oracle Java ICC Profile &#x27;bfd &#x27; Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1030</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-185/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-184: Oracle Java ICC Profile Sequence Description &#x27;pseq&#x27; Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1031</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-184/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-183: Oracle Java ICC Profile MultiLanguage &#x27;mluc&#x27; Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1029</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-183/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0862.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-182: Oracle Java IE Browser Plugin Corrupted Window Procedure Hook Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1046</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-182/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Sun Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0817.]]></description>
      <pubDate>Wed, 08 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-181: Novell iPrint op-printer-list-all-jobs url Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1135</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-181/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1707.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1134</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-180/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1708.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-179: Novell iPrint nipplib.dll iprint-client-config-info Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1133</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-179/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1706.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-178: Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1132</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-178/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1705.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-177: Novell iPrint nipplib.dll core-package Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1131</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-177/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1704.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-176: Novell iPrint nipplib.dll driver-version Remote Code Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1130</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-176/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1703.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-175: Novell iPrint nipplib.dll file-date-time Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1129</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-175/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1702.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-174: Novell iPrint nipplib.dll profile-name Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1128</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-174/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1701.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-173: Novell iPrint nipplib.dll profile-time Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1127</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-173/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1700.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-172: Novell iPrint nipplib.dll uri Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1126</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-172/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1699.]]></description>
      <pubDate>Mon, 06 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-171: Sybase OneBridge Mobile Data Suite Format String Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1068</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-171/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase OneBridge Mobile Data Suite. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 03 Jun 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-170: (0Day) HP 3COM/H3C Intelligent Management Center img recv Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1019</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-170/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3COM/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 31 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-169: IBM Tivoli Endpoint lcfd.exe opts Argument Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-964</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-169/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Endpoint. Authentication is required to exploit this vulnerability, however it is trivially achieved.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1220.]]></description>
      <pubDate>Tue, 31 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-168: Multiple Vendor librpc.dll Remote Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-808</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-168/</link>
      <description><![CDATA[This vulnerability allows remote attackers to register RPC services on vulnerable installations of EMC Legato Networker and IBM Informix Dynamic Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0321, CVE-2011-1210.]]></description>
      <pubDate>Mon, 16 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-167: Microsoft WINS Service Failed Response Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-167/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Internet Name Service (WINS). Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1248.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-166: HP 3COM/H3C Intelligent Management Center imcsyslogdm Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1028</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-166/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1854.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-165: HP 3COM/H3C Intelligent Management Center tftpserver opcode_table Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-165/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1853.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-164: HP 3COM/H3C Intelligent Management Center tftpserver DATA/ERROR Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1014</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-164/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3COM/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1852.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-163: HP 3COM/H3C Intelligent Management Center tftpserver mode Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1013</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-163/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1851.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-162: HP 3COM/H3C Intelligent Management Center dbman sprintf Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1012</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-162/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3com/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1850.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-161: HP 3COM/H3C Intelligent Management Center tftpserver WRQ Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1011</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-161/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1849.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-160: HP 3COM/H3C Intelligent Management Center img  Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1010</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-160/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP 3COM/H3C Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-1848.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-159: Mozilla Firefox OBJECT mObserverList Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1033</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-159/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0066.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-158: Mozilla Firefox OBJECT mChannel Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1032</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-158/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0065.]]></description>
      <pubDate>Tue, 10 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-157: Mozilla Firefox nsTreeRange Dangling Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1084</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-157/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-0073.]]></description>
      <pubDate>Mon, 09 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-156: Sybase M-Business Anywhere agd.exe username Parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1089</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-156/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase M-Business Anywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 09 May 2011 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-11-155: Sybase M-Business Anywhere Server agd.exe encodeUsername Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-942</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-11-155/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sybase MBusiness Anywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 09 May 2011 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
