<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Thu, 30 Apr 2026 18:44:07 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-18-1450: (Pwn2Own) Samsung Galaxy S8 Shannon Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5785</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1450/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8. User interaction is required to exploit this vulnerability in that the target must answer a phone call. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-14319.]]></description>
      <pubDate>Mon, 04 Mar 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1449: Oracle VirtualBox crUnpackMap2d Integer Overflow Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7228</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1449/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.8. The following CVEs are assigned: CVE-2018-3293.]]></description>
      <pubDate>Thu, 24 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1448: Oracle VirtualBox crUnpackMap1d Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7227</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1448/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2018-3293.]]></description>
      <pubDate>Thu, 24 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1447: Oracle VirtualBox crServerReturnValue Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7164</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1447/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-3293.]]></description>
      <pubDate>Thu, 24 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1446: OMRON CX-Supervisor sr3 File Parsing Script API HWND Object Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6657</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1446/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2018-17909.]]></description>
      <pubDate>Thu, 24 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1445: Adobe Acrobat Pro DC TTF Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7534</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1445/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2018-19728.]]></description>
      <pubDate>Tue, 22 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1444: Horner Automation Cscape CSP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6433</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1444/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1443: Horner Automation Cscape CSP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6432</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1443/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1442: Horner Automation Cscape CSP File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6431</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1442/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1441: Horner Automation Cscape CSP File Parsing Out-Of-Bounds Read Information  Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6430</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1441/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1440: Horner Automation Cscape CSP File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6413</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1440/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1439: Horner Automation Cscape CSP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6412</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1439/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1438: Horner Automation Cscape CSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6411</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1438/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1437: Horner Automation Cscape CSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6410</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1437/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1436: Horner Automation Cscape CSP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1436/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1435: Horner Automation Cscape CSP File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6408</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1435/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1434: Horner Automation Cscape CSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6407</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1434/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-19005.]]></description>
      <pubDate>Wed, 02 Jan 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1433: Microsoft Chakra Array Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7603</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1433/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-8617.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1432: Microsoft Chakra Array Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7623</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1432/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-8617.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1431: Microsoft Chakra Array Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7622</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1431/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-8617.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1430: Microsoft Windows gdiplus GdipGetWinMetaFileBitsEx Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7427</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1430/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-8595.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1429: Microsoft Windows gdiplus bParseWin32Metafile Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7382</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1429/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-8596.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1428: Adobe Acrobat Pro DC EMF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6721</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1428/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-19721.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1427: Adobe Acrobat Pro DC U3D TIFF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6590</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1427/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-19723.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1426: Adobe Acrobat Pro DC ImageConversion EmfPlusDrawImagePoints Out-Of-Bounds Read Information Disclosure Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-6600</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1426/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-5035.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1425: Adobe Acrobat Pro DC EMF Parsing Memory Corruption Remote Code Execution Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-6589</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1425/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-5067.]]></description>
      <pubDate>Wed, 19 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1424: Microsoft Office Excel XLS File Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6918</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1424/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-8597.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1423: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6741</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1423/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-12778.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1422: Adobe Acrobat Pro DC EMF Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6726</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1422/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-16014.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1421: Adobe Acrobat Pro DC EMF Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6720</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1421/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-12845.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1420: Adobe Reader DC JavaScript ANSendForFormDistribution JavaScript API Restrictions Bypass Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-7297</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1420/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass JavaScript API restrictions on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.7. The following CVEs are assigned: CVE-2018-16018.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1419: Adobe Reader DC JavaScript CBSharedReviewCompleteAutomation JavaScript API Restrictions Bypass Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-7298</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1419/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass JavaScript API restrictions on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.7. The following CVEs are assigned: CVE-2018-16018.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1418: Adobe Reader DC JavaScript ANSendForSharedReview JavaScript API Restrictions Bypass Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-7272</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1418/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass JavaScript API restrictions on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.7. The following CVEs are assigned: CVE-2018-16018.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1417: Adobe Reader DC JavaScript AnnotsString Object Arbitrary Overwrite Restrictions Bypass Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-7230</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1417/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass API restrictions on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.7. The following CVEs are assigned: CVE-2018-16018.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1416: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6947</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1416/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16008.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1415: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6948</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1415/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-16026.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1414: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6772</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1414/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16008.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1413: Adobe Reader DC Onix GetRecordRM Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7038</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1413/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.6. The following CVEs are assigned: CVE-2018-16007.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1412: Adobe Reader DC Onix NextKey Integer Underflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7005</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1412/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.7. The following CVEs are assigned: CVE-2018-16009.]]></description>
      <pubDate>Mon, 17 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1411: Schneider Electric GUIcon GD1 File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6959</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1411/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric GUIcon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-7813.]]></description>
      <pubDate>Fri, 14 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1410: Schneider Electric GUIcon GD1 File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6965</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1410/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric GUIcon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-7815.]]></description>
      <pubDate>Fri, 14 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1409: Schneider Electric GUIcon GD1 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6960</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1409/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric GUIcon.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-7814.]]></description>
      <pubDate>Fri, 14 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1408: Microsoft Windows JScript Array concat Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7156</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1408/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows JScript. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-8643.]]></description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1407: Microsoft Chakra JavaScript Array Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7552</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1407/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2018-8618.]]></description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1406: Microsoft Office PowerPoint PPT File Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6745</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1406/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2018-8628.]]></description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1405: Microsoft Office Excel XLS File Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6901</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1405/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-8598.]]></description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1404: Microsoft Windows gd132full  PlayEnhMetaFile Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6515</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1404/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.1. The following CVEs are assigned: CVE-2018-8596.]]></description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1403: Microsoft Excel gdiplus EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7256</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1403/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.7. The following CVEs are assigned: CVE-2018-8595.]]></description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1402: Adobe Acrobat Pro DC XSLT Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6946</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1402/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2018-16024.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1401: Adobe Reader DC Onix32 Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7296</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1401/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-19719.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1400: Adobe Reader DC Onix32 Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1400/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-19720.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1399: Adobe Acrobat Pro DC XSLT Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6743</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1399/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-16023.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1398: Adobe Acrobat Pro DC ImageConversion XPS Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7354</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1398/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-19714.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1397: Adobe Acrobat Pro DC TTF Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7239</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1397/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-19711.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1396: Adobe Acrobat Pro DC TTF Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7238</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1396/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-19712.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1395: Adobe Acrobat Pro DC XFA Form Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7197</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1395/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-19713.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1394: Adobe Acrobat Pro DC WebLink borderWidth Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6751</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1394/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.   The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16025.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1393: Adobe Acrobat Pro DC WebLink borderColor Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6750</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1393/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16027.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1392: Adobe Acrobat Pro DC ImageConversion XPS font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1392/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-16028.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1391: Adobe Acrobat Pro DC WebLink highlightMode Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6752</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1391/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16029.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1390: Adobe Acrobat Pro DC ImageConversion XPS font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7165</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1390/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-16030.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1389: Adobe Reader DC Onix Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1389/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.7. The following CVEs are assigned: CVE-2018-16010.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1388: Adobe Reader DC Onix ReadKey Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7006</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1388/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.7. The following CVEs are assigned: CVE-2018-16005.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1387: Adobe Reader DC Onix IndexManagerT GetRecordInfo Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6922</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1387/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2018-16004.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1386: Adobe Reader DC AFLayoutInfo Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6655</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1386/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.6. The following CVEs are assigned: CVE-2018-16003.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1385: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6774</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1385/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16008.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1384: Adobe Acrobat Pro DC TTF Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6744</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1384/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-16012.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1383: Adobe Acrobat Pro DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1383/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-16002.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1382: Adobe Acrobat Pro DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1382/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-16001.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1381: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-6551</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1381/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2018-15997.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1380: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6552</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1380/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-15992.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1379: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6584</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1379/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-15994.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1378: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6583</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1378/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-15993.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1377: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6510</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1377/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-15991.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1376: Adobe Acrobat Pro DC TTF Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability ]]></title>
      <guid isPermaLink="false">ZDI-CAN-6707</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1376/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-15996.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1375: Adobe Acrobat Pro DC XSLT Parsing Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6631</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1375/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-15995.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1374: Adobe Acrobat Pro DC ImageConversion XPS GSUB Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7039</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1374/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-15985.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1373: Adobe Acrobat DC Onix ReadBTreeT::NextKey Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6919</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1373/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2018-16043.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1372: Adobe Acrobat Pro DC search Javascript Restrictions Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6903</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1372/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass Javascript API restrictions on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.2. The following CVEs are assigned: CVE-2018-16044.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1371: Adobe Acrobat Pro DC Onix ReadBTreeT::FindKeyInInteriorPage Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6897</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1371/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.2. The following CVEs are assigned: CVE-2018-16045.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1370: Adobe Acrobat Pro DC Onix FileClassT Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6900</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1370/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.2. The following CVEs are assigned: CVE-2018-16046.]]></description>
      <pubDate>Wed, 12 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1369: Apache2 mod_http2 header Denial of Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7168</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1369/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial of service condition on vulnerable installations of Apache HTTPD server.  Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2018-11763.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1368: OMRON CX-One CXP File Parsing Stack-based Buffer Overflow Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6610</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1368/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-18993.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1367: OMRON CX-One CX-Programmer CXP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6608</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1367/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-18989.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1366: OMRON CX-One CX-Position NCI File Parsing Stack-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6603</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1366/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-18993.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1365: Apple macOS shm Uninitialized Data Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7299</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1365/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2018-4435.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1364: Apple macOS AMDFramebuffer Integer Overflow Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7302</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1364/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2018-4462.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1363: Apple macOS watchevent Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7310</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1363/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-4447.]]></description>
      <pubDate>Mon, 10 Dec 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1362: Juuko DATA Packet Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6462</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1362/</link>
      <description><![CDATA[This vulnerability allows remote attackers to issue commands on vulnerable installations of Juuko equipment. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2018-19025.]]></description>
      <pubDate>Mon, 22 Aug 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1361: (0Day) INVT Electric VT-Designer PM3 File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6428</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1361/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-18987.]]></description>
      <pubDate>Mon, 26 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1360: (0Day) INVT Electric VT-Designer File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6414</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1360/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of INVT VT-Designer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-18983.]]></description>
      <pubDate>Mon, 26 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1359: Epic Games Launcher Protocol Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7241</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1359/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Visual Studio with tools for Unreal Engine development installed. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-17707.]]></description>
      <pubDate>Fri, 23 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1358: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6740</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1358/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-12835.]]></description>
      <pubDate>Thu, 22 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1357: Microsoft Windows NtGdiExtTextOutW Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6991</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1357/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.4. The following CVEs are assigned: CVE-2018-8553.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1356: Microsoft Word doc File Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6706</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1356/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-8573.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1355: Microsoft Exchange Server NTLM Reflection EWS User Impersonation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6548</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1355/</link>
      <description><![CDATA[This vulnerability allows remote attackers to impersonate arbitrary users on vulnerable installations of Microsoft Exchange Server. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2018-8581.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1354: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6711</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1354/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-7521.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1353: OMRON CX-Supervisor scs File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6691</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1353/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2018-7521.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1352: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6687</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1352/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-7521.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1351: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6663</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1351/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-7521.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1350: Microsoft Edge Chakra Engine Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1350/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2018-8588.]]></description>
      <pubDate>Tue, 20 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1349: Microsoft Windows VBScript Class_Terminate Scripting.Dictionary Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6749</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1349/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows VBScript. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-8544.]]></description>
      <pubDate>Wed, 21 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1348: Adobe Photoshop JPEG2000 Image Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6567</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1348/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Photoshop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-15980.]]></description>
      <pubDate>Tue, 20 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1347: Adobe Acrobat Pro DC HTML2PDF HTML Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6580</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1347/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-12835.]]></description>
      <pubDate>Tue, 20 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1346: Apple macOS NECP Control Socket Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6417</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1346/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-4425.]]></description>
      <pubDate>Tue, 20 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1345: Cisco WebEx Recorder and Player asplayback Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6406</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1345/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Cisco WebEx Recorder and Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 20 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1344: Apple macOS usymptomsd Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6350</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1344/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-4203.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1343: Apple macOS IntelFBClientControl doAtribute Uninitialized Memory Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1343/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.7. The following CVEs are assigned: CVE-2018-4351.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1342: Apple macOS nsurlstoraged Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6138</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1342/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-4126.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1341: Apple macOS nsurlstoraged Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6137</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1341/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 1.9. The following CVEs are assigned: CVE-2018-4126.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1340: (Pwn2Own) Apple macOS Dock Service DSSetDesktopForDisplayAndSpace Uninitialized Pointer Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5827</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1340/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-4196.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1339: (Pwn2Own) Apple macOS task_set_special_port Port Overwrite Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5821</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1339/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2018-4237.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1338: (Pwn2Own) Apple macOS launchd Improper Access Check Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5820</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1338/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-4404.]]></description>
      <pubDate>Mon, 05 Nov 2018 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1337: Losant Arduino MQTT Client Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6436</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1337/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client. User interaction is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2018-17614.]]></description>
      <pubDate>Fri, 02 Nov 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1336: (0Day) Juuko JK-800 Replay Attack Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1336/</link>
      <description><![CDATA[This vulnerability allows remote attackers to issue commands on vulnerable installations of Juuko equipment.  Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.3.]]></description>
      <pubDate>Fri, 02 Nov 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1335: Apple Safari FrameLoader Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7134</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1335/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.6. The following CVEs are assigned: CVE-2018-4375.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1334: Apple macOS sysctl_procargsx Uninitialized Buffer Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6839</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1334/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.7. The following CVEs are assigned: CVE-2018-4413.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1333: Apple macOS IOFramebufferUserClient Race Condition Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6834</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1333/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2018-4422.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1332: Apple Safari RenderCounter Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6497</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1332/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.6. The following CVEs are assigned: CVE-2018-4376.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1331: Advantech WebAccess Client Improper Access Control Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7167</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1331/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Advantech WebAccess Client.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.4. The following CVEs are assigned: CVE-2018-17908.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1330: Advantech WebAccess Client bwswfcfg Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7166</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1330/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-17910.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1329: Advantech WebAccess Node Improper Access Control Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7154</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1329/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Advantech WebAccess Node.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.4. The following CVEs are assigned: CVE-2018-17908.]]></description>
      <pubDate>Wed, 31 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1328: Apple macOS mDNSOffloadUserClient Race Condition Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6821</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1328/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-4326.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1327: Apple macOS libATSServer Heap-based Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6360</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1327/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-4411.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1326: Apple macOS NECP Control Socket Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6378</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1326/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-4425.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1325: Apple macOS NECP Control Socket Type Confusion Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6363</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1325/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-4425.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1324: Apple macOS AppleGraphicsDevicePolicy Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6488</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1324/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-4410.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1323: Apple Safari WebCrypto Race Condition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6388</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1323/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-4373.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1322: Apple macOS AppleGPUWrangler Logging Uninitialized Memory Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6149</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1322/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.7. The following CVEs are assigned: CVE-2018-4417.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1321: (Pwn2Own) Apple Safari CreateThis Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5819</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1321/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-4233.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1320: Apple macOS WindowServer XRegisterForKey Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5813</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1320/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2018-4193.]]></description>
      <pubDate>Tue, 30 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1319:  Advantech WebAccess Node Product Installation File Access Control Modification Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6828</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1319/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Advantech WebAccess Node. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-14828.]]></description>
      <pubDate>Thu, 25 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1318: Saga Radio SAGA1-L8B Firmware Upgrade Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6542</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1318/</link>
      <description><![CDATA[This vulnerability allows attackers with physical access to modify firmware on vulnerable installations of Saga Radio equipment. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.  The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2018-17923.]]></description>
      <pubDate>Thu, 25 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1317: Saga Radio SAGA1-L8B Remote Controller Forced-Pairing Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6526</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1317/</link>
      <description><![CDATA[This vulnerability allows remote attackers to issue commands on vulnerable installations of Saga Radio equipment. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2018-17921.]]></description>
      <pubDate>Thu, 25 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1316: Saga Radio SAGA1-L8B Replay Attack and Command Forgery Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6186</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1316/</link>
      <description><![CDATA[This vulnerability allows remote attackers to issue commands on vulnerable installations of Saga Radio equipment. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.3. The following CVEs are assigned: CVE-2018-17903.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1315: Telecrane F25 Replay Attack Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6188</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1315/</link>
      <description><![CDATA[This vulnerability allows remote attackers to issue commands on vulnerable installations of Telecrane equipment. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.3. The following CVEs are assigned: CVE-2018-17935.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1314: Advantech WebAccess Client bwnodeip Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6302</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1314/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1313: Advantech WebAccess Client bwwebd Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6301</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1313/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1312: Advantech WebAccess Client bwwebv Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6300</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1312/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1311: Advantech WebAccess Client bwrunmie Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6299</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1311/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1310: Advantech WebAccess Client bwsound2 Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6298</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1310/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1309: Advantech WebAccess Client bwsound Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6297</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1309/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1308: Advantech WebAccess Client bwprtscr Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6296</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1308/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1307: Advantech WebAccess Client bwclient Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6295</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1307/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1306: Advantech WebAccess Client bwclrptw Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6294</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1306/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1305: Advantech WebAccess Client upandpr Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6293</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1305/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1304: Advantech WebAccess Client bwwebv Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6292</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1304/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1303: Advantech WebAccess Node bwdraw Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6290</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1303/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1302:  Advantech WebAccess Node bwmakdir Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6289</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1302/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1301: Advantech WebAccess webvrpcs Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6288</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1301/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2018-14806.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1300:  Advantech WebAccess Node webvrpcs ViewDll1 Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6287</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1300/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1299: Advantech WebAccess Node drawsrv Arbitrary File Deletion Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1299/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2018-14820.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1298: Advantech WebAccess Node screnc Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6285</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1298/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2018-14816.]]></description>
      <pubDate>Wed, 24 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1297: Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6372</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1297/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-18329.]]></description>
      <pubDate>Fri, 19 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1296: Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1296/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-18328.]]></description>
      <pubDate>Fri, 19 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1295: Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6370</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1295/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-18327.]]></description>
      <pubDate>Fri, 19 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1294: Trend Micro Anti-Virus ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6369</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1294/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-15367.]]></description>
      <pubDate>Fri, 19 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1293: Trend Micro Anti-Virus UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6368</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1293/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-15366.]]></description>
      <pubDate>Fri, 19 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1292: Oracle VirtualBox crServerDispatchReadPixels Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7329</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1292/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2018-3293.]]></description>
      <pubDate>Thu, 18 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1291: Apple macOS getsockopt Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6203</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1291/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1290: Microsoft Visual Studio Code URL Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-5567</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1290/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Visual Studio Code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1289: OMRON Industrial Automation CX-Supervisor CSNewDataSets Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6612</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1289/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-17913.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1288: OMRON CX-Supervisor SCS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6404</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1288/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17907.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1287: OMRON CX-Supervisor SCS File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6401</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1287/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17905.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1286: OMRON CX-Supervisor SCS File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6418</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1286/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17913.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1285: OMRON CX-Supervisor PAG Image Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6419</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1285/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of OMRON CX-Supervisor.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-17907.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1284: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6402</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1284/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1283: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6403</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1283/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1282: OMRON CX-Supervisor PAG File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6581</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1282/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1281: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6582</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1281/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1280: OMRON CX-Supervisor SCS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6427</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1280/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-17907.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1279: OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6446</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1279/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1278: Oracle VirtualBox crServerDispatchGenRenderbuffersEXT Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1278/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-3297.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1277: Oracle VirtualBox crServerDispatchGenFramebuffersEXT Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6836</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1277/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-3296.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1276: Oracle VirtualBox crServerDispatchGenBuffersARB Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6835</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1276/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-2909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1275: Oracle VirtualBox crServerDispatchGenTextures Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6665</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1275/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-3298.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1274: Oracle VirtualBox crServerDispatchGenProgramsNV Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6664</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1274/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2018-3287.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1273: Oracle Outside In vsxl5 GelFrame Record Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1273/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Oracle Outside In. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2018-3147.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1272: Oracle VirtualBox crServerDispatchAreTexturesResident Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6633</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1272/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3289.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1271: Oracle VirtualBox crServerDispatchAreProgramsResidentNV Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6632</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1271/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3288.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1270: Oracle VirtualBox crServerDispatchGenQueriesARB Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6598</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1270/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3291.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1269: Oracle VirtualBox crServerDispatchGenProgramsARB Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6599</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1269/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3292.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1268: Oracle VirtualBox crServerDispatchGenTextures Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6597</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1268/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3298.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1267: Oracle VirtualBox crServerDispatchGenBuffersARB Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6596</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1267/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-2909.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1266: Oracle VirtualBox crServerDispatchGenRenderbuffersEXT Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6595</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1266/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3297.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1265: Oracle VirtualBox crServerDispatchGenFramebuffersEXT Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6594</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1265/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3296.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1264: Oracle VirtualBox crServerDispatchPrioritizeTextures Integer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6593</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1264/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.9. The following CVEs are assigned: CVE-2018-3290.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1263: Oracle Java Usage Tracker usagetracker.properties Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6366</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1263/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on vulnerable installations of Oracle Java. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.2. The following CVEs are assigned: CVE-2018-3211.]]></description>
      <pubDate>Wed, 17 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1262: LAquis SCADA LQS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6630</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1262/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17901	.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1261: LAquis SCADA LQS File Parsing Patamar Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6602</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1261/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17901	.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1260: LAquis SCADA lqs File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6451</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1260/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-17895.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1259: Laquis SCADA editorldriver Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6546</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1259/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-17911.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1258: Laquis SCADA vrel Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6545</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1258/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-17911.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1257: Laquis SCADA aq Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6544</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1257/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-17911	.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1256: LAquis SCADA lqs File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6450</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1256/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-17895.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1255: LAquis SCADA LQS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6447</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1255/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-17895.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1254: LAquis SCADA LQS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6377</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1254/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17901.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1253: LAquis SCADA LQS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6374</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1253/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17895.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1252: LAquis SCADA LQS File Parsing Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6373</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1252/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2018-17899.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-18-1251: LAquis SCADA LQS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-6319</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-18-1251/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of LAquis SCADA Software. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2018-17895.]]></description>
      <pubDate>Tue, 16 Oct 2018 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
