<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Sat, 02 May 2026 11:02:26 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-16-700: Google Chrome PDFium JPEG Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3655</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-700/</link>
      <description><![CDATA[This vulnerability allows an attacker to leak sensitive information on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-10403.]]></description>
      <pubDate>Wed, 23 Aug 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-699: Bitdefender Internet Security Lyme SFX Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4177</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-699/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Fri, 11 Aug 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-698: Bitdefender Internet Security AutoIt v2 Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4175</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-698/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Fri, 11 Aug 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-697: Bitdefender Internet Security AutoIt v3 Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-697/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Tue, 01 Aug 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-696: ARRIS VAP2500 list_mac_address Authentication Bypass Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3873</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-696/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-695: ARRIS VAP2500 Default Credentials Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3872</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-695/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-694: ARRIS VAP2500 list_mac_address cmb_macaddrfilter Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3871</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-694/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-693: ARRIS VAP2500 list_mac_address macaddr Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3870</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-693/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-692: ARRIS VAP2500 tools_command Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3869</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-692/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-691: ARRIS VAP2500 config_wds Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3868</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-691/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-690: ARRIS VAP2500 assoc_table Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-690/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.0.]]></description>
      <pubDate>Mon, 26 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-689: Microsoft Internet Explorer Array.splice Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4319</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-689/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7202.]]></description>
      <pubDate>Wed, 21 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-688: Apple OS X CoreStorage Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3877</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-688/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS.  An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7603.]]></description>
      <pubDate>Wed, 21 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-687: Apple OS X IOReportUserClient Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3856</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-687/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.9. The following CVEs are assigned: CVE-2016-7714, CVE-2016-7625.]]></description>
      <pubDate>Wed, 21 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-686: Apple OS X IOSurface Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3855</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-686/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.9. The following CVEs are assigned: CVE-2016-7620.]]></description>
      <pubDate>Wed, 21 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-685: Apple OS X IOCommandQueue Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3854</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-685/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.9. The following CVEs are assigned: CVE-2016-7624.]]></description>
      <pubDate>Wed, 21 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-684: Adobe Digital Editions PDF FlateDecode Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3664</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-684/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Digital Editions. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-4263.]]></description>
      <pubDate>Tue, 13 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-683: Check Point ZoneAlarm Extreme Security vsdatant Kernel Driver Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3760</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-683/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Check Point ZoneAlarm Extreme Security.  An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Fri, 02 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-682: ThinPrint TPClnt/TPView Heap-based Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3783</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-682/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of ThinPrint. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.2. The following CVEs are assigned: CVE-2016-7081.]]></description>
      <pubDate>Fri, 02 Jun 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-681: Avast Free Antivirus aswSnx Kernel Driver Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3712</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-681/</link>
      <description><![CDATA[This vulnerability allows attackers to elevate their privileges on vulnerable installations of Avast Free Antivirus. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.2.]]></description>
      <pubDate>Thu, 11 May 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-680: Microsoft Skype DLL Planting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3577</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-680/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Skype.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Thu, 06 Apr 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-679: Apple iOS legacy-diagnostics Privilege Escalation Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-3954</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-679/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Apple iOS. User interaction is required to exploit this vulnerability in that the target must connect to a WiFi access point. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2016-7630.]]></description>
      <pubDate>Fri, 31 Mar 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-678: Adobe Flash Player PSDKEventDispatcher Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4332</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-678/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7878.]]></description>
      <pubDate>Mon, 13 Feb 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-677: Microsoft Windows JavaScript Array.concat Type Confusion Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4331</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-677/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2016-7297.]]></description>
      <pubDate>Fri, 20 Jan 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-676: Microsoft Windows ADO Recordset Update Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4009</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-676/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-3375.]]></description>
      <pubDate>Tue, 10 Jan 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-675: Microsoft Windows ADO Recordset GetRows Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3956</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-675/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2016-3375.]]></description>
      <pubDate>Tue, 10 Jan 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-674: BitTorrent API Cross-Site Scripting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4050</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-674/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BitTorrent and uTorrent. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Mon, 26 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-673: Mozilla Firefox ClearKeyDecryptor Heap Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3766</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-673/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-2837.]]></description>
      <pubDate>Mon, 19 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-672: Fatek Automation PLC WinProladder Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3705</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-672/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fatek Automation PLC WinProladder.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2016-8377.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-671: Sophos XG Firewall Controller filter SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3745</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-671/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Sophos XG Firewall. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-670: Avira Free Antivirus ssmdrv Kernel Driver Memory Corruption Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3809</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-670/</link>
      <description><![CDATA[This vulnerability allows attackers to escalate privileges on vulnerable installations of Avira Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-669: Autodesk Design Review JFIF Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3595</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-669/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-668: Autodesk Design Review PNG Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3593</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-668/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-667: Autodesk Design Review BMP Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3573</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-667/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-666: Autodesk Design Review FLI Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3526</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-666/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-665: Autodesk Design Review GIF LZW Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3525</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-665/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-664: Autodesk Design Review JPEG DHT Out-Of-Bounds Indexing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3527</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-664/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-663: Delta Industrial Automation PMSoft File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3935</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-663/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation PMSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-5802.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-662: Delta Industrial Automation ISPSoft dvl File Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4016</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-662/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-661: Delta Industrial Automation WPLSoft File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3915</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-661/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-660: Delta Industrial Automation WPLSoft File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3914</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-660/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-5802.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-659: Delta Industrial Automation ISPSoft dvp File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3916</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-659/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-658: Delta Industrial Automation WPLSoft dvp File Parsing Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3913</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-658/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-657: Delta Industrial Automation WPLSoft dvp File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3912</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-657/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-656: Delta Industrial Automation WPLSoft dvp File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3911</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-656/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-655: Delta Industrial Automation ISPSoft dvp File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3910</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-655/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-654: Delta Industrial Automation WPLSoft LAD File Reading Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3931</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-654/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-653: Delta Industrial Automation WPLSoft LAD File Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3930</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-653/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-652: Delta Industrial Automation WPLSoft SFC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3861</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-652/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5802.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-651: Delta Industrial Automation ISPSoft dvp File Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3909</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-651/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-650: Delta Industrial Automation WPLSoft Bit Data File Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3860</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-650/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-649: Delta Industrial Automation WPLSoft Register Data File Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3859</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-649/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-648: Delta Industrial Automation WPLSoft DVP File Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3865</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-648/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft.   User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5805.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-647: Delta Industrial Automation WPLSoft DVP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3858</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-647/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5802.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-646: Delta Industrial Automation WPLSoft Heap Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3587</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-646/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation WPLSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5802.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-645: Microsoft Windows Icon File Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4051</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-645/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file or folder. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7272.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-644: Apple OS X AppleBroadcomBluetoothHostController Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4019</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-644/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7617.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-643: Apple OS X AppleIntelFramebufferAzul Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3985</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-643/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7602.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-642: Apple OS X AppleGraphicsPowerManagement Null Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3864</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-642/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7609.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-641: Apple OS X IntelHD5000 IGAccelResource  Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3823</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-641/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7582.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-640: Apple OS X WindowServer _XSetApplicationBindingsForWorkspaces Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3775</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-640/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2016-4638.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-639: Apple OS X WindowServer _XSetDictionaryForCurrentSession Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3773</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-639/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2016-4638.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-638: Apple OS X WindowServer _XRegisterCursorWithData Memory Corruption Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3770</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-638/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2016-4640.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-637: Apple OS X AppleIntelHD5000Graphics Null Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3677</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-637/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2016-1818.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-636: Adobe Digital Editions FlateDecode Out-of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3923</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-636/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Digital Editions. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-7888.]]></description>
      <pubDate>Thu, 15 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-635: Fatek Automation Communication Server Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3681</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-635/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fatek Automation Communication Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-5796.]]></description>
      <pubDate>Wed, 14 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-634: Fatek Automation FvDesigner Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3676</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-634/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-5798.]]></description>
      <pubDate>Wed, 14 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-633: Apple OS X IOKit Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3992</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-633/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7616.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-632: Apple Safari HTMLLabelElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3953</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-632/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7611.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-631: Apple Safari RenderObject Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4010</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-631/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7610.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-630: Advantech SUSIAccess Server UpgradeMgmt upload Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3876</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-630/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech SUSIAccess Server. Authentication is required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2016-9351.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-629: Advantech SUSIAccess Server Static Encryption Key Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3987</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-629/</link>
      <description><![CDATA[This vulnerability allows attackers to escalate privileges on vulnerable installations of Advantech SUSIAccess Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2016-9353.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-628: Advantech SUSIAccess Server downloadCSV file Parameter Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3831</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-628/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech SUSIAccess Server. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2016-9349.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-627: Adobe Flash Player Worker Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4046</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-627/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7871.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-626: Adobe Flash MovieClip swapDepth Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4041</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-626/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7872.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-625: Adobe Flash Player RegExp THEN Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3991</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-625/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7868.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-624: Adobe Flash Player RegExp PRUNE Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3958</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-624/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7869.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-623: Adobe Flash Player RegExp SKIP Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3959</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-623/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7870.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-622: Adobe Flash Player RegExp MARK Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3990</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-622/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7867.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-621: Adobe Flash Player BitmapData Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4124</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-621/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7875.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-620: Adobe Flash PSDK Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4123</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-620/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7878.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-619: Adobe Flash NetConnection Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4129</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-619/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7879.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-618: Attachmate Host Access Management and Security Server PassThru Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4022</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-618/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Attachmate Host Access Management and Security Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2016-5765.]]></description>
      <pubDate>Tue, 13 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-617: Dell SonicWALL Universal Management Suite ImagePreviewServlet SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3748</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-617/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell SonicWALL Universal Management Suite. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Fri, 02 Dec 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-616: Hewlett Packard Enterprise Network Automation RPCServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3729</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-616/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Network Automation. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-8511.]]></description>
      <pubDate>Wed, 30 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-615: Moxa SoftCMS AspWebServer URL Processing Double Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4032</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-615/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Moxa SoftCMS. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2016-8360.]]></description>
      <pubDate>Wed, 23 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-614: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4060</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-614/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 22 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-613: Foxit Reader JPEG2000 Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4061</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-613/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Tue, 22 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-612: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4062</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-612/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 22 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-611: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4063</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-611/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 22 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-610: Foxit Reader JPEG2000 Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4064</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-610/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Tue, 22 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-609: Apple OS X WindowServer _XSetPerUserConfigurationData Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3772</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-609/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2016-4709.]]></description>
      <pubDate>Tue, 15 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-608: Apple OS X WindowServer _XSetPreferencesForWorkspaces Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3774</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-608/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2016-4710.]]></description>
      <pubDate>Tue, 15 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-607: CA Unified Infrastructure Management diag Path Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3710</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-607/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information from vulnerable installations of CA Unified Infrastructure Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2016-9164.]]></description>
      <pubDate>Wed, 09 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-606: CA Unified Infrastructure Management get_sessions Session Information Disclosure Remote Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3708</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-606/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose session information on vulnerable installations of CA Unified Infrastructure Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2016-9165.]]></description>
      <pubDate>Wed, 09 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-605: CA Unified Infrastructure Management download_lar Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3711</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-605/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information from vulnerable installations of CA Unified Infrastructure Management. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2016-5803.]]></description>
      <pubDate>Wed, 09 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-604: IBHsoftec S7-SoftPLC CPX43 Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3832</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-604/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBHsoftec SoftPLC. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2016-8364.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-603: Adobe Flash MovieClip constructor Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4047</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-603/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7862.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-602: Adobe Flash AS2 extends Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4040</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-602/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7859.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-601: Adobe Flash AdvertisingMetadata Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4048</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-601/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7860.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-600: Adobe Flash Player Metadata Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4049</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-600/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7861.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-599: Adobe Flash TextField Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4044</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-599/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7863.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-598: Adobe Flash LocalConnection Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4042</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-598/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7865.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-597: Adobe Flash Selection setFocus Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4043</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-597/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7864.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-596: Adobe Flash AVSegmentedSource Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-596/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7857.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-595: Adobe Flash ExternalInterface addCallback Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3986</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-595/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7858.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-594: Microsoft Windows NtUserMagSetContextInformation Kernel State Corruption Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-594/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-7246.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-593: Microsoft Windows JavaScript reverse Method Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4031</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-593/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-7202.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-592: Microsoft Windows win32k.sys Bitmap Null Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3924</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-592/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2016-7215.]]></description>
      <pubDate>Tue, 08 Nov 2016 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-591: Adobe Reader DC XObject stream Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3842</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-591/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6938.]]></description>
      <pubDate>Fri, 04 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-590: Apple Safari JavaScriptCore Array Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3875</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-590/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-4677.]]></description>
      <pubDate>Fri, 04 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-589: Apple OS X AppleSMC smcHandleYPCEvent Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3908</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-589/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-4678.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-588: Hewlett Packard Enterprise System Management Homepage SSO TKN Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3730</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-588/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise System Management Homepage. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2016-4396.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-587:  Hewlett Packard Enterprise System Management Homepage SetSMHData Stack Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3722</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-587/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise System Management Homepage. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2016-4395.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-586: Foxit Reader PDF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4036</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-586/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-585: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4035</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-585/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-584: Foxit Reader JPEG2000 Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4034</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-584/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-583: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4029</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-583/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-582: Foxit Reader JBIG2 Parsing Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4028</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-582/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-581: Foxit Reader JPXDecode filters Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4027</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-581/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-580: Foxit Reader JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3952</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-580/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-579: Foxit Reader GIF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3951</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-579/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-578: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3950</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-578/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-577: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3955</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-577/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-576: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3949</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-576/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-575: Foxit Reader JPEG2000 Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-3948</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-575/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 02 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-574:  Adobe Reader DC FlateDecode Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3838</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-574/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-6937.]]></description>
      <pubDate>Tue, 01 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-573: Adobe Reader DC JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4038</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-573/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-7854.]]></description>
      <pubDate>Tue, 01 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-572: Oracle WebLogic Commons DiskFileItem Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3591</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-572/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-5535.]]></description>
      <pubDate>Tue, 01 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-571: Oracle Java Runtime Environment java.awt.Menu Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3812</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-571/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5568.]]></description>
      <pubDate>Tue, 01 Nov 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-570: Novell NetIQ Sentinel Commons DiskFileItem Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-570/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell NetIQ Sentinel. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-1000031.]]></description>
      <pubDate>Mon, 17 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-569: Adobe Flash Accessibility sendEvent Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3989</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-569/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6987.]]></description>
      <pubDate>Wed, 12 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-568: Adobe Flash SWF Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3957</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-568/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2016-6986.]]></description>
      <pubDate>Wed, 12 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-567: Adobe Reader DC XSLT Parsing copy-of Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3943</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-567/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6975.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-566: Adobe Reader DC XSLT Parsing key Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3946</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-566/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6972.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-565: Adobe Reader DC JPEG2000 Out-Of-Bounds Read Information DIsclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3740</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-565/</link>
      <description><![CDATA[This vulnerability allows an attacker to leak sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-6941.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-564: Adobe Reader DC PRC Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3724</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-564/</link>
      <description><![CDATA[This vulnerability allows an attacker to leak sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-6940.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-563: Adobe Reader DC XSLT Parsing sort Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3961</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-563/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6969.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-562: Adobe Reader DC XSLT Parsing sort Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3939</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-562/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6973.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-561: Adobe Acrobat Pro DC XObject stream Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3816</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-561/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6971.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-560: Acrobat Reader DC XFA FormSubform Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3926</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-560/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6953.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-559: Acrobat Reader DC XFA CPDField Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3921</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-559/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6952.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-558: Acrobat Reader DC XFA template Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3925</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-558/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6951.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-557: Acrobat Reader DC XFA exclGroup Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3927</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-557/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-6950.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-556: Adobe Reader DC XFA AFDriver Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3850</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-556/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6988.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-555: Adobe Reader DC XFA forms Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3846</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-555/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6947.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-554: Adobe Reader DC XFA maxChars Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3845</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-554/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6946.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-553: Adobe Reader DC XFA Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3753</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-553/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6942.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-552:  Adobe Reader DC XSLT Parsing key Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3968</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-552/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6968.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-551: Adobe Reader DC XSLT Parsing variable Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3969</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-551/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6967.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-550: Adobe Reader DC XSLT Parsing for-each Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3942</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-550/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6966.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-549: Adobe Reader DC XSLT Parsing number Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3962</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-549/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6965.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-548: Adobe Reader DC XSLT Parsing for-each Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3964</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-548/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6964.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-547: Adobe Reader DC XSLT Parsing apply-templates Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3966</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-547/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6963.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-546: Adobe Reader DC XSLT Parsing choose Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3967</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-546/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6962.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-545: Adobe Reader DC XSLT Parsing copy-of Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3965</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-545/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6961.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-544: Adobe Reader DC XSLT Parsing if Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3963</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-544/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6979.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-543: Adobe Reader DC XSLT Parsing choose  Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3945</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-543/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6977.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-542: Adobe Reader DC XSLT Parsing variable  Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3947</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-542/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6976.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-541: Adobe Reader DC XSLT Parsing if Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3941</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-541/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6974.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-540: Adobe Reader DC XSLT Parsing apply-templates  Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3944</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-540/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6960.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-539: Adobe Reader DC XSLT Parsing number Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3940</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-539/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6959.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-538: Adobe Reader DC XSLT Parsing value-of Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3938</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-538/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6978.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-537: Adobe Acrobat Pro DC SaveAs Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3851</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-537/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6945.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-536: Adobe Acrobat Reader DC Search Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3825</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-536/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-6944.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-535: Microsoft Windows JavaScript Spread Operator Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3928</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-535/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-3386.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-534: Microsoft Internet Explorer s_DestroyMetaCallback Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3922</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-534/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2016-3384.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-533: Microsoft Internet Explorer Table Layout Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3857</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-533/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3383.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-532: Microsoft Edge JavaScript eval Function Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3866</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-532/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge and Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3382.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-531: VMware Horizon View loggerBean Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3714</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-531/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of VMware Horizon View. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 5.8. The following CVEs are assigned: CVE-2016-7087.]]></description>
      <pubDate>Tue, 11 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-530: Trend Micro Maximum Security tmnciesc Kernel Driver Memory Corruption Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3827</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-530/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Maximum Security.  An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Thu, 06 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-529: Trend Micro Maximum Security tmnciesc driver Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3843</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-529/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Thu, 06 Oct 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-528: Adobe Digital Editions ePub Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3979</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-528/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Digital Editions. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-6980.]]></description>
      <pubDate>Tue, 27 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-527: Apple Safari HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3852</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-527/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-4768.]]></description>
      <pubDate>Tue, 27 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-526: (0Day) Google Chrome Protocol Handler Logic Error Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3625</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-526/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass restrictions on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 21 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-525: (0Day) Fatek Automation PM Designer Heap Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3586</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-525/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Fatek Automation PM Designer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 21 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-524: Google Chrome Logic Error Safe Browsing Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3624</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-524/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass restrictions on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 21 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-523: Hewlett Packard Enterprise Network Automation RMI Registry Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3728</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-523/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Network Automation. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2016-4385.]]></description>
      <pubDate>Wed, 21 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-522: Apple OS X IOThunderboltFamily Uninitialized Memory Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3814</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-522/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-4727.]]></description>
      <pubDate>Tue, 20 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-521: Apple OS X AppleHSSPIHIDDriver Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3822</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-521/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-4697.]]></description>
      <pubDate>Tue, 20 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-520: Apple OS X AppleUpstreamUserClient Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3715</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-520/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-4700.]]></description>
      <pubDate>Tue, 20 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-519: Apple OS X AudioAUUC Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3716</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-519/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-4699.]]></description>
      <pubDate>Tue, 20 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-518: Rockwell Automation RSLogix Micro Starter Lite Project File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3793</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-518/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rockwell Automation RSLogix Micro Starter Lite.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-5814.]]></description>
      <pubDate>Mon, 19 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-517: AlienVault Unified Security Management Remote Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3976</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-517/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication requirements on vulnerable installations of AlienVault Unified Security Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Mon, 19 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-516: Adobe Flash SWF Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3848</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-516/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2016-4276.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-515: Adobe Flash TextFormat Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3862</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-515/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-4279.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-514: Microsoft Windows JavaScript map Method Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3932</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-514/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3377.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-513: Microsoft Edge CSS white-space Property Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3874</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-513/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2016-3247.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-512: Microsoft Windows MSXML IDispatch Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3821</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-512/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-3376.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-511: Microsoft Edge CTreePos Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3792</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-511/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3295.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-510: Microsoft Internet Explorer Add-on Installer Enhanced Protected Mode Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3788</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-510/</link>
      <description><![CDATA[This vulnerability allows attackers to escape from the Enhanced Protected Mode sandbox on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2016-3292.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-509: Microsoft Edge TextNode Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3782</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-509/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3294.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-508: Microsoft Office Excel Art Data Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3781</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-508/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3365.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-507: Microsoft Windows NtGdiQueryFonts Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3756</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-507/</link>
      <description><![CDATA[This vulnerability allows local attackers to leak sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.9. The following CVEs are assigned: CVE-2016-3354.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-506: Microsoft Windows .URL File Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3570</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-506/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2016-3353.]]></description>
      <pubDate>Fri, 16 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-505: AlienVault Unified Security Management get_directive_kdb directive_id SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3742</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-505/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0.]]></description>
      <pubDate>Thu, 08 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-504: AlienVault Unified Security Management Multiple PHP Scripts Remote Code Execution Vulnerabilities]]></title>
      <guid isPermaLink="false">ZDI-CAN-3704</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-504/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of AlienVault Unified Security Management. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Thu, 08 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-503: Bitdefender Antivirus Plus bdfwfpf Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3749</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-503/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate their privileges on vulnerable installations of Bitdefender Antivirus Plus.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.6.]]></description>
      <pubDate>Thu, 01 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-502: Bitdefender Antivirus Plus avc3 Kernel Driver Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3829</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-502/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Bitdefender Antivirus Plus.   An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Thu, 01 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-16-501: Google Chrome StylePropertySerializer Type Confusion Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-3840</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-16-501/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2016-5161.]]></description>
      <pubDate>Thu, 01 Sep 2016 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
