<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Mon, 18 May 2026 07:22:42 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-15-666: Adobe Flash TextBlock releaseLineCreationData Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3450</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-666/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8416.]]></description>
      <pubDate>Fri, 03 Jun 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-665: Adobe Flash TextField text Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3357</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-665/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8823.]]></description>
      <pubDate>Fri, 15 Apr 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-664: Adobe Flash MPEG Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3434</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-664/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8822.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-663: Adobe Flash MPEG Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3438</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-663/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8821.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-662: Adobe Flash MPEG Parsing Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3439</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-662/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8658.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-661: Adobe Flash MPEG Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3437</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-661/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8820.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-660: Adobe Flash MPEG Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3435</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-660/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8657.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-659: Adobe Flash MPEG Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3436</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-659/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8656.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-658: Adobe Flash MPEG-4 Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3415</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-658/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8654.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-657: Adobe Flash MPEG-4 Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3412</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-657/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8653.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-656: Adobe Flash MPEG-4 Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3416</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-656/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8652.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-655:  Adobe Flash MPEG-4 Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3418</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-655/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8655.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-654: Microsoft Internet Explorer CFontFace Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3373</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-654/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6065.]]></description>
      <pubDate>Wed, 02 Mar 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-653: Adobe Flash Object hasOwnProperty Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3443</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-653/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8649.]]></description>
      <pubDate>Tue, 29 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-652: Adobe Flash MovieClip setMask Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3442</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-652/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8648.]]></description>
      <pubDate>Tue, 29 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-651: Adobe Flash LoadVars decode Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3444</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-651/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8650.]]></description>
      <pubDate>Tue, 29 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-650: Adobe Flash MovieClip attachMovie Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3441</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-650/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8647.]]></description>
      <pubDate>Tue, 29 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-649: Adobe Flash MovieClip hitTest Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-649/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8639.]]></description>
      <pubDate>Tue, 29 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-648: Adobe Flash MovieClip getBounds Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3372</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-648/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8638.]]></description>
      <pubDate>Tue, 29 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-647: Microsoft Internet Explorer CTableRow Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3298</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-647/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6083.]]></description>
      <pubDate>Wed, 23 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-646: Mozilla Firefox HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-646/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-4509.]]></description>
      <pubDate>Fri, 18 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-645: Microsoft Internet Explorer TextBlock Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3440</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-645/</link>
      <description><![CDATA[This vulnerability allows remote attackers to leak sensitive information on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6159.]]></description>
      <pubDate>Thu, 17 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-644: Foxit Reader FlateDecode Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3097</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-644/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 16 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-643: Foxit Reader Will Print Action Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-643/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 16 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-642: Foxit Reader Will Save Document Action Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3313</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-642/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 16 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-641: Foxit Reader Forms Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3310</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-641/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 16 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-640: Foxit FoxitCloudUpdateService Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-640/</link>
      <description><![CDATA[This vulnerability allows local attackers to elevate privileges on vulnerable installations of Foxit Reader. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2015-8843.]]></description>
      <pubDate>Tue, 15 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-639: (0Day) Microsoft Office Excel Binary Worksheet Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3269</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-639/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-0035.]]></description>
      <pubDate>Mon, 14 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-638: (0Day) Apache TomEE Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2929</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-638/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache TomEE. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-8581.]]></description>
      <pubDate>Mon, 14 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-637: Adobe Reader DC AGM Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3019</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-637/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8458.]]></description>
      <pubDate>Mon, 14 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-636: Adobe Flash HLS Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3331</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-636/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8457.]]></description>
      <pubDate>Thu, 10 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-635: Schneider Electric ProClima F1BookView ActiveX Control SetTabbedTextEx Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3095</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-635/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-634: Schneider Electric ProClima F1BookView ActiveX Control SetValidationRule Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3093</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-634/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-633: Schneider Electric ProClima F1BookView ActiveX Control Attach Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3092</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-633/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-632: Schneider Electric ProClima F1BookView ActiveX Control ObjCreatePolygon Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3078</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-632/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-631: Schneider Electric ProClima F1BookView ActiveX Control DefinedNameLocal Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3077</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-631/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-630: Schneider Electric ProClima F1BookView ActiveX Control DefinedName Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3076</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-630/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-629: Schneider Electric ProClima F1BookView ActiveX Control CopyRangeEx Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3054</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-629/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8561.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-628: Schneider Electric ProClima F1BookView ActiveX Control AttachToSS Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3053</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-628/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8561.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-627: Schneider Electric ProClima F1BookView ActiveX Control CopyRange/SwapTables Methods Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3055</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-627/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8561.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-626: Schneider Electric ProClima F1BookView ActiveX Control CopyAll Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3056</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-626/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8561.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-625: Schneider Electric ProClima F1BookView ActiveX Control ODBCPrepareEx Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3094</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-625/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric ProClima. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7918.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-624: Wireshark PCAPNG if_filter Arbitrary Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-624/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wireshark. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7830.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-623: Foxit PhantomPDF App Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3072</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-623/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8580.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-622: Foxit PhantomPDF Print Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-622/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8580.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-621: Lepide Active Directory Self Service Arbitrary User Password Change Domain Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3001</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-621/</link>
      <description><![CDATA[This vulnerability allows domain users to reset arbitrary account passwords on vulnerable installations of Lepide Active Directory Self Service.  No user interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2015-8570.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-620: Autodesk Design Review GIF GlobalColorTable Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2844</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-620/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8572.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-619: Autodesk Design Review GIF DataSubBlock Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2762</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-619/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8572.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-618: Autodesk Design Review PCX Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2924</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-618/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8572.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-617: Autodesk Design Review BMP biClrUsed Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2925</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-617/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8571.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-616: Autodesk Design Review FLI RLE Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2926</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-616/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8572.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-615: Autodesk Design Review BMP RLE Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2927</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-615/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8572.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-614: Adobe Flash JIT Spray ASLR/DEP Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2217</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-614/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2015-8453.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-613: Adobe Flash AS2 TextField filters Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3255</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-613/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8450.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-612: Adobe Flash AS2 MovieClip lineTo Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3257</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-612/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8449.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-611: Adobe Flash AS2 DisplacementMapFilter mapBitmap Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3259</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-611/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8448.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-610: Adobe Flash AS2 Color setTransform Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3277</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-610/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8447.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-609: Adobe Flash MP3 ID3 COMM Tag Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3262</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-609/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8446.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-608: Adobe Flash AS3 ShaderParameter Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3258</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-608/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8445.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-607: Adobe Flash AS2 MovieClip filters Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3292</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-607/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8442.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-606: Adobe Flash AS2 SharedObject getRemote Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3328</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-606/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8439.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-605: Adobe Flash AS2 XML toString Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3317</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-605/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8438.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-604: Adobe Flash AS2 Selection setFocus Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3359</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-604/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8437.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-603: Adobe Flash PrintJob addPage Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3358</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-603/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8436.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-602: Adobe Flash MovieClip beginGradientFill Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3370</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-602/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8050.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-601: Adobe Flash TextField autoSize Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3369</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-601/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8049.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-600: Microsoft Windows JScript External Object Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3335</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-600/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code in applications using the JScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6134.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-599: Microsoft Internet Explorer CSelectTracker Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3283</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-599/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6151.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-598: Microsoft Internet Explorer CTableRowCellsCollectionCacheItem Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-598/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6147.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-597: Microsoft Windows VBScript StrComp Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3145</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-597/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-596: Microsoft Windows VBScript Split Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3144</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-596/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-595: Microsoft Windows VBScript Replace Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-595/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-594: Microsoft Windows VBScript InStr/InStrRev Functions Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3142</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-594/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-593: Microsoft Windows VBScript InStrB Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3141</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-593/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-592: Microsoft Windows VBScript Filter Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3140</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-592/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-591: Microsoft Windows VBScript Join Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3121</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-591/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6136.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-590: Microsoft Internet Explorer CTableLayout Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-590/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6150.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-589: Microsoft Internet Explorer CTableCell colspan Improper Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-589/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6149.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-588: Microsoft Internet Explorer CBGsound Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3261</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-588/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6148.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-587: Microsoft Internet Explorer CAttrArray Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3319</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-587/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6142.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-586: Microsoft Windows VBScript CreateObject Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3318</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-586/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6135.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-585: Microsoft Internet Explorer CStylesheet Rules Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3296</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-585/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6141.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-584: Microsoft Internet Explorer CAttrArray Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3287</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-584/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6143.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-583: Microsoft Edge CAttrArray Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3281</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-583/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6168.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-582: Microsoft Internet Explorer Mutation Observer Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3124</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-582/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6160.]]></description>
      <pubDate>Tue, 08 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-581: Hewlett-Packard LoadRunner Virtual Table Server import_database Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3138</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-581/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard LoadRunner. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-6857.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-580: Unitronics VisiLogic OPLC IDE TeeChart.ChartGrid.5 ActiveX Control ColWidths Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2918</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-580/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics VisiLogic OPLC IDE. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6478.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-579: Unitronics VisiLogic OPLC IDE TeeChart.ChartGridNavigator.5 ActiveX Control GridLink Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2919</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-579/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics VisiLogic OPLC IDE.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6478.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-578: Unitronics VisiLogic OPLC IDE  TChart.ITChart ActiveX Control RemoveSeries Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2910</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-578/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics VisiLogic OPLC IDE. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6478.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-577: Unitronics VisiLogic OPLC IDE TeePreviewer.ITeePreviewer ActiveX Control ChartLink Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2911</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-577/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics VisiLogic OPLC IDE.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6478.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-576: Unitronics UniDownloader and Unitronics VisiLogic OPLC IDE IPWorksSSL.HTTPS.1 ActiveX Control PostDataB/FirewallDataB Properties Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2965</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-576/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics UniDownloader and Unitronics VisiLogic OPLC IDE.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7905.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-575: Unitronics UniDownloader IPWorksSSL.HTTPS.1 ActiveX Control SSLCertHandle Property Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2930</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-575/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics UniDownloader.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7905.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-574: Unitronics UniDownloader and Unitronics VisiLogic OPLC IDE IPWorksSSL.HTTPS.1 ActiveX Control WinSockPath Property Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2964</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-574/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics UniDownloader.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7905.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-573: Unitronics VisiLogic OPLC IDE TeeCommander.ITeeCommander ActiveX Control ChartLink Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2904</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-573/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Unitronics VisiLogic OPLC IDE . User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6478.]]></description>
      <pubDate>Wed, 02 Dec 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-572: Tibbo AggreGate SCADA/HMI Apache Axis AdminService Arbitrary Class Instantiation Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3135</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-572/</link>
      <description><![CDATA[This vulnerability allows attackers to elevate privileges on vulnerable installations of Tibbo AggreGate SCADA/HMI. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2015-7913.]]></description>
      <pubDate>Fri, 20 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-571: Tibbo AggreGate SCADA/HMI Server Service uploadDirectory Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3134</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-571/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Tibbo AggreGate SCADA/HMI. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2015-7912.]]></description>
      <pubDate>Fri, 20 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-570: SQLite fts3_tokenizer Untrusted Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2888</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-570/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SQLite.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-7036.]]></description>
      <pubDate>Wed, 18 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-569:  Adobe Reader DC AGM Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3002</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-569/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6696.]]></description>
      <pubDate>Mon, 16 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-568: Microsoft Internet Explorer TreeWalker Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3024</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-568/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-1767.]]></description>
      <pubDate>Thu, 12 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-567: Adobe Flash AS2 actionCallMethod Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3295</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-567/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7657.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-566: Adobe Flash AS2 NetConnection Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3294</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-566/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7659.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-565: Adobe Flash AS2 MovieClip setMask Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3291</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-565/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7660.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-564: Adobe Flash AS2 MovieClip getBounds Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3290</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-564/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7661.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-563: Adobe Flash AS2 Sound loadSound Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3289</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-563/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8042.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-562: Adobe Flash AS2 actionInstanceOf Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3288</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-562/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7658.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-561: Adobe Flash AS2 MovieClip globalToLocal Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3279</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-561/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7653.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-560: Adobe Flash AS2 Sound attachSound Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-560/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7654.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-559: Adobe Flash AS2 actionExtends Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3276</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-559/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7655.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-558: Adobe Flash AS2 actionImplementsOp Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3275</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-558/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7656.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-557: Adobe Flash AS2 TextField gridFitType Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3256</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-557/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7652.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-556: Adobe Flash AS2 DefineFunction Invalid Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3107</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-556/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7651.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-555: SolarWinds DameWare Mini Remote Control URI Handler Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3125</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-555/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SolarWinds DameWare Mini Remote Control. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-8220.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-554: IBM System Networking Switch Center ZipDownload.jsp Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3011</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-554/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose information on vulnerable installations of IBM System Networking Switch Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2015-7820.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-553: IBM System Networking Switch Center FileReader.jsp Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3012</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-553/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose information on vulnerable installations of IBM System Networking Switch Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2015-7817.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-552: IBM System Networking Switch Center DB Service Remote Elevation of Privilege Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3010</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-552/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose information on vulnerable installations of IBM System Networking Switch Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2015-7819.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-551: IBM System Networking Switch Center Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3008</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-551/</link>
      <description><![CDATA[This vulnerability allows local unprivileged attackers to execute arbitrary code on vulnerable installations of IBM System Networking Switch Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2015-7818.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-550: Oracle Beehive prepareAudioToPlay Arbitrary File Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3004</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-550/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Beehive. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-549: AlienVault Unified Security Management av-forward Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2992</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-549/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-548: AlienVault Unified Security Management Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-548/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges to root on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-547: Microsoft Internet Explorer CDOMStringDataList::InitFromString Out-Of-Bounds Indexing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-547/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-6086.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-546: Microsoft Office Excel Binary Worksheet Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3270</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-546/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6094.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-545: Microsoft Internet Explorer ShowSaveFileDialog Protected Mode Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3272</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-545/</link>
      <description><![CDATA[This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2015-6051.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-544: Microsoft Internet Explorer CTableLayout Out-Of-Bounds Memory Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3116</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-544/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6081.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-543: Microsoft Office Excel Binary Worksheet Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3109</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-543/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6038.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-542: Microsoft Internet Explorer CTsfTextStore Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3099</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-542/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6077.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-541: Microsoft Internet Explorer htmlFor Attribute Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3114</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-541/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6076.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-540: Microsoft Internet Explorer URLIMGCTX Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3113</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-540/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6075.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-539: Microsoft Office Word TTF Size Miscalculation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3102</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-539/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6093.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-538: Microsoft Internet Explorer COptionElement::InvalidateDataListAncestorCollections Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2915</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-538/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6064.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-537: Microsoft Windows VBScript Join Function Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3327</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-537/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code in applications using the VBScript scripting language running on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6055.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-536: Microsoft Windows NtUserDisableProcessWindowFiltering Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2933</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-536/</link>
      <description><![CDATA[This vulnerability allows local attackers to leak sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.1. The following CVEs are assigned: CVE-2015-2367.]]></description>
      <pubDate>Tue, 10 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-535: Hewlett-Packard Vertica Remote Command Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2914</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-535/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Vertica. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-6867.]]></description>
      <pubDate>Mon, 02 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-534: Adobe Acrobat Reader DC CMAP Table Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3334</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-534/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7650.]]></description>
      <pubDate>Mon, 02 Nov 2015 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-533: Apple Safari TTF Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3268</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-533/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6978.]]></description>
      <pubDate>Wed, 21 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-532: SAP 3D Visual Enterprise Viewer Filmbox document Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2978</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-532/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8029.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-531: SAP 3D Visual Enterprise Viewer Flic Animation Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2977</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-531/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8028.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-530: SAP 3D Visual Enterprise Viewer FBX Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2984</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-530/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8030.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-529: SAP 3D Visual Enterprise Viewer JPEG2000 Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2988</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-529/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8030.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-528: SAP 3D Visual Enterprise Viewer LWO Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2985</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-528/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8030.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-527: SAP 3D Visual Enterprise Viewer U3D Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2986</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-527/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8030.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-526: SAP 3D Visual Enterprise Viewer 3DM Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2987</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-526/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-8028.]]></description>
      <pubDate>Tue, 20 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-525:  Foxit Reader Forms Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3266</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-525/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Mon, 19 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-524: Foxit Reader Forms Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3267</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-524/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Mon, 19 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-523: Microsoft Internet Explorer empty-cells Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3119</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-523/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6045.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-522: Microsoft Internet Explorer EditWith Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3042</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-522/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escape the Application Container and execute code in the context of the logged-in user on vulnerable installations of Microsoft Internet Explorer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2015-6047.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-521: Microsoft Windows VBScript Filter Function Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3115</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-521/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code in applications using the VBScript scripting language running on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-6055.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-520: Microsoft Internet Explorer CWindow Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3106</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-520/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6042.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-519: Microsoft Office Visio UML Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3096</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-519/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-2557.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-518: Microsoft Windows JScript ArrayBuffer.slice Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3045</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-518/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose the contents of arbitrary memory locations on applications using the JScript scripting language on vulnerable installations of Microsoft Windows. Microsoft Internet Explorer is an affected application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6053.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-517:  Microsoft Office Excel calculatedColumnFormula Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3014</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-517/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-2555.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-516: Microsoft Office Excel fileVersion Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3038</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-516/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-2558.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-515: Microsoft Windows JavaScript Regular Expression Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2899</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-515/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-2482.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-514: Adobe Flash TextFormat tabStops Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2960</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-514/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7629.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-513: Adobe Flash TextLine validity Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3108</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-513/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7631.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-512: Adobe Flash Loader loadBytes Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3112</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-512/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7632.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-511: Adobe Flash AS2 Video deblocking Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3293</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-511/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7643.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-510: Adobe Acrobat Reader DC ANAuthenticateResource Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3117</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-510/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7623.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-509: Adobe Acrobat Reader DC app.launchURL Command Execution Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3103</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-509/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2015-7614.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-508: Adobe Reader DC U3D Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3101</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-508/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7621.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-507: Adobe Acrobat Reader DC ANSendForFormDistribution Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3091</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-507/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6716.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-506: Adobe Acrobat Reader DC ANRunSharedReviewEmailStep Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3090</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-506/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6720.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-505: Adobe Acrobat Reader DC ANSendForSharedReview Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3089</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-505/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6725.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-504: Adobe Acrobat Reader DC CBSharedReviewCloseDialog Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3088</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-504/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6719.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-503: Adobe Acrobat Reader DC CBSharedReviewIfOfflineDialog Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3087</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-503/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6718.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-502: Adobe Acrobat Reader DC CBSharedReviewSecurityDialog Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3086</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-502/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6721.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-501: Adobe Acrobat Reader DC CBSharedReviewStatusDialog Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3085</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-501/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6722.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-500: Adobe Acrobat Reader DC ANShareFile2 Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3084</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-500/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7619.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-499: Adobe Acrobat Reader DC DynamicAnnotStore Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3083</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-499/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6717.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-498: Adobe Acrobat Reader DC CBAutoConfigCommentRepository Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3082</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-498/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7618.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-497: Adobe Acrobat Reader DC ANTrustPropagateAll Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3081</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-497/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6723.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-496: Adobe Acrobat Reader DC ANSendForBrowserReview Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-496/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7620.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-495: Adobe Acrobat Reader DC ANSendForApproval Javascript API Restrictions Bypass Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-3079</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-495/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6724.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-494:  Adobe Acrobat Reader DC ANVerifyComments Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3073</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-494/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7616.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-493: Adobe Acrobat Reader DC Media SaveAs Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3069</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-493/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7615.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-492: Adobe Acrobat Reader DC EScript Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3068</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-492/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-7617.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-491: Adobe Acrobat Reader DC apply Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3067</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-491/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-6715.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-490: Adobe Acrobat Reader DC bind Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3066</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-490/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-6714.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-489: Adobe Acrobat Reader DC call Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-489/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2015-6713.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-488: Adobe Acrobat Reader DC ANSendApprovalToAuthorEnabled Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3063</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-488/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6712.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-487: Adobe Acrobat Reader DC CBBBRInit Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3062</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-487/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6710.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-486: Adobe Acrobat Reader DC CBBBRInvite Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3061</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-486/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6709.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-485: Adobe Acrobat Reader DC DoIdentityDialog Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3060</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-485/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6711.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-484: Adobe Acrobat Reader DC ANStartApproval Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3059</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-484/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6708.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-483: Adobe Acrobat Reader DC ANSendForReview Javascript API Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3058</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-483/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6707.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-482: Adobe Reader DC animations Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3051</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-482/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2015-6704.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-481: Adobe Reader DC loadFlashMovie Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3050</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-481/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2015-6703.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-480: Adobe Reader DC createSquareMesh Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3049</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-480/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2015-6702.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-479: Adobe Reader DC ambientIlluminationColor Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3048</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-479/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2015-6701.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-478: Adobe Reader DC setBackground Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3047</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-478/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2015-6700.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-477: Adobe Reader DC addForegroundSprite Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3046</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-477/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2015-6699.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-476: Adobe Reader DC AcroForm Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3044</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-476/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6698.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-475: Adobe Acrobat Pro DC Color Object Address Disclosure Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-3036</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-475/</link>
      <description><![CDATA[This vulnerability allows remote attackers to gain information about the layout of memory on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6697.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-474: Adobe Reader popUpMenuEx Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3018</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-474/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6690.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-473: Adobe Acrobat Signature signatureSetSeed Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3017</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-473/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6693.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-472: Adobe Reader listbox value Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3016</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-472/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6695.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-471: Adobe Reader fillColor Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-471/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6694.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-470: Adobe Acrobat Pro DC WillSave Action Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2998</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-470/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6689.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-469: Adobe Acrobat Pro DC WillSave OCG Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2997</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-469/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6688.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-468: Adobe Reader Read Restrictions Bypass Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2893</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-468/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose arbitrary PDF files on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2015-5583.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-15-467: Adobe Acrobat Reader DC Fields Format Action Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-2816</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-15-467/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2015-6685.]]></description>
      <pubDate>Tue, 13 Oct 2015 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
