<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Fri, 08 May 2026 11:16:15 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-14-430: Microsoft Internet Explorer RtfToForeign32 Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2811</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-430/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6374.]]></description>
      <pubDate>Fri, 18 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-429: (0Day) Agilent Technologies 2100 Expert CSDispatcher.exe Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2279</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-429/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Agilent Technologies 2100 Expert. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-5145.]]></description>
      <pubDate>Mon, 05 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-428: (0Day) SolarWinds Server and Application Monitor Alert Manager Elevation of Privilege Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2517</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-428/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of SolarWinds Server and Application Monitor. This vulnerability requires the attacker to have an unprivileged account on the system. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Mon, 05 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-427: Mozilla Firefox DirectionalityUtils Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2531</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-427/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1581.]]></description>
      <pubDate>Mon, 23 Feb 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-426: AlienVault Unified Security Management cloneid SQL Injection and Scanner Binary Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2049</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-426/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault Unified Security Management. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.9.]]></description>
      <pubDate>Mon, 23 Feb 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-425: Trihedral VTScada Integer Overflow Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2599</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-425/</link>
      <description><![CDATA[This vulnerability allows remote attackers to cause a denial of service to vulnerable installations of Trihedral VTScada. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-9192.]]></description>
      <pubDate>Fri, 12 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-424: Honeywell OPOS Suite HWOPOSScale.ocx Open Method Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2527</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-424/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell OPOS Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-8269.]]></description>
      <pubDate>Thu, 11 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-423: Honeywell OPOS Suite HWOPOSSCANNER.ocx Open Method Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2528</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-423/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell OPOS Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-8269.]]></description>
      <pubDate>Thu, 11 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-422: ManageEngine NetFlow Analyzer CollectorConfInfoServlet COLLECTOR_ID Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2462</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-422/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ManageEngine NetFlow Analyzer. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-9373.]]></description>
      <pubDate>Thu, 11 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-421: ManageEngine Password Manager Pro UploadAccountActivities filename Directory Traversal Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2473</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-421/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of ManageEngine Password Manager Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2014-9372.]]></description>
      <pubDate>Thu, 11 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-420: ManageEngine Desktop Central MSP NativeAppServlet UDID JSON Object Code Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2445</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-420/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ManageEngine Desktop Central MSP. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-9371.]]></description>
      <pubDate>Thu, 11 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-419: BMC Track-It! Web Account Credential Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2581</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-419/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BMC Track-It!. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2014-8270.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-418: BitTorrent Web Interface Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2352</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-418/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BitTorent. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-8515.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-417: Adobe Flash Player parseFloat Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2552</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-417/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-9163.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-416: Adobe Flash Player Regular Expression Object Out-Of-Bound Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2588</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-416/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose arbitrary memory on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-9162.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-415: SAP SQL Anywhere .NET Data Provider Malformed Integer Stack Buffer Overflow Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2349</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-415/</link>
      <description><![CDATA[This allows attackers to execute arbitrary code on applications which pass user provided data to the vulnerable API in SAP SQL Anywhere. The ZDI has assigned a CVSS rating of 9.5. The following CVEs are assigned: CVE-2014-9264.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-414: SAP SQL Anywhere .NET Data Provider REPLICATE Function Heap Overflow Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2351</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-414/</link>
      <description><![CDATA[This allows attackers to execute arbitrary code on applications which pass user provided data to the vulnerable API in SAP SQL Anywhere. The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2014-9264.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-413: SAP SQL Anywhere .NET Data Provider SPACE Function Heap Overflow Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2350</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-413/</link>
      <description><![CDATA[This allows attackers to execute arbitrary code on applications which pass user provided data to the vulnerable API in SAP SQL Anywhere. The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2014-9264.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-412: SAP SQL Anywhere .NET Data Provider Column Alias Stack Buffer Overflow Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2348</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-412/</link>
      <description><![CDATA[This allows attackers to execute arbitrary code on applications which pass user provided data to the vulnerable API in SAP SQL Anywhere. The ZDI has assigned a CVSS rating of 9.5. The following CVEs are assigned: CVE-2014-9264.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-411: Lexmark MarkVision Enterprise ReportDownloadServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2438</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-411/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Lexmark MarkVision Enterprise. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-8742.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-410: Lexmark MarkVision Enterprise GfdFileUploadServlet Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2437</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-410/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Lexmark MarkVision Enterprise. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-8741.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-409: Microsoft Internet Explorer CInputElement Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2536</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-409/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-8966.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-408: Microsoft Internet Explorer CTreePos Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2522</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-408/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6329.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-407: Microsoft Internet Explorer CSetTimeoutInfo Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2521</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-407/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6327.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-406: Microsoft Internet Explorer LineBoxBuilder::FindWord Out-Of-Bounds Memory Access Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2520</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-406/</link>
      <description><![CDATA[This vulnerability consists of potentially hazardous use of memory on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2014-6376.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-405: Microsoft Internet Explorer Insert Command Use-After-Free Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-2503</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-405/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6375.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-404: Microsoft Internet Explorer RtfToForeign32 Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2498</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-404/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6374.]]></description>
      <pubDate>Tue, 09 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-403: (0Day) Microsoft Internet Explorer display:run-in Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2365</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-403/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-8967.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-402: Autodesk Design Review AdView.AdViewer.1 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2197</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-402/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9268.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-401: Samsung SmartViewer CNC_Ctrl ActiveX Control BackupToAvi Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2355</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-401/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung SmartViewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9265.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-400: Samsung SmartViewer STWConfig ActiveX Control Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2413</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-400/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung SmartViewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-9266.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-399: PTC IsoView ActiveX Control ViewPort Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2190</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-399/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the PTC IsoView ActiveX control. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9267.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-398: PTC IsoView Activex Control Multiple Animation Methods Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2189</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-398/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the PTC IsoView ActiveX control. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9267.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-397: (0Day) 3S Pocketnet Tech VMS PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 GetONVIFDeviceInformation/GetONVIFProfiles/GetONVIFStreamUri Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-397/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of 3S Pocketnet Tech VMS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9263.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-396: (0Day) 3S Pocketnet Tech VMS PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 SetDisplayText Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2408</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-396/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of 3S Pocketnet Tech VMS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9263.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-395: (0Day) 3S Pocketnet Tech VMS PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 SaveCurrentImageEx Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2407</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-395/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of 3S Pocketnet Tech VMS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9263.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-394: (0Day) 3S Pocketnet Tech VMS PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 SaveCurrentImage Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2406</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-394/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of 3S Pocketnet Tech VMS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9263.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-393: (0Day) 3S Pocketnet Tech VMS PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 StartRecord/StartRecordEx/StartScheuledRecord Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2405</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-393/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of 3S Pocketnet Tech VMS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-9263.]]></description>
      <pubDate>Thu, 04 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-392: Cisco OpenH264 Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2415</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-392/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on applications using vulnerable versions of Cisco OpenH264. The ZDI has assigned a CVSS rating of 9.5. The following CVEs are assigned: CVE-2014-8002.]]></description>
      <pubDate>Wed, 03 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-391: Cisco OpenH264 Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2414</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-391/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on applications using vulnerable versions of Cisco OpenH264.  The ZDI has assigned a CVSS rating of 9.5. The following CVEs are assigned: CVE-2014-8001.]]></description>
      <pubDate>Wed, 03 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-390: (Pwn2Own) Apple OS X WindowsServer Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2222</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-390/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.6. The following CVEs are assigned: CVE-2014-1314.]]></description>
      <pubDate>Tue, 02 Dec 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-389: ARRIS VAP2500 Management Portal Remote Command Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2137</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-389/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-8423.]]></description>
      <pubDate>Tue, 25 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-388: ARRIS VAP2500 Management Portal Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2136</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-388/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-8424.]]></description>
      <pubDate>Tue, 25 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-387: ARRIS VAP2500 Management Portal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2135</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-387/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-8425.]]></description>
      <pubDate>Tue, 25 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-386: ManageEngine OpUtils ConfigSaveServlet saveFile Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2428</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-386/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose files on vulnerable installations of ManageEngine OpUtils. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-8678.]]></description>
      <pubDate>Fri, 21 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-385: Dell Sonicwall GMS Virtual Appliance Multiple Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-2286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-385/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Dell SonicWALL Global Management System (GMS) virtual appliance. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2014-8420.]]></description>
      <pubDate>Fri, 21 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-384: Rockwell Automation Connected Components Workbench RA.ViewElements.Row.1 Arbitrary Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2418</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-384/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rockwell Automation Connected Components Workbench. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-5424.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-383: Rockwell Automation Connected Components Workbench RA.ViewElements.Grid.1 Arbitrary Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2417</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-383/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rockwell Automation Connected Components Workbench. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-5424.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-382: Oracle Java jp2launcher.exe Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2535</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-382/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.6. The following CVEs are assigned: CVE-2014-6466.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-381: Microsoft Internet Explorer CSS Quotes Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2544</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-381/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6351.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-380: Microsoft Internet Explorer CHeaderElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2482</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-380/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6348.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-379: Microsoft Internet Explorer GetReplacedUrlImgCtxCookie Out-of-bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2436</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-379/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6344.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-378: Microsoft Internet Explorer CElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2410</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-378/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6343.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-377: Microsoft Internet Explorer CPtsTextParaclient::GetApeCorners Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2474</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-377/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6342.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-376: Microsoft Internet Explorer CStyleSheet::get_parentStyleSheet Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2433</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-376/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6341.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-375: Microsoft Internet Explorer CSecurityContext Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2404</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-375/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4143.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-374: Microsoft Internet Explorer DOMStringMap Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2399</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-374/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-6347.]]></description>
      <pubDate>Wed, 19 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-373: Trend Micro InterScan Web Security Virtual Appliance Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2369</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-373/</link>
      <description><![CDATA[This vulnerability allows remote attackers to read files from the underlying operating system on vulnerable installations of Trend Micro InterScan Web Security Virtual Appliance web application authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2014-8510.]]></description>
      <pubDate>Thu, 06 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-372: (0Day) Visual Mining NetCharts Server File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2183</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-372/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Visual Mining NetCharts Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-8516.]]></description>
      <pubDate>Mon, 03 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-371: (0Day) Denon AVR-3313CI &#x27;Friendlyname&#x27; Persistent Cross-Site Scripting Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2333</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-371/</link>
      <description><![CDATA[This vulnerability allows remote attackers to insert persistent JavaScript on vulnerable installations of the Denon AVR-3313CI audio/video receiver&#x27;s web portal.  Authentication is not required to persist the attack. However, user interaction is required to exploit this vulnerability in that the target must visit a malicious page. The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2014-8508.]]></description>
      <pubDate>Mon, 03 Nov 2014 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-370: BitTorrent Bootstrap Improper Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2494</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-370/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BitTorrent Bootstrap. User interaction is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-8509.]]></description>
      <pubDate>Wed, 29 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-369: Ecava IntegraXor Guest Acccount Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2310</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-369/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ecava IntegraXor. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0786.]]></description>
      <pubDate>Fri, 24 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-368: Apple OS X GateKeeper Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1923</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-368/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.6. The following CVEs are assigned: CVE-2014-4391.]]></description>
      <pubDate>Fri, 24 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-367: Microsoft Internet Explorer CAnchorElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2306</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-367/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1803.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-366: Microsoft Internet Explorer CDOMEvent Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2324</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-366/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1799.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-365: Adobe Flash Player casi32 Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2518</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-365/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-0569.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-364: Panasonic Network Camera View GetImageDataPrint Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2357</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-364/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Panasonic Network Camera View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-8755.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-363: Panasonic Network Camera Recorder NcrCtl4.NcrNet.1 GetVOLHeader Arbitrary Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2171</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-363/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Panasonic Network Camera Recorder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-8756.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-362: Foxit ActiveX Pro SDK SetLogFile Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2490</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-362/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Foxit ActiveX Pro SDK ActiveX control. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-8074.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-361: Hewlett-Packard Sprinter TTF16.ocx AttachToSS Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2336</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-361/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Sprinter. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2636.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-360: Hewlett-Packard Sprinter TTF16.ocx CopyRange/CopyRangeEx Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2342</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-360/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Sprinter. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2637.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-359: Hewlett-Packard Sprinter TTF16.ocx DefaultFontName Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2344</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-359/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Sprinter. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2638.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-358: Hewlett-Packard Sprinter TTF16.ocx SwapTables Method Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2343</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-358/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Sprinter. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2635.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-357: Microsoft Internet Explorer CTreePos Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2280</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-357/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1769.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-356: Microsoft Internet Explorer CElement::DelMarkupPtr Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2388</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-356/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4145.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-355: Microsoft Internet Explorer CTableCell Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2398</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-355/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4092.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-354: Microsoft Internet Explorer CMarkup Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2359</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-354/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1799.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-353: Microsoft Internet Explorer Title attribute Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2377</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-353/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4130.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-352: Microsoft Internet Explorer ConvertBitmaptoPng Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2382</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-352/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. In addition, the user must allow the web page to access the clipboard when so prompted. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2014-4138.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-351: Microsoft Internet Explorer CAttrValue Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2397</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-351/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4141.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-350: Microsoft Word Style Tag  Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2484</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-350/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4117.]]></description>
      <pubDate>Tue, 14 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-349: (0Day) Microsoft Internet Explorer ScriptEngine Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2387</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-349/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Thu, 02 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-348: (0Day) GoPro HERO 3+ gpExec restart Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2168</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-348/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GoPro HERO 3+. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-6434.]]></description>
      <pubDate>Thu, 02 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-347: (0Day) GoPro HERO 3+ gpExec start Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2162</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-347/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GoPro HERO 3+. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-6433.]]></description>
      <pubDate>Thu, 02 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-346: (0Day) Apple OS X IOHIDSecurePromptClient Denial Of Service Vulnerability  ]]></title>
      <guid isPermaLink="false">ZDI-CAN-2147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-346/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.7.]]></description>
      <pubDate>Thu, 02 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-345: (0Day) Hewlett-Packard Data Protector omnidlc Buffer Overflow Remote Code Execution Vulnerabililty]]></title>
      <guid isPermaLink="false">ZDI-CAN-2200</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-345/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.1.]]></description>
      <pubDate>Thu, 02 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-344: (0Day) Hewlett-Packard Data Protector EXEC_INTEGUTIL Remote Command Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2266</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-344/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 02 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-343: Hewlett-Packard Network Node Manager ovopi.dll Command 685 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2373</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-343/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-342: Hewlett-Packard Network Node Manager ovopi.dll Option -D Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2179</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-342/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-341: Hewlett-Packard Network Node Manager ovopi.dll Option -T Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2178</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-341/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-340: Hewlett-Packard Network Node Manager ovopi.dll Option -L Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2177</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-340/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-339: Hewlett-Packard Network Node Manager ovopi.dll Option -D Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-339/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-338: Hewlett-Packard Network Node Manager ovopi.dll Option -T Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2175</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-338/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-337: Hewlett-Packard Network Node Manager ovopi.dll Option -L Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2174</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-337/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-336: Hewlett-Packard Network Node Manager ovopi.dll Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2173</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-336/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-335: Hewlett-Packard Network Node Manager ovopi.dll Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2078</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-335/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard	Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-334: Sophos Cyberoam diagnose Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2332</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-334/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2014-5501.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-333: Sophos Cyberoam sslvpn_liveuser_delete Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2327</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-333/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2014-5502.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-332: Sophos Cyberoam webclient_portal_settings Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2328</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-332/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2014-5502.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-331: Sophos Cyberoam checkcert_key Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2329</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-331/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2014-5502.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-330: Microsoft Internet Explorer Layout Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2185</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-330/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4112.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-329: Sophos Cyberoam add_guest_user Blind SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2331</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-329/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary SQL on vulnerable installations of Sophos Cyberoam. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2014-5503.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-328: Sophos Cyberoam ccc_flush_sql_file Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2330</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-328/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos Cyberoam. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2014-5502.]]></description>
      <pubDate>Wed, 01 Oct 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-327: Microsoft Internet Explorer CSS Transition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2346</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-327/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4067.]]></description>
      <pubDate>Thu, 25 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-326: Apple QuickTime MIDI Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2238</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-326/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-4350.]]></description>
      <pubDate>Mon, 22 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-325: Apple QuickTime mdat Atom Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-1996</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-325/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1391.]]></description>
      <pubDate>Mon, 22 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-324: Adobe Reader 3DIF Plugin Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2300</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-324/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0561.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-323: Adobe Reader replace() Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2432</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-323/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-0567.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-322: Microsoft Internet Explorer UpdateColumnAndColGroupStyles Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2487</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-322/</link>
      <description><![CDATA[This vulnerability may allow remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2014-4101.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-321: Microsoft Internet Explorer CTableOMRowCache Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2403</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-321/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4092.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-320: Microsoft Internet Explorer CTableOMRowCache Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2430</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-320/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4092.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-319: Microsoft Internet Explorer CBackgroundCollection Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2486</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-319/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4096.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-318: Microsoft Internet Explorer CGeneratedTreeNode Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2393</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-318/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4079.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-317: Microsoft Internet Explorer CTableCell Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2412</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-317/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4090.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-316: Microsoft Internet Explorer CMarkup Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2391</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-316/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4085.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-315: Microsoft Internet Explorer CTable Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2401</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-315/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4108.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-314: Microsoft Internet Explorer CAttrValue Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2400</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-314/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4107.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-313: Microsoft Internet Explorer CSelectTracker::GetMoveDirection Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2392</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-313/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4105.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-312: Microsoft Internet Explorer CDataBindTask Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2390</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-312/</link>
      <description><![CDATA[This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4103.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-311: Microsoft Internet Explorer CCanvasRadialGradient Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2356</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-311/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4099.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-310: Microsoft Internet Explorer CGeneratedTreeNode Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2364</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-310/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4098.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-309: Microsoft Internet Explorer Empty CAttrValue Uninitialized Variable Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2353</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-309/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4096.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-308: Microsoft Internet Explorer CFieldSetLayout Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2347</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-308/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4097.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-307: Microsoft Internet Explorer CHTMLEditorProxy Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2345</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-307/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4095.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-306: Microsoft Internet Explorer CAttrArray Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2276</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-306/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4065.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-305: Hewlett-Packard Network Node Manager ovopi.dll Stack Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2264</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-305/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Node Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-2624.]]></description>
      <pubDate>Tue, 16 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-304: Mozilla Firefox DirectionalityUtils Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2394</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-304/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1567.]]></description>
      <pubDate>Wed, 03 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-303: SolarWinds Log and Event Manager Static Credential Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2154</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-303/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SolarWinds Log and Event Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-5504.]]></description>
      <pubDate>Wed, 03 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-302: SAP Crystal Reports Connection String Processing Double Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-302/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-5506.]]></description>
      <pubDate>Wed, 03 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-301: SAP Crystal Reports Datasource Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-301/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-5505.]]></description>
      <pubDate>Wed, 03 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-300: Attachmate AppManager Client Resource Monitor Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-300/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetIQ AppManager Client Resource Monitor. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 03 Sep 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-299: SolarWinds Storage Manager AuthenticationFilter Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2087</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-299/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SolarWinds Storage Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Wed, 27 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-298: CSWorks Software Framework SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2191</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-298/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of CSWorks. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2351.]]></description>
      <pubDate>Wed, 27 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-297: Juniper Network and Security Manager XDB Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2151</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-297/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Juniper Network and Security Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-3411.]]></description>
      <pubDate>Wed, 27 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-296: Novell Groupwise Administration Server FileUploadServlet poLibMaintenanceFileSave Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2287</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-296/</link>
      <description><![CDATA[This vulnerability allows remote attackers to obtain sensitive information on vulnerable installations of Novell Groupwise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-0600.]]></description>
      <pubDate>Tue, 26 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-295: AlienVault OSSIM av-centerd Util.pm remote_task Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2292</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-295/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault OSSIM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-5210.]]></description>
      <pubDate>Thu, 14 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-294: AlienVault OSSIM av-centerd Util.pm get_license Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2290</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-294/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault OSSIM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-5210.]]></description>
      <pubDate>Thu, 14 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-293: (0Day) F5 Data Manager discoverFilerBasicInfo.jsft filerName SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2308</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-293/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of F5 Data Manager. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2949.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-292: (0Day) (Pwn2Own) Microsoft Internet Explorer PresentationHost.exe Protected Mode Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2236</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-292/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2014-2819.]]></description>
      <pubDate>Thu, 07 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-291: Attachmate Reflection Pro FTP rftpcom15.dll GetSiteProperties3 Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2354</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-291/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Attachmate Reflection Pro FTP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0603.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-290: Attachmate Reflection Secure FTP Client rftpcom.dll SaveSettings Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2106</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-290/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Attachmate Reflection Secure FTP Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0605.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-289: Attachmate Reflection Secure FTP Client rftpcom.dll StartLog Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2081</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-289/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Attachmate Reflection Secure FTP Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0604.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-288: Attachmate Reflection Secure FTP Client rftpcom.dll Multiple Memory Corruption Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-2075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-288/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Attachmate Reflection Secure FTP Client.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0603.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-287: Microsoft Windows Media Center CSyncBasePlayer Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2277</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-287/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Center. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4060.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-286: Microsoft Internet Explorer CPhraseElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2316</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-286/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-4051.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-285: Microsoft Internet Explorer first-letter Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2309</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-285/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4050.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-284: Microsoft Internet Explorer Arrow Key Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-284/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2827.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-283: Microsoft Internet Explorer CTreePos Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2272</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-283/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-4056.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-282: Microsoft Internet Explorer CScriptElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2323</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-282/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4058.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-281: Microsoft Internet Explorer CInput onfocus Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2315</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-281/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4055.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-280: Microsoft Internet Explorer CTableRow Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2314</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-280/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4052.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-279: Hewlett-Packard Application Lifecycle Manager DLL Planting Elevation of Privilege Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2138</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-279/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard&#x27;s Application Lifecycle Management. This vulnerability requires the attacker to have an unprivileged account on the Application Lifecycle Management System. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2631.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-278: Microsoft Internet Explorer CDOMUIEvent Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2243</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-278/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2820.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-277:  Adobe Flash Player Vector Object Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2326</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-277/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose memory addresses on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-0540.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-276: Microsoft Internet Explorer CScriptData Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2204</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-276/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2818.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-275: Microsoft Internet Explorer CElement::GetClassCacheArray Improper Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2156</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-275/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2774.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-274: Microsoft Internet Explorer CSegment Object Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-274/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4063.]]></description>
      <pubDate>Tue, 12 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-273: AlienVault OSSIM av-centerd Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2193</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-273/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault OSSIM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-5158.]]></description>
      <pubDate>Fri, 01 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-272: AlienVault OSSIM backup Command Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2182</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-272/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault OSSIM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-5158.]]></description>
      <pubDate>Fri, 01 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-271: AlienVault OSSIM ws_data SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2181</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-271/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault OSSIM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-5159.]]></description>
      <pubDate>Fri, 01 Aug 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-270: (0Day) (Pwn2Own\Pwn4Fun) Microsoft Internet Explorer localhost Protected Mode Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2209</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-270/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-1762.]]></description>
      <pubDate>Wed, 30 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-269: Attachmate Verastream Process Designer Process Server Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2161</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-269/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Attachmate Verastream Process Designer.  Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2014-0607.]]></description>
      <pubDate>Wed, 30 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-268: Shunra Network Virtualization for Hewlett-Packard toServerObject() Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2024</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-268/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Visualization. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.4. The following CVEs are assigned: CVE-2014-2626.]]></description>
      <pubDate>Thu, 24 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-267: Shunra Network Virtualization for Hewlett-Packard storedNtxFile() Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2023</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-267/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Network Visualization. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2014-2625.]]></description>
      <pubDate>Thu, 24 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-266: Microsoft Internet Explorer CTreePos Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2363</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-266/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2803.]]></description>
      <pubDate>Thu, 24 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-265: Microsoft Internet Explorer CTitleElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2376</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-265/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2802.]]></description>
      <pubDate>Thu, 24 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-264: (0Day) Apple QuickTime &#x27;mvhd&#x27; Atom Heap Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2082</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-264/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-4979.]]></description>
      <pubDate>Wed, 23 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-263: (0Day) Hewlett-Packard Data Protector Cell Request Service Opcode 1091 Directory Traversal Arbitrary File Write Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2170</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-263/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-5160.]]></description>
      <pubDate>Wed, 23 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-262: (0Day) Hewlett-Packard Data Protector Cell Request Service Opcode 305 Directory Traversal Arbitrary File Creation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2153</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-262/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-5160.]]></description>
      <pubDate>Wed, 23 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-261: Microsoft Internet Explorer CAttrValue Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2366</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-261/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1765.]]></description>
      <pubDate>Wed, 23 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-260: Microsoft Internet Explorer CMarkupPointer Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-260/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1799.]]></description>
      <pubDate>Wed, 23 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-259: Microsoft Internet Explorer CTreeNode Double Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2187</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-259/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-2764.]]></description>
      <pubDate>Wed, 23 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-258: Oracle Java ResourceBundle Format String Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2246</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-258/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2014-2490.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-257: Oracle Business Intelligence Mobile App Designer UIXCacheResourceServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2107</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-257/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Business Intelligence Mobile App Designer. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-4249.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-256: Advantech WebAccess dvs.ocx ServerResponse Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2067</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-256/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-255: Advantech WebAccess dvs.ocx GetColor Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2066</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-255/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-254: Advantech WebAccess dvs.ocx AlarmImage Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2064</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-254/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-253: Advantech WebAccess dvs.ocx SetColor Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2063</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-253/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-252: Advantech WebAccess dvs.ocx CCDParameter Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2062</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-252/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-251: Advantech WebAccess Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2086</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-251/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2014-2365.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-250: Advantech WebAccess Password Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2085</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-250/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose arbitrary credentials on vulnerable versions of Advantech WebAccess. Authentication is required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2014-2366.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-249: Advantech WebAccess Remote Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2079</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-249/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication requirements on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2367.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-248: Advantech WebAccess dvs.ocx IPAddress Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2069</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-248/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-247: Advantech WebAccess dvs.ocx SetBaud Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2068</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-247/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-246: Advantech WebAccess dvs.ocx GetParameter Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-246/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-245: Advantech WebAccess bwocxrun ActiveX Control Installation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2061</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-245/</link>
      <description><![CDATA[This vulnerability allows remote attackers to install certain ActiveX controls without user interaction on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2368.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-244: Advantech WebAccess webdact.ocx NodeName Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2045</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-244/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-243: Advantech WebAccess webdact.ocx ProjectName Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2044</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-243/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-242: Advantech WebAccess dvs.ocx SetParameter Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2043</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-242/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-241: Advantech WebAccess webvact.ocx ProjectName Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2032</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-241/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-2364.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-240: Apple OS X Dock Service Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2285</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-240/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.6. The following CVEs are assigned: CVE-2014-1371.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-239: Apache HTTP Server mod_proxy Denial Of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2241</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-239/</link>
      <description><![CDATA[This vulnerability allows remote attackers to cause a denial of service condition on vulnerable installations of Apache HTTP Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-0117.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-238: Microsoft Internet Explorer CUListElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2201</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-238/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-0308.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-237: Microsoft Internet Explorer CView Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2368</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-237/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2014-1799.]]></description>
      <pubDate>Fri, 18 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-236: Apache httpd mod_status Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2340</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-236/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache HTTPD server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2014-0226.]]></description>
      <pubDate>Wed, 16 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-235: Hewlett-Packard Intelligent Management Center RssServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2312</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-235/</link>
      <description><![CDATA[This vulnerability allows remote attackers to obtain sensitive information on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2014-2622.]]></description>
      <pubDate>Wed, 16 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-234: Hewlett-Packard Intelligent Management Center IctDownloadServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2090</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-234/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-2621.]]></description>
      <pubDate>Wed, 16 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-233: Hewlett-Packard Intelligent Management Center FaultDownloadServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2089</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-233/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-2620.]]></description>
      <pubDate>Wed, 16 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-232: Hewlett-Packard Intelligent Management Center SyslogDownloadServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2088</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-232/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-2619.]]></description>
      <pubDate>Wed, 16 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-14-231: Hewlett-Packard Intelligent Management Center BIMS UploadServlet Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-14-231/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2014-2618.]]></description>
      <pubDate>Wed, 16 Jul 2014 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
