<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Sun, 17 May 2026 22:39:03 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-12-203: Honeywell HMIWeb Browser ActiveX Control RequestDSPLoad Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1437</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-203/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell HMIWeb. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2054.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-202:  Oracle Outside In WordPerfect File Processing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1480</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-202/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable products utilizing the Oracle Outside In technology. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-201: Microsoft Office Word PAPX Section Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1281</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-201/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0182.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-200: Microsoft Internet Explorer 9 CTreeNode Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1569</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-200/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2548.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-199: Microsoft Internet Explorer execCommand Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1586</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-199/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-4969.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-198: Microsoft Internet Explorer CMarkup outerText Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1574</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-198/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2557.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-197: Oracle Java java.beans.Statement Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1590</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-197/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-1682.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-196: Novell Groupwise GWIA ber_get_stringa Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1347</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-196/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0417.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-195: RealNetworks RealPlayer ATRAC Sample Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1322</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-195/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0928.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-194: Microsoft Internet Explorer OnBeforeDeactivate Event Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1523</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-194/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1878.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-193: Microsoft Internet Explorer insertAdjacentText Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1524</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-193/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1879.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-192: Microsoft Internet Explorer insertRow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1525</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-192/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1880.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-191: Webkit HTMLMedia Element beforeLoad Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1528</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-191/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3071.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-190: Microsoft Internet Explorer Title Element Change Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-1520</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-190/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1877.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-189: Oracle Java WebStart Changing System Properties Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1501</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-189/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-1721.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-188: Microsoft Internet Explorer OnRowsInserted Event Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1526</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-188/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1881.]]></description>
      <pubDate>Fri, 21 Dec 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-187: RealNetworks RealPlayer RV20 Frame Size Array Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1350</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-187/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0923.]]></description>
      <pubDate>Mon, 19 Nov 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-186: Microsoft Office 2007 RTF Mismatch Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1402</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-186/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0183.]]></description>
      <pubDate>Thu, 15 Nov 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-185: Apple Mac OS X  DirectoryService SwapProxyMessage Unchecked objOffset Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1385</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-185/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0650.]]></description>
      <pubDate>Thu, 15 Nov 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-184: Microsoft Excel Feature11/Feature12 Record Trusted Counter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1373</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-184/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2543.]]></description>
      <pubDate>Thu, 15 Nov 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-183: RealNetworks RealPlayer RV40 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1191</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-183/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-0925.]]></description>
      <pubDate>Thu, 15 Nov 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-182: EMC AppXtender WxSuperCtrl650.ocx ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1529</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-182/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC ApplicationXtender. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2289.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-181: Novell iPrint nipplib.dll client-file-name Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1466</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-181/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-4186.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-180: Novell ZENWorks AdminStudio ISGrid.dll ActiveX Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1434</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-180/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Admin Studio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-179: EMC ApplicationXtender Desktop Viewer AEXView ActiveX AnnoSave Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1493</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-179/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC ApplicationXtender. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2289.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-178: (0Day) HP SiteScope SOAP Call update Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1472</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-178/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP SiteScope. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-177: (0Day) HP SiteScope SOAP Call loadFileContent Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1465</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-177/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP SiteScope. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-176: (0Day) HP SiteScope SOAP Call getFileInternal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1464</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-176/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP SiteScope. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-175: (0Day) HP SiteScope SOAP Call create Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1463</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-175/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP SiteScope. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-174: (0Day) HP SiteScope UploadFilesHandler Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1462</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-174/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP SiteScope. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-173: (0Day) HP SiteScope SOAP Call getSiteScopeConfiguration Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1461</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-173/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP SiteScope. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-172: (0Day) HP Operations Orchestration RSScheduler Service JDBC Connector Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1456</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-172/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Operations Orchestration. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-171: (0Day) HP Intelligent Management Center UAM sprintf Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1348</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-171/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-170: (0Day)  HP Application Lifecycle Management XGO.ocx ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1327</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-170/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Application Lifecycle Management. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-169: GE Proficy Historian KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1491</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-169/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy Historian. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2516.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-168: InduSoft Thin Client ISSymbol InternationalSeparator Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1342</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-168/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Indusoft Thin Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0340.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-167: (0Day) Novell File Reporter NFRAgent.exe VOL Tag Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1318</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-167/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell File Reporter Agent. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 29 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-166: (0Day) HP LeftHand Virtual SAN Appliance Unauthenticated Access Remote Command Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1467</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-166/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LeftHand Virtual SAN Appliance. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-165: (0Day) HP Operations Agent for NonStop Server HEALTH Packet Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1391</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-165/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Operations Agent for NonStop Server. User interaction is required to exploit this vulnerability in that the target must check the status of an existing node on the network. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-164: (0Day) HP Intelligent Management Center img.exe Integer Wrap Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1389</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-164/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-163: (0Day) HP iNode Management Center iNodeMngChecker.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1358</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-163/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-162: (0Day) HP Diagnostics Server magentservice.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1287</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-162/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Diagnostics Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-161: EMC AutoStart ftAgent Opcode 0x2d Subcode 0x1194 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1487</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-161/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the EMC Autostart ftAgent, which is deployed on machines managed by EMC Autostart by default. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-160: EMC AutoStart ftAgent Opcode 0x14 Subcode 0x7F8 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1486</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-160/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the EMC Autostart ftAgent, which is deployed on machines managed by EMC Autostart by default. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-159:  EMC AutoStart ftAgent Opcode 0x14 Subcode 0x7e7 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1488</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-159/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the EMC Autostart ftAgent, which is deployed on machines managed by EMC Autostart by default. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-158: Microsoft Internet Explorer MSADO CacheSize Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1521</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-158/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1891.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-157: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1374</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-157/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1847.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-156: Cisco AnyConnect VPN Client Arbitrary Program Instantiation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1411</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-156/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco AnyConnect VPN Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-2493.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-155: InduSoft Thin Client ISSymbol InternationalOrder Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1341</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-155/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Indusoft Thin Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-0340.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-154: IBM Lotus Notes URL Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1343</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-154/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Notes. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2174.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-153: Apple QuickTime sean Atom Size Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1495</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-153/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0670.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-152:  Oracle Outside In Excel MergeCells Record Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1483</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-152/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of applications that utilize Oracle&#x27;s Outside In Technology. User interaction is required to exploit this vulnerability in that the target must visit open a malicious file. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-151: Oracle Outside In Excel File TxO Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1482</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-151/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of products utilizing Oracle&#x27;s Outside In Technology. User interaction is required to exploit this vulnerability in that the target must open a malicious file. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-150: Oracle Outside In XPM Processing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1481</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-150/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable products utilizing the Oracle Outside In Technology. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-149: Cisco AnyConnect VPN Client Verification Bypass Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1412</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-149/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco AnyConnect VPN Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-2494.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-148: GE Proficy Real-Time Information Portal Remote Interface Service Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1419</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-148/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy Real-Time Information Portal. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.4. The following CVEs are assigned: CVE-2012-0232.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-147: WebKit ContentEditable swapInNode Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1416</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-147/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the WebKit library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3897.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-146: Novell eDirectory RelativeToFullDN Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-146/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-145: Symantec Endpoint Protection SemSvc.exe AgentServlet Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1357</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-145/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Endpoint Protection. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0289.]]></description>
      <pubDate>Wed, 22 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-144:  EMC AutoStart ftAgent Opcode 0x4B Subcode 0x1D4C Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1485</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-144/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the EMC Autostart ftAgent, which is deployed on machines managed by EMC Autostart by default. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-143: Microsoft Visio DWGDP MTEXT Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1531</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-143/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1888.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-142: Oracle Java WebStart Browser Argument Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1502</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-142/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-1713.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-141: Microsoft .NET Framework Clipboard Unsafe Memory Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1469</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-141/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the .NET Framework. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1855.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-140: McAfee SmartFilter Administration Server SFAdminSrv.exe JBoss RMI Remote Code Execution Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1406</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-140/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee SmartFilter Administration Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-139: SAP Crystal Reports crystalras.exe OBUnmarshal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1441</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-139/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-138: SAP Business Objects Financial Consolidation CtAppReg.dll username Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1430</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-138/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Business Objects Financial Consolidation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-137: Apple Mac OS X libsecurity_cdsa_plugin Malloc Integer Truncation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1386</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-137/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0662.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-136: Apple QuickTime Invalid Public Movie Atom Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-136/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s QuickTime player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3220.]]></description>
      <pubDate>Fri, 17 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-135: Apple QuickTime JPEG2k Sample Size Atom Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1459</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-135/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0661.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-134: IBM Lotus Quickr QP2 ActiveX _Times Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1455</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-134/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Quickr. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2176.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-133: GE Proficy Historian ihDataArchiver.exe Multiple Opcode Parsing Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1377</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-133/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE iFix. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0229.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-132: IBM Lotus iNotes dwa85W ActiveX Attachment_Times Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1439</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-132/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus iNotes. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-2175.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-131: Microsoft .NET Framework Undersized Glyph Buffer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1432</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-131/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the .NET Framework. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0162.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-130: Apple QuickTime Player MP4A Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1382</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-130/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3458.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-129: Microsoft Windows TrueType Font Parsing Remote Code Execution Vulnerability (Remote Kernel)]]></title>
      <guid isPermaLink="false">ZDI-CAN-1338</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-129/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code from the contact of kernelspace on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0159.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-128: Mozilla Firefox nsHTMLSelectElement Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1301</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-128/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3671.]]></description>
      <pubDate>Fri, 03 Aug 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-127: (0Day) HP StorageWorks File Migration Agent RsaFTP.dll Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1190</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-127/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 18 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-126: (0Day) HP StorageWorks File Migration Agent RsaCIFS.dll Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1189</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-126/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 18 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-125: Apple Quicktime QTPlugin SetLanguage Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1398</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-125/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0666.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-124: EMC AutoStart ftAgent Opcode 50 Subcode 42 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1450</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-124/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-123: EMC AutoStart ftAgent Opcode 50 Subcode 60 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1449</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-123/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-122: EMC AutoStart ftAgent Opcode 65 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1448</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-122/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-121: EMC AutoStart ftAgent Opcode 85 Subcode 01 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1447</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-121/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-120:  EMC AutoStart ftAgent Opcode 85 Subcode 22 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1446</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-120/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-119: EMC AutoStart ftAgent Opcode 0x41 Subcode 0x00 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1445</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-119/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-118: EMC AutoStart ftAgent Opcode 0x03 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1444</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-118/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-117:  EMC AutoStart ftAgent Opcode 50 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1443</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-117/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-116: EMC AutoStart ftAgent Opcode 50 Subcode 04 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1442</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-116/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Autostart. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0409.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-115: HP OpenView Performance Agent coda.exe Opcode 0x8C Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1326</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-115/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP OpenView Performance Agent. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-2020.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-114: HP OpenView Performance Agent coda.exe Opcode 0x34 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1325</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-114/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP OpenView Performance Agent. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-2019.]]></description>
      <pubDate>Thu, 12 Jul 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-113: IBM Rational ClearQuest CQOle ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1249</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-113/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational ClearQuest. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0708.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-112: SAP Netweaver ABAP msg_server.exe Parameter Name Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1396</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-112/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP NetWeaver ABAP. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-111: SAP Netweaver ABAP msg_server.exe Opcode 0x43 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1394</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-111/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Netweaver ABAP. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-110: Mozilla Firefox AttributeChildRemoved Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1413</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-110/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3659.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-109: Apple Quicktime TeXML Karaoke Element Parsing Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-1367</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-109/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0663.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-108: Apple Quicktime TeXML sampleData Element Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1365</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-108/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0663.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-107: Apple Quicktime TeXML Style Element Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1364</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-107/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0663.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-106: Avaya IP Office Customer Call Reporter ImageUpload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1355</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-106/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Avaya IP Office Customer Call Reporter. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.7. The following CVEs are assigned: CVE-2012-3811.]]></description>
      <pubDate>Thu, 28 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-105: Apple QuickTime Text Track Descriptor Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1408</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-105/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0664.]]></description>
      <pubDate>Wed, 27 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-104: SAP Netweaver ABAP msg_server.exe Parameter Value Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1395</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-104/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP NetWeaver ABAP. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 27 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-103: Apple Quicktime Dataref URI Buffer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1369</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-103/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3459.]]></description>
      <pubDate>Wed, 27 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-102: Novell iPrint Client nipplib.dll GetDriverSettings realm Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1345</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-102/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required in that a target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4187.]]></description>
      <pubDate>Wed, 27 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-101: IBM Cognos tm1admsd.exe Multiple Operations Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1418</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-101/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Cognos. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0202.]]></description>
      <pubDate>Wed, 27 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-100: HP OpenView Performance Manager PMParamHandler Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1340</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-100/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP OpenView Performance Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0127.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-099: DataDirect OpenAccess oaagent.exe GIOP Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1263</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-099/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of DataDirect SequeLink. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4165.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-098: AOL Products dnUpdater ActiveX Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1421</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-098/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of America Online&#x27;s Toolbar, Desktop, IM, and winamp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-097: HP Data Protector Express Opcode 0x320 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1392</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-097/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Express. Authentication is not required to exploit this vulnerability. User interaction is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0121.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-096: HP Data Protector Express Opcode 0x330 Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1393</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-096/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector Express. Authentication is not required to exploit this vulnerability. User interaction is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0122.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-095: Apple Quicktime TeXML transform Attribute Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1363</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-095/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0663.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-094: RealNetworks Helix Server rn5auth Credential Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1428</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-094/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Real Helix Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0942.]]></description>
      <pubDate>Thu, 21 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-093: (Pwn2Own) Microsoft Internet Explorer Fixed Table Colspan Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1547</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-093/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-1876.]]></description>
      <pubDate>Tue, 12 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-092: RealNetworks RealPlayer QCELP Stream Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1313</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-092/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4247.]]></description>
      <pubDate>Fri, 08 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-091: Symantec Web Gateway upload_file Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1436</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-091/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0299.]]></description>
      <pubDate>Fri, 08 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-090: Symantec Web Gateway Shell Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1435</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-090/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Web Gateway. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0297.]]></description>
      <pubDate>Fri, 08 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-089: HP DataDirect OpenAccess GIOP Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1214</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-089/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable applications using DataDirect&#x27;s SequeLink. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-4164.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-088: HP DataDirect OpenAccess GIOP Opcode 0x0E Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1213</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-088/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP DataDirect SequeLink. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-4163.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-087: RealNetworks RealPlayer raac.dll stsz Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1352</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-087/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4260.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-086: RealNetworks RealPlayer rvrender RMFF Flags Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1361</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-086/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0922.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-085: RealNetworks RealPlayer dmp4 esds Width Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1360</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-085/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4261.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-084: RealNetworks RealPlayer RV10 Encoded Height/Width Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1293</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-084/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-0926.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-083: Oracle Java OpenAL Library Pointer Manipulation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1476</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-083/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-082: Oracle Java OpenGL Arbitrary Native Library Loading Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1475</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-082/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-081: Oracle Java GlueGen Arbitrary Native Library Loading Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1474</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-081/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-080: Adobe Flash Player MP4 Stream Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1470</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-080/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0754.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-079: Apple QuickTime H264 Picture Width Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1460</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-079/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0665.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-078: Apple QuickTime SVQ3 Codec mb_skip_run Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1440</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-078/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0669.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-077: Apple QuickTime QTVR QTVRStringAtom Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1422</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-077/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0667.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-076: Apple QuickTime MPEG Stream Padding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1376</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-076/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple&#x27;s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0659.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-075: Apple QuickTime RLE Sample Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1370</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-075/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0668.]]></description>
      <pubDate>Wed, 06 Jun 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-074: Oracle Forms Recognition CroScPlt.dll ActiveX Control Remote Code Execution Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1399</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-074/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle WebCenter Forms Recognition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Thu, 19 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-073: Oracle WebCenter Forms Recognition Sssplt30.ocx ActiveX Control Remote Code Execution Vulnerabilty]]></title>
      <guid isPermaLink="false">ZDI-CAN-1356</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-073/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle WebCenter Forms Recognition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Thu, 19 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-072: Samba ReportEventW Heap Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1530</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-072/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-071: Samba ndr_ValidatePassword heap overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1505</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-071/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-070: Samba lsa_LookupNames Heap Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1506</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-070/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-069: Samba SetInfoPolicy AuditEventsInfo Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1504</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-069/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-068: Samba GetAliasMembership SidArray Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1503</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-068/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-067: WebKit.org Webkit Array.Splice Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1484</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-067/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WebKit.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0592.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-066: Internet Explorer CTagFactory Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1479</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-066/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-065: Microsoft Internet Explorer selectAll Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1471</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-065/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-064: Samba NDR PULL DFS EnumArray1 Heap Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1539</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-064/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-063: Samba NDR PULL SVCCTL StartServiceW Heap Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1537</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-063/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-062: Samba NDR PULL LSA TrustDomainInfoControllers Heap Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1538</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-062/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-061: Samba ndr_pull_dfs_Info3 Heap Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1540</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-061/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-1182.]]></description>
      <pubDate>Wed, 18 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-060: Oracle Java Runtime readMabCurveData nTblSize Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1496</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-060/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0498.]]></description>
      <pubDate>Mon, 09 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-059:  Mozilla Firefox Ogg Vorbis Decoding Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1477</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-059/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0444.]]></description>
      <pubDate>Mon, 09 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-058: Apple Quicktime PNG Depth Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1372</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-058/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AppleQuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3460.]]></description>
      <pubDate>Mon, 09 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-057: (Pwn2Own) Adobe Flash Player NetStream addBytes Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1548</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-057/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player.  The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 09 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-056: Mozilla Firefox nsSVGValue Out-of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1414</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-056/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3658.]]></description>
      <pubDate>Mon, 09 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-055: Webkit.org Webkit copyNonAttributeProperties Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1415</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-055/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WebKit.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3928.]]></description>
      <pubDate>Mon, 09 Apr 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-054: Webkit fontface Invalid Font Family Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1283</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-054/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-2825.]]></description>
      <pubDate>Mon, 26 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-053: RealNetworks RealPlayer RV30 Sample Arbitrary Index Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1284</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-053/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4249.]]></description>
      <pubDate>Mon, 26 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-052: FlexNet License Server Manager lmgrd Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1192</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-052/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of FlexNet License Server Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 26 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-051: RealNetworks RealPlayer RTSP SETUP Request Remote Code Execution Vulnerability  ]]></title>
      <guid isPermaLink="false">ZDI-CAN-1286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-051/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4254.]]></description>
      <pubDate>Thu, 22 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-050: RealNetworks RealPlayer mp4fformat rdrf Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1319</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-050/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Realplayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4262.]]></description>
      <pubDate>Thu, 22 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-049: RealNetworks RealPlayer RealAudio coded_frame_size Remote Code Execution]]></title>
      <guid isPermaLink="false">ZDI-CAN-1359</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-049/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-0927.]]></description>
      <pubDate>Thu, 22 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-048: RealNetworks RealPlayer VIDOBJ_START_CODE Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1368</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-048/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required in that a target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-0924.]]></description>
      <pubDate>Thu, 22 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-047: Adobe Flash ASconstructor Function Call Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1362</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-047/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-0754.]]></description>
      <pubDate>Thu, 22 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-046: RealNetworks RealPlayer Cook Codec Channel Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1276</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-046/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4257.]]></description>
      <pubDate>Tue, 20 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-045: Oracle Java JOGL NEWT Reflection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1490</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-045/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Tue, 20 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-044: Microsoft Remote Desktop Protocol Channel Abort Condition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1320</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-044/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft&#x27;s Remote Desktop Protocol. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0002.]]></description>
      <pubDate>Thu, 15 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-043: LibTIFF TileSize Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1221</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-043/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LibTIFF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-1173.]]></description>
      <pubDate>Tue, 13 Mar 2012 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-041: Adobe Shockwave iml32.dll DEMX Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1247</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-041/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-2113.]]></description>
      <pubDate>Thu, 01 Mar 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-040: IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1 Multiple Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1328</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-040/</link>
      <description><![CDATA[IBM Tivoli Provisioning Manager soapServlet SOAP Message Printer.getPrinterAgentKey SQL Injection Vulnerability The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0198, CVE-2012-0199.]]></description>
      <pubDate>Thu, 01 Mar 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-039: Oracle Java Web Start java-vm-args Command Argument Injection Remote Code Execution]]></title>
      <guid isPermaLink="false">ZDI-CAN-1410</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-039/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-038: Oracle Java JavaFX Arbitrary Argument Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1453</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-038/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-037: Oracle Java Web Start JNLP Double Quote Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1407</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-037/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java Webstart. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-036: Microsoft Internet Explorer  VML CDispScroller Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1457</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-036/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0155.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-035: Microsoft Internet Explorer CDispNode t:MEDIA Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1299</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-035/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required in that a target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2012-0011.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-034: Microsoft Windows Media Player ASX Meta-File Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1400</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-034/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0150.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-033: ABB WebWare RobNetScanHost.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1260</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-033/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ABB WebWare. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-032: Oracle Java Runtime Environment readMabCurveData Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1353</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-032/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle&#x27;s Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 22 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-031: Novell iPrint Server attributes-natural-language Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1354</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-031/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4194.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-030: IBM Rational Rhapsody BBFlashBack.Recorder.1 TestCompatibilityRecordMode Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1246</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-030/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational Rhapsody. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1388.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-029: IBM Rational Rhapsody BBFlashBack.Recorder.1 InsertMarker Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1245</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-029/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational Rhapsody. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1391.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-028: IBM Rational Rhapsody BBFlashBack.FBRecorder.1 Control Multiple Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1288</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-028/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational Rhapsody. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-1392.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-027: IBM SPSS VsVIEW6.ocx ActiveX Control SaveDoc Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1307</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-027/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0189.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-026: IBM SPSS ExportHTML.dll ActiveX Control Render Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1298</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-026/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0190.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-025: EMC Networker indexd.exe Opcode 0x01 Parsing Remote Code Execution]]></title>
      <guid isPermaLink="false">ZDI-CAN-1451</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-025/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Networker. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2012-0395.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-024: Total Defense Suite UNC Management Web Service uncsp_ViewReportsHomepage SQL Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1180</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-024/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-023: Total Defense Suite UNC Management Web Service Database Credentials Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1123</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-023/</link>
      <description><![CDATA[This vulnerability allows attackers to remotely obtain domain credentials on vulnerable installations of CA Total Defense Suite UNC Management Web Service. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-022: Total Defense Suite UNC Management Console ExportReport SQL Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1121</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-022/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CA Total Defense Suite. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-021: Adobe Reader BMP Resource Signedness Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1426</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-021/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-4373.]]></description>
      <pubDate>Wed, 08 Feb 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-020: IBM SPSS VsVIEW6.ocx ActiveX Control Multiple Methods Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1297</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-020/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0189.]]></description>
      <pubDate>Mon, 30 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-019: IBM SPSS mraboutb.dll ActiveX Control SetLicenseInfoEx Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1295</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-019/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2012-0188.]]></description>
      <pubDate>Mon, 30 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-018: Symantec PCAnywhere awhost32 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1273</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-018/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec PCAnywhere. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.7. The following CVEs are assigned: CVE-2011-3478.]]></description>
      <pubDate>Wed, 25 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-017: Oracle Outside In OOXML Relationship Tag Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1306</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-017/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Outside In. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.7.]]></description>
      <pubDate>Fri, 20 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-016: (0Day) HP Diagnostics Server magentservice.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1259</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-016/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Diagnostics server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-4789.]]></description>
      <pubDate>Thu, 12 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-015: (0Day) HP StorageWorks P2000 G3 Directory Traversal and Default Account Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-1243</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-015/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP MSA 2000 G3. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4788.]]></description>
      <pubDate>Thu, 12 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-014: HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1117</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-014/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Easy Printer Care. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4787.]]></description>
      <pubDate>Thu, 12 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-013: HP Easy Printer Care XMLCacheMgr Class ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1093</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-013/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Easy Printer Care. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2011-4786.]]></description>
      <pubDate>Thu, 12 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-012: (0Day) McAfee SaaS myCIOScn.dll ShowReport Method Remote Command Execution]]></title>
      <guid isPermaLink="false">ZDI-CAN-1094</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-012/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee Security-as-a-Service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Thu, 12 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-011: Novell Netware XNFS caller_name xdrDecodeString Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1206</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-011/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 10 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-010: Citrix Provisioning Services Stream Service 0x40020006 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1290</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-010/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Citrix Provisioning Services. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 10 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-009: Citrix Provisioning Services Stream Service 0x40020000 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1291</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-009/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Citrix Provisioning Services. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 10 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-008: Citrix Provisioning Services streamprocess.exe vDisk Name Parsing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1188</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-008/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Citrix Provisioning Services. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 10 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-007: Novell Netware XNFS.NLM STAT Notify Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1269</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-007/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 05 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-006: Novell Netware XNFS.NLM NFS Rename Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1268</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-006/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Netware. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 05 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-005: Apple Quicktime RLE BGRA Decoding Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1378</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-005/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3248.]]></description>
      <pubDate>Thu, 05 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-004: Apple Quicktime JPEG2000 COD Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-004/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2011-3250.]]></description>
      <pubDate>Thu, 05 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-12-003: HP OpenView NNM webappmon.exe parameter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1209</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-12-003/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2011-3166.]]></description>
      <pubDate>Thu, 05 Jan 2012 00:00:00 -0600</pubDate>
    </item>
    
  </channel>
</rss>
