<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Wed, 13 May 2026 05:12:06 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-17-1017: Huawei Mate 9 Pro Mali Double Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5337</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1017/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Huawei Mate 9 Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2017-15316.]]></description>
      <pubDate>Fri, 08 Jun 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1016: Microsoft Chakra Typed Array JIT Optimization Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5321</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1016/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11889.]]></description>
      <pubDate>Mon, 16 Apr 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1015: Microsoft Windows JavaScript Typed Array JIT Optimization Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5215</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1015/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11837.]]></description>
      <pubDate>Fri, 23 Mar 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1014: Microsoft Windows Font Embedding Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5315</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1014/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2017-11835.]]></description>
      <pubDate>Wed, 07 Mar 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1013: Adobe Acrobat Pro DC ImageConversion EMF BMP Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5154</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1013/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11308.]]></description>
      <pubDate>Wed, 07 Mar 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1012: Adobe Acrobat Pro DC ImageConversion EMF JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1012/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2017-11240.]]></description>
      <pubDate>Tue, 06 Mar 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1011: Adobe Acrobat Pro DC ImageConversion EMF GIF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1011/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2017-11307.]]></description>
      <pubDate>Tue, 06 Mar 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1010: Microsoft Windows Font Embedding Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5317</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1010/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2017-11835.]]></description>
      <pubDate>Tue, 06 Mar 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1009: Symantec Messaging Gateway Export Servlet snmpFileName Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4755</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1009/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Symantec Messaging Gateway. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.0. The following CVEs are assigned: CVE-2017-15532.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1008: QNAP QTS Web change_password Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5280</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1008/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17032.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1007: QNAP QTS Web sysinfoReq Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5279</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1007/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17033.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1006: QNAP QTS Web change_password Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1006/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability.   The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17031.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1005: QNAP QTS authLogin Host Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5263</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1005/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17030.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1004: QNAP QTS authLogin Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5262</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1004/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17029.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1003: QNAP QTS Web devRequest Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5209</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1003/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17028.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1002: QNAP QTS NASFTPD USER Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5208</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1002/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of QNAP QTS NASFTPD. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17027.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1001: WECON LeviStudio PLC Driver Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5085</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1001/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WECON LeviStudio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16717.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-1000: Ecava IntegraXor Report getdata name SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5386</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-1000/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Ecava IntegraXor.  Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2017-16735.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-999: Ecava IntegraXor Report batchlist SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5385</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-999/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Ecava IntegraXor.  Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2017-16733.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-998: Adobe Flash Player BitmapData hitTest Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-998/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11213.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-997: Adobe Flash LocaleID determinePreferredLocales Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-997/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-3114.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-996: Adobe Flash NetworkConfiguration addCustomHeader Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5074</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-996/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-3112.]]></description>
      <pubDate>Wed, 20 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-995: Quest NetVault Backup Server Process Manager Service NVBUJobHistory Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4906</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-995/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17659.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-994: Quest NetVault Backup Server Process Manager Service NVBUJobDefinitions Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4316</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-994/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17658.]]></description>
      <pubDate>Tue, 02 Jan 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-993: Quest NetVault Backup Server Process Manager Service NVBUBackup TimeRange Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4294</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-993/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17657.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-992: Quest NetVault Backup Server Process Manager Service NVBUBackup JobList Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4292</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-992/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17656.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-991: Quest NetVault Backup Server Process Manager Service NVBUBackup PluginList Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4289</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-991/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17655.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-990: Quest NetVault Backup Server Process Manager Service NVBUBackup ClientList Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4287</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-990/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17654.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-989: Quest NetVault Backup Server Process Manager Service NVBUBackupOptionSet Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-989/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17653.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-988: Quest NetVault Backup Server Process Manager Service NVBUBackup Count Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4238</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-988/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17652.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-987: Quest NetVault Backup Server Process Manager Service NVBUSourceDeviceSet Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4237</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-987/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17425.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-986: Quest NetVault Backup Server Process Manager Service NVBUSelectionSet Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4232</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-986/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17421.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-985: Quest NetVault Backup Server Process Manager Service NVBUJobCountHistory Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4231</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-985/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17420.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-984: Quest NetVault Backup Server Process Manager Service NVBUTransferHistory Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4230</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-984/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17419.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-983: Quest NetVault Backup Server Process Manager Service NVBUPolicy Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4229</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-983/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17418.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-982: Quest NetVault Backup Server Process Manager Service NVBUPhaseStatus Acknowledge Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4228</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-982/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17417.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-981: Quest NetVault Backup Server Process Manager Service NVBUPhaseStatus GetPlugins Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4227</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-981/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17416.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-980: Quest NetVault Backup Server Process Manager Service NVBUPhaseStatus Count Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4226</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-980/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17415.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-979: Quest NetVault Backup Server Process Manager Service NVBUPhaseStatus Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4225</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-979/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17414.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-978: Quest NetVault Backup Server Process Manager Service NVBUBackupTargetSet Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4224</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-978/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17413.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-977: Quest NetVault Backup Server Process Manager Service NVBUScheduleSet Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4235</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-977/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17424.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-976: Quest NetVault Backup Server Process Manager Service NVBUBackupSegment Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4234</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-976/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17423.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-975: Quest NetVault Backup Server Process Manager Service NVBUBackup Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4233</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-975/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17422.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-974: Quest NetVault Backup Server Process Manager Service NVBUEventHistory Get Method SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4223</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-974/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17412.]]></description>
      <pubDate>Fri, 15 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-973: (0Day) Linksys WVBR0 User-Agent Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4892</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-973/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-17411.]]></description>
      <pubDate>Mon, 18 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-972: Trend Micro Mobile Security for Enterprise clt_report_sms_status Uninitialized Pointer Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4789</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-972/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Mobile Security for Enterprise. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2017-14082.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-971: NetGain Systems Enterprise Manager _3d.add_005f3d_005fview_005fdo_jsp Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5197</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-971/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute code by creating arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-16606.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-970: NetGain Systems Enterprise Manager db.save_005fattrs_jsp id  Directory Traversal Arbitrary File Overwrite Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5196</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-970/</link>
      <description><![CDATA[This vulnerability allows remote attackers to overwrite arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-16605.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-969: NetGain Systems Enterprise Manager deviceReport.deviceReport_005fexport_005fdo_jsp filename Directory Traversal Arbitrary File Overwrite Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5195</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-969/</link>
      <description><![CDATA[This vulnerability allows remote attackers to overwrite arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-16604.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-968: NetGain Systems Enterprise Manager settings.upload_005ffile_005fdo_jsp filename Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5194</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-968/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute code by creating arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-16603.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-967: NetGain Systems Enterprise Manager tools.exec_jsp command Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5193</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-967/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-16602.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-966: NetGain Systems Enterprise Manager service.service_005ffailures_jsp filename Directory Traversal Arbitrary File Overwrite Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5192</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-966/</link>
      <description><![CDATA[This vulnerability allows remote attackers to overwrite arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-16601.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-965: NetGain Systems Enterprise Manager network.traffic_005freport_jsp filename Directory Traversal Arbitrary File Overwrite Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5191</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-965/</link>
      <description><![CDATA[This vulnerability allows remote attackers to overwrite files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-16600.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-964: NetGain Systems Enterprise Manager misc.sample_jsp type Directory Traversal Arbitrary File Deletion Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5190</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-964/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.4. The following CVEs are assigned: CVE-2017-16599.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-963: NetGain Systems Enterprise Manager snmpwalk.snmpwalk_005fdo_jsp ip Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5138</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-963/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute code by overwriting arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-16598.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-962: NetGain Systems Enterprise Manager TFtpServer Filename Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5137</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-962/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetGain Systems Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-16597.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-961: NetGain Systems Enterprise Manager designer.script_005fsamples_jsp type Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5119</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-961/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-16596.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-960: NetGain Systems Enterprise Manager reports.export_005fdownload_jsp filename Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5118</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-960/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-16595.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-959: NetGain Systems Enterprise Manager db.save_005fimage_jsp id Unrestricted File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5117</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-959/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2017-16594.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-958: NetGain Systems Enterprise Manager restore.del_005fdo_jsp filenames Directory Traversal Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5104</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-958/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-16593.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-957: NetGain Systems Enterprise Manager common.download_jsp filename Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5103</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-957/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-16592.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-956: NetGain Systems Enterprise Manager restore.download_005fdo_jsp Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5100</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-956/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of NetGain Systems Enterprise Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-16591.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-955: NetGain Systems Enterprise Manager MainFilter doFilter Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5099</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-955/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on vulnerable installations of NetGain Systems Enterprise MainFilter. User interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-16590.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-954: Netgain Systems Enterprise Manager script_test Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-954/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetGain Systems Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17407.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-953: NetGain Enterprise Manager RMI Registry Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4753</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-953/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-17406.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-952: NetGain Enterprise Manager upload_save_do Remote Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4751</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-952/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-16610.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-951: NetGain Enterprise Manager download Arbitrary File Download Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4750</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-951/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2017-16609.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-950: NetGain Enterprise Manager exec Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4749</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-950/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-16608.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-949: NetGain Enterprise Manager heapdumps Remote Download Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4718</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-949/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2017-16607.]]></description>
      <pubDate>Wed, 13 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-948: Microsoft Windows JavaScript Array JIT Optimization Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5242</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-948/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-11901.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-947: Microsoft Windows VBScript VT_BSTR Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5243</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-947/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-11913.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-946: Microsoft Windows VBScript VT_BSTR Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5111</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-946/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2017-11887.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-945: Microsoft Windows VBScript Join Function Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5110</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-945/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-11887.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-944: Bitdefender Internet Security Emulator 0x102 Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5116</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-944/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-17410.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-943: Bitdefender Internet Security Emulator 0x10A Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5102</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-943/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-17409.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-942: Bitdefender Internet Security Themida Emulator Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5101</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-942/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-17408.]]></description>
      <pubDate>Tue, 12 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-941: Adobe Acrobat Pro DC ImageConversion EMF EMR_ALPHABLEND Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5203</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-941/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-11250.]]></description>
      <pubDate>Wed, 10 Jan 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-940: Advantech WebAccess webvrpcs drawsrv Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4951</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-940/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12719.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-939: Advantech WebAccess webvrpcs drawsrv Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4950</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-939/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12719.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-938: Advantech WebAccess webvrpcs ViewDll1 Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4949</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-938/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14016.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-937: Cisco WebEx Recorder and Player WRF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4986</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-937/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Recorder and Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12371.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-936: Cisco WebEx Recorder and Player WRF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4988</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-936/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Recorder and Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12370.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-935: Cisco WebEx Recorder and Player WRF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4989</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-935/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Recorder and Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12370.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-934: Cisco WebEx Recorder and Player WRF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4990</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-934/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Recorder and Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12370.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-933: Cisco WebEx Network Recording Player Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5041</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-933/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12372.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-932: Cisco WebEx ARF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5009</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-932/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12371.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-931: Cisco WebEx Recorder and Player WRF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4987</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-931/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Recorder and Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12371.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-930: Cisco WebEx ARF File Parsing Uninitialized Memory Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4914</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-930/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12371.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-929: Microsoft Office Excel XLS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5320</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-929/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11884.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-928: Microsoft Chakra asm.js ArrayBuffer Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5114</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-928/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-11812.]]></description>
      <pubDate>Wed, 06 Dec 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-927: Adobe Acrobat Pro DC iframe Same Origin Policy Bypass Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4756</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-927/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16369.]]></description>
      <pubDate>Tue, 21 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-926: Adobe Photoshop JPEG2000 Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4891</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-926/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Photoshop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-11304.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-925: Apple macOS nsurlstoraged Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4927</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-925/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2017-13833.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-924: Apple macOS nsurlstoraged Heap-based Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4908</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-924/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2017-13829.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-923: systemd Network Name Resolution Manager NSEC Resource Record Pseudo-Types Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5076</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-923/</link>
      <description><![CDATA[This vulnerability allows remote attackers to cause a denial of service condition on vulnerable installations of systemd Network Name Resolution Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-15908.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-922: ThinPrint TPView JPEG2000 Parsing Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4856</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-922/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ThinPrint. An attacker must first obtain the ability to execute low-privileged code on the guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.2. The following CVEs are assigned: CVE-2017-4935.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-921: VMware Workstation NAT IP Fragment Reassembly Heap-based Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4909</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-921/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.2. The following CVEs are assigned: CVE-2017-4934.]]></description>
      <pubDate>Tue, 21 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-920: Apple Safari Node Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5096</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-920/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-13793.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-919: EMC Unisphere For VMAX vApp Manager ORBServlet Remote Credential Creation Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5070</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-919/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of EMC Unisphere For VMAX vApp Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-14375.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-918: Cisco Prime Network Analysis Module graph sfile Parameter Directory Traversal Arbitrary File Deletion Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4918</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-918/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of Cisco Prime Network Analysis Module. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 6.4. The following CVEs are assigned: CVE-2017-12285.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-917: Microsoft Windows EngLockSurface Time-Of-Check Time-Of-Use Race Condition Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5131</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-917/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2017-11851.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-916: Microsoft Windows VBScript Join Function Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5112</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-916/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11869.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-915: Microsoft Office Excel Workbook Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5105</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-915/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2017-11878.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-914: Microsoft Windows JavaScript Array Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5077</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-914/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-11856.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-913: Microsoft Chakra Spread Operator Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4912</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-913/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-8595.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-912: Microsoft Chakra Regular Expression Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5198</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-912/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.1. The following CVEs are assigned: CVE-2017-11858.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-911: Microsoft Windows win32k Menu Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5086</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-911/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2017-11847.]]></description>
      <pubDate>Mon, 20 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-910: Adobe Reader DC JPEG2000 QCC Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5221</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-910/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16402.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-909: Adobe Reader DC JPEG2000 ihdr Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5220</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-909/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16400.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-908: Adobe Acrobat Pro DC ImageConversion EMF EMR_COMMENT Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5219</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-908/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16401.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-907: Adobe Acrobat Pro DC ImageConversion EMF EmfPlusObject Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5218</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-907/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16404.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-906: Adobe Acrobat Pro DC ImageConversion EMF EmfPlusDrawBeziers Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5202</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-906/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16403.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-905: Adobe Acrobat Pro DC XPS TIFF Rational Data Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5039</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-905/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16382.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-904: Adobe Acrobat Pro DC XPS TIFF PhotometricInterpretation Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5036</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-904/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16385.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-903: Adobe Acrobat Pro DC XPS TIFF dir Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5040</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-903/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16381.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-902: Adobe Acrobat Pro DC XPS JPEG APP13 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5034</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-902/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16386.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-901: Adobe Acrobat Pro DC XPS PNG tEXT Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5037</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-901/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16384.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-900: Adobe Acrobat Pro DC XPS JPEG APP2 Parsing Heap-based Buffer Overflow Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5038</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-900/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16383.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-899: Adobe Reader DC JPEG2000 Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4972</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-899/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16387.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-898: Foxit Reader removeField Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5296</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-898/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16587.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-897: Foxit Reader addAnnot Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5295</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-897/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16586.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-896: Foxit Reader App response Use-After-Free Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-5294</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-896/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16585.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-895: Foxit Reader util printf Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5290</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-895/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16584.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-894: Foxit Reader XFA datasets Use-After-Free Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-5289</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-894/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16583.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-893: Foxit Reader clearItems Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5288</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-893/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16582.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-892: Foxit Reader Document author Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5282</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-892/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16581.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-891: Foxit Reader XFA ImageField Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5281</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-891/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16580.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-890: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5244</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-890/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16579.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-889: Foxit Reader XFA picture Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5216</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-889/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16578.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-888: Foxit Reader Field alignment Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5094</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-888/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16577.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-887: Foxit Reader XFA field element Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5092</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-887/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16576.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-886: Foxit Reader XFA bind Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5091</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-886/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16575.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-885: Foxit Reader Image Filter Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5079</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-885/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16574.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-884: Foxit Reader LZWDecode filter Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5078</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-884/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16573.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-883: Foxit Reader FormCalc closeDoc Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5073</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-883/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16572.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-882: Foxit Reader FormCalc app Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5072</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-882/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-16571.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-881: Foxit Reader XFA Layout pageSpan Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5029</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-881/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14837.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-880: Foxit Reader Annotations modDate Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5028</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-880/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14836.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-879: Foxit Reader XFA Layout page Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5027</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-879/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14835.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-878: Foxit Reader FileAttachment Annotations style Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5026</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-878/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14834.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-877: Foxit Reader Text Annotations style Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5025</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-877/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14833.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-876: Foxit Reader Caret Annotations style Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5024</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-876/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14832.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-875: Foxit Reader Circle Annotations author  Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5023</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-875/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14831.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-874: Foxit Reader XFAScriptObject setFocus Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5022</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-874/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14830.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-873: Foxit Reader XFAScriptObject openList Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5021</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-873/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14829.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-872: Foxit Reader XFA Layout w Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-872/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14828.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-871: Foxit Reader XFA Nodes append Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5019</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-871/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14827.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-870: Foxit Reader XFA Nodes formNodes Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5018</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-870/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14826.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-869: Foxit Reader XFAScriptObject remove Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5017</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-869/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14825.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-868: Foxit Reader XFAScriptObject insert Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5016</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-868/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14824.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-867: Foxit Reader XFA Signature Object signer Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-867/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-14823.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-866: Foxit Reader JPEG2000 SIZ marker xOsiz Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5014</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-866/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-14822.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-865: Foxit Reader JPEG2000 SIZ marker xTsiz Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5013</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-865/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-14821.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-864: Foxit Reader JPEG2000 SOT tile index Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5012</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-864/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-14820.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-863: Foxit Reader JPEG2000 cdef channel number Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5011</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-863/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-14819.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-862: Foxit Reader JPEG2000 Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4982</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-862/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-14818.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-861: Foxit Reader Link setAction Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4981</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-861/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-10959.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-860: Foxit Reader Field value Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4980</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-860/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-10958.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-859: Foxit Reader Annotations arrowEnd Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4979</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-859/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-10957.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-858: Foxit Reader JPEG2000 SOT marker tile index Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4978</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-858/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-10956.]]></description>
      <pubDate>Tue, 14 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-857: Foxit Reader JPEG2000 SIZ marker yTsiz Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4977</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-857/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16589.]]></description>
      <pubDate>Wed, 29 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-856: Foxit Reader JPEG2000 SOT marker Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4976</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-856/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-16588.]]></description>
      <pubDate>Wed, 29 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-855: Hewlett Packard Enterprise Intelligent Management Center perfAccessMgrServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4810</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-855/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8962.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-854: Hewlett Packard Enterprise Intelligent Management Center TopoReqServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4811</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-854/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8963.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-853: Hewlett Packard Enterprise Intelligent Management Center TopoBroadcastServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4812</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-853/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8964.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-852: Hewlett Packard Enterprise Intelligent Management Center TopoDebugServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4813</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-852/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8967.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-851: Hewlett Packard Enterprise Intelligent Management Center AccessMgrServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4814</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-851/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8965.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-850: Hewlett Packard Enterprise Intelligent Management Center TopoMsgServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4815</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-850/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8966.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-849: Hewlett Packard Enterprise Intelligent Management Center flexFileUpload Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4758</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-849/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be easily bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8961.]]></description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-848: Microsoft Chakra asm.js ArrayBuffer Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5115</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-848/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-11812.]]></description>
      <pubDate>Wed, 11 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-847: Microsoft Office Excel xls File Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4948</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-847/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2017-11790.]]></description>
      <pubDate>Wed, 11 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-846: Microsoft Windows DNSAPI NSEC3_RecordRead Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5207</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-846/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11779.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-845: Microsoft Windows Submenu Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5199</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-845/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2017-8689.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-844: Microsoft Chakra Array JIT Optimization Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5084</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-844/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2017-11800.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-843: Microsoft Windows SMB Out-Of-Bounds Read Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5069</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-843/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service on vulnerable installations of Microsoft Windows. Authentication is required to exploit this vulnerability, assuming the product is in its default configuration. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-11781.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-842: Microsoft Edge substringData Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5059</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-842/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2017-11794.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-841: Microsoft Windows Font Embedding Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4967</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-841/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2017-11762.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-840: Microsoft Windows XLS File Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4702</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-840/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-8717.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-839: Microsoft Windows XLS File Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4669</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-839/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-8718.]]></description>
      <pubDate>Tue, 10 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-838: (0Day) Microsoft Windows WAV File Uninitialized Pointer Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5130</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-838/</link>
      <description><![CDATA[This vulnerability allows remote attackers to cause a denial-of-service condition on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0.]]></description>
      <pubDate>Fri, 06 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-837: Cisco License Manager Server ReportCSV Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4635</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-837/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Cisco License Manager Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2017-12263.]]></description>
      <pubDate>Wed, 04 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-836: Hewlett Packard Enterprise Intelligent Management Center dbman Opcode 10012 Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4896</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-836/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-12561.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-835: Hewlett Packard Enterprise Intelligent Management Center mibFileServlet Directory Traversal Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4809</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-835/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary directories on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12560.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-834: Hewlett Packard Enterprise Intelligent Management Center mibFileServlet Directory Traversal Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4808</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-834/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-12559.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-833: Hewlett Packard Enterprise Intelligent Management Center WebDMServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4761</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-833/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-12558.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-832: Hewlett Packard Enterprise Intelligent Management Center WebDMDebugServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4760</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-832/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-12557.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-831: Hewlett Packard Enterprise Intelligent Management Center MibBrowserTopoFilterServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4759</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-831/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-12556.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-830: Hewlett Packard Enterprise Intelligent Management Center mibFileServlet Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-830/</link>
      <description><![CDATA[This vulnerability allows remote attackers to rename arbitrary files on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-12554.]]></description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-829: Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5071</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-829/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Trend Micro OfficeScan. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2017-14088.]]></description>
      <pubDate>Wed, 27 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-828: Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5068</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-828/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Trend Micro OfficeScan. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2017-14088.]]></description>
      <pubDate>Wed, 27 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-827: Dell EMC VNX Monitoring and Reporting Scheduler Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4754</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-827/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Dell EMC VNX Monitoring and Reporting. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2017-8007.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-826: Dell EMC VNX Monitoring and Reporting RMI Registry Deserialization of Untrusted Data Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4807</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-826/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial of service on vulnerable installations of Dell EMC VNX Monitoring and Reporting. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.  The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-8012.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-825: Hewlett Packard Enterprise Application Performance Management Staging Data Replicator hpbsmsdr Missing Authentication for Critical Function Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4825</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-825/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Application Performance Management Staging Data Replicator.  The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2017-14350.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-824: Apple Safari RegExp replace Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4955</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-824/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-7111.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-823: Apple Safari JSString Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4771</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-823/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-7095.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-822: Apple Safari RenderFlowThread Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4717</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-822/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-7091.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-821: Apple Safari String link Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4712</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-821/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-7092.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-820: Apple Safari BoundFunction Out-Of-Bounds Access Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4711</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-820/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2017-7093.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-819: (0Day) Eaton ELCSoft SegCmt Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4553</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-819/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eaton ELCSoft.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-17-818: (0Day) Eaton ELCSoft LAD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-4637</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-17-818/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Eaton ELCSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Tue, 26 Sep 2017 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
