<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Sat, 16 May 2026 18:08:28 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-19-1045: Hewlett Packard Enterprise Intelligent Management Center faultDevParasSet Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8970</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1045/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-7143.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1044: Hewlett Packard Enterprise Intelligent Management Center eventInfo_content Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8971</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1044/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-7142.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1043: Hewlett Packard Enterprise Intelligent Management Center addVsiInterfaceInfo Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8967</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1043/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-24652.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1042: Hewlett Packard Enterprise Intelligent Management Center addDeviceToView Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8968</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1042/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-7141.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1041: Hewlett Packard Enterprise Intelligent Management Center operatorOnlineList_content Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8965</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1041/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-24630.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1040: Hewlett Packard Enterprise Intelligent Management Center SyslogTempletSelectWin Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8964</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1040/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-24651.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1039: Hewlett Packard Enterprise Intelligent Management Center legend Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8963</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1039/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-24650.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1038: Hewlett Packard Enterprise Intelligent Management Center UrlAccessController Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8943</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1038/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Hewlett Packard Enterprise Intelligent Management Center. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-24629.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1037: Hewlett Packard Enterprise Intelligent Management Center tftpserver Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8935</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1037/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-24646.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1036: Hewlett Packard Enterprise Intelligent Management Center AccessMgrServlet className Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8928</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1036/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Intelligent Management Center. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-24648.]]></description>
      <pubDate>Wed, 29 Jan 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1035: Tencent WeChat name Field Unsafe Redirection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9302</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1035/</link>
      <description><![CDATA[This vulnerability allows remote attackers redirect users to an external resource on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must be within a chat session together with the attacker. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2019-17151.]]></description>
      <pubDate>Tue, 31 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1034: (0Day) WECON PLC Editor PLCDataCeter Port Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9123</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1034/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18236.]]></description>
      <pubDate>Mon, 30 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1033: (0Day) WECON PLC Editor PLCDataCeter PortPath Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1033/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18236.]]></description>
      <pubDate>Mon, 30 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1032: (0Day) WECON PIStudio HSC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8927</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1032/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PIStudio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2018-14810.]]></description>
      <pubDate>Mon, 30 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1031: D-Link DCS-960L HNAP SOAPAction Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8458</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1031/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link DCS-960L. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-17146.]]></description>
      <pubDate>Mon, 23 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1030: Docker docker-credential-secretservice Double Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8921</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1030/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Docker. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17150.]]></description>
      <pubDate>Fri, 20 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1029: Docker docker-credential-helpers Double Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8920</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1029/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Docker. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17149.]]></description>
      <pubDate>Fri, 20 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1028: Parallels Desktop Command Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8685</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1028/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17148.]]></description>
      <pubDate>Fri, 20 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1027: Apple macOS AudioToolbox MP4 Parsing Integer Overflow Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8806</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1027/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8850.]]></description>
      <pubDate>Fri, 20 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1026: Apple macOS apfs Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8767</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1026/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-8835.]]></description>
      <pubDate>Thu, 19 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1025: Trend Micro Maximum Security Link Resolution Information Disclosure And Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9391</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1025/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information or to create a denial-of-service condition on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2019-19693.]]></description>
      <pubDate>Thu, 19 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1024: Oracle ADF Faces Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8823</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1024/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle ADF Faces. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-2904.]]></description>
      <pubDate>Thu, 19 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1023: (0Day) Microsoft Windows WebDAV Path Parsing Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1023/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Tue, 17 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1022: Apple Safari commitPropertyChange Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8608</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1022/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0.]]></description>
      <pubDate>Tue, 17 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1021: Advantech DiagAnywhere FOLDER_REMOVE Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9489</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1021/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech DiagAnywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-18257.]]></description>
      <pubDate>Fri, 13 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1020: Advantech DiagAnywhere SET_CURR_DIR Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9488</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1020/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech DiagAnywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-18257.]]></description>
      <pubDate>Fri, 13 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1019: Advantech DiagAnywhere FILE_CREATE Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9485</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1019/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech DiagAnywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-18257.]]></description>
      <pubDate>Fri, 13 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1018: Advantech DiagAnywhere FILE_OPEN_RO Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9487</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1018/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech DiagAnywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-18257.]]></description>
      <pubDate>Fri, 13 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1017: Advantech DiagAnywhere FOLDER_CREATE Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9486</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1017/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech DiagAnywhere. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-18257.]]></description>
      <pubDate>Fri, 13 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1016: Microsoft Windows GreSetMagicColors Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9385</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1016/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1408.]]></description>
      <pubDate>Fri, 13 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1015: (0Day) WECON PLC Editor WCP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8456</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1015/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Wecon PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18236.]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1014: (0Day) NETGEAR AC1200 mini_httpd Cleartext Transmission of Sensitive Information Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8671</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1014/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR AC1200 Smart WiFi Router. User interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.7.]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1013: (0Day) Microsoft Windows Kernel Type 1 Font Processing Stack Exhaustion Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8824</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1013/</link>
      <description><![CDATA[This vulnerability allows remote attackers to cause a denial-of-service condition on machines running affected versions of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must open a malicious font. The ZDI has assigned a CVSS rating of 5.5.]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1012: (0Day) Linux Kernel proc stat Improper Access Control Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7607</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1012/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5.]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1011: (0Day) NETGEAR AC1200 mini_httpd Password Storage Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8615</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1011/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on vulnerable installations of NETGEAR AC1200 Smart WiFi Router. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4.]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1010: (0Day) Advantech WebAccess Node BwOpcBs Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7883</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1010/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8.]]></description>
      <pubDate>Thu, 12 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1009: Apple macOS fseventsd  Uninitialized Buffer Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8613</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1009/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-8798.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1008: Microsoft Windows EMF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9363</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1008/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-1465.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1007: Microsoft Windows EMF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9344</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1007/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-1466.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1006: Microsoft PowerPoint PPT File Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9339</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1006/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-1462.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1005: Microsoft Windows AppX Deployment Service Hard Link Escalation of Privilege Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9320</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1005/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2019-1483.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1004: Microsoft Windows Font Subsetting Library Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1004/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-1468.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1003: Microsoft Windows Media Player Color Conversion Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8186</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1003/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2019-1481.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1002: Microsoft Windows Media Player Color Transform Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8029</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1002/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2019-1480.]]></description>
      <pubDate>Wed, 11 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1001: Adobe Acrobat Pro DC XFA Form Use-After-Free  Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9237</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1001/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8257.]]></description>
      <pubDate>Tue, 10 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-1000: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8624</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-1000/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13510.]]></description>
      <pubDate>Mon, 09 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-999: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8623</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-999/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13510.]]></description>
      <pubDate>Mon, 09 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-998: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8600</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-998/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13510.]]></description>
      <pubDate>Mon, 09 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-997: OMRON CX-Supervisor Vulnerable Third-Party Component Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9313</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-997/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-18251.]]></description>
      <pubDate>Mon, 09 Dec 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-996: Dell EMC Storage Monitoring and Reporting Java RMI Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8929</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-996/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dell EMC Storage Monitoring and Reporting. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-18580.]]></description>
      <pubDate>Tue, 26 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-995: Apple macOS UIFoundation Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8585</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-995/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8831.]]></description>
      <pubDate>Tue, 26 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-994: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8683</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-994/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13510.]]></description>
      <pubDate>Tue, 26 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-993: Rockwell Automation Arena Simulation DOE File Parsing Uninitialized Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8682</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-993/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13527.]]></description>
      <pubDate>Tue, 26 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-992: TP-LINK TL-WR841N Web Service http_parser_main Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8457</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-992/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-LINK TL-WR841N routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-17147.]]></description>
      <pubDate>Tue, 26 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-991: Phoenix Contact Automationworx MWT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8097</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-991/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-16675.]]></description>
      <pubDate>Tue, 26 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-990: Symantec Endpoint Protection Manager OpenSSL Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9477</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-990/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Symantec Endpoint Protection Manager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2019-18372.]]></description>
      <pubDate>Thu, 14 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-989: Symantec Endpoint Protection Manager LuComServer stDisScriptEngine Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9303</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-989/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Symantec Endpoint Protection Manager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-12759.]]></description>
      <pubDate>Thu, 14 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-988: VMware Workstation e1000 Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8933</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-988/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on affected installations of VMware Workstation. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2019-5541.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-987: Microsoft Windows splwow64 Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9393</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-987/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2019-1380.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-986: Microsoft Windows Kernel Type 1 Font Processing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9373</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-986/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.6. The following CVEs are assigned: CVE-2019-1456.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-985: Microsoft Windows EMF Parsing Integer Truncation Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9365</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-985/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-1441.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-984: Microsoft Windows vMatchAPal Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-984/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1394.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-983: Microsoft Windows ptransMatchAPal Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9291</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-983/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1393.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-982: Microsoft Windows CreateXlateObject Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9118</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-982/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1396.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-981: Microsoft Windows CreateXlateObject Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9110</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-981/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1395.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-980: Microsoft Windows Kernel Type 1 Font Processing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9265</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-980/</link>
      <description><![CDATA[This vulnerability allows attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.4. The following CVEs are assigned: CVE-2019-1412.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-979: Microsoft Windows AppX Deployment Service Hard Link Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9162</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-979/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2019-1385.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-978: Microsoft Windows InstallService Hard Link Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9156</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-978/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-1423.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-977: Microsoft Windows Kernel Type 1 Font Processing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9238</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-977/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.6. The following CVEs are assigned: CVE-2019-1419.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-976: Microsoft Windows ulGetNearestIndexFromColorref Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9100</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-976/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1408.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-975: Microsoft Windows UAC Unsafe Interaction Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9022</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-975/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to access an interactive desktop as a low-privileged user on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-1388.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-974: Microsoft Windows DirectWrite Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8057</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-974/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-1432.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-973: Microsoft Windows DirectWrite Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8053</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-973/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-1411.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-972: Microsoft Windows IP Helper Service Hard Link Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8945</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-972/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2019-1422.]]></description>
      <pubDate>Wed, 13 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-971: Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8932</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-971/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18240.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-970: Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8931</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-970/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18240.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-969: Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8904</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-969/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18240.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-968: Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8848</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-968/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18240.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-967: Fuji Electric V-Server VPR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8844</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-967/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-18240.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-966: Microsoft Windows vResetSurfacePalette Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9359</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-966/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1362.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-965: Oracle VirtualBox shader_get_registers_used Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8674</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-965/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2019-2867.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-964: Oracle VirtualBox Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8673</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-964/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2019-2867.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-963: Oracle VirtualBox Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8418</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-963/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2019-2867.]]></description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-962: Apple macOS AMDRadeonX4000_AMDSIGLContext Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8851</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-962/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8748.]]></description>
      <pubDate>Wed, 06 Nov 2019 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-961: Apple macOS AudioToolbox Interleave Out-of-Bounds Write Remote Code Execute Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8160</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-961/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-960: Advantech WISE-PaaS/RMM NodeRed Server Missing Authentication Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8891</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-960/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WISE-PaaS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-13547.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-959: Advantech WISE-PaaS/RMM RecoveryMgmt checkSN XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9229</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-959/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-958: Advantech WISE-PaaS/RMM UpgradeMgmt Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9101</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-958/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-13551.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-957: Advantech WISE-PaaS/RMM SQLMgmt insertData SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9145</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-957/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-956: Advantech WISE-PaaS/RMM SQLMgmt CreateTable SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9144</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-956/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-955: Advantech WISE-PaaS/RMM SQLMgmt getTableInfo SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-955/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-954: Advantech WISE-PaaS/RMM AccountMgmt registerAccount XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9098</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-954/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-953: Advantech WISE-PaaS/RMM AccountMgmt activateAccount XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9097</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-953/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-952: Advantech WISE-PaaS/RMM SQLMgmt updateData SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-952/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-951: Advantech WISE-PaaS/RMM SQLMgmt delData SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-951/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-950: Advantech WISE-PaaS/RMM UpgradeMgmt upload_ota Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9173</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-950/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-13551.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-949: Advantech WISE-PaaS/RMM PowerMgmt fuzzySearch SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9174</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-949/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-948: Advantech WISE-PaaS/RMM RecoveryMgmt fuzzySearch SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9177</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-948/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-947: Advantech WISE-PaaS/RMM AccountMgmt fuzzySearch XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9095</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-947/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-946: Advantech WISE-PaaS/RMM AccountMgmt LoginForJWT XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9096</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-946/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-945: Advantech WISE-PaaS/RMM WechatSignin wechattokenlogin XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9086</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-945/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-944: Advantech WISE-PaaS/RMM RecoveryMgmt ActionCommd_ota XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9094</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-944/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-943: Advantech WISE-PaaS/RMM RecoveryMgmt groupFuzzSearch XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9231</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-943/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-942: Advantech WISE-PaaS/RMM RecoveryMgmt checkSchName XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9230</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-942/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-941: Advantech WISE-PaaS/RMM RMSWatchDog distributer Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9226</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-941/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-13551.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-940: Advantech WISE-PaaS/RMM ProtectionMgmt fuzzySearch SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9190</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-940/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-939: Advantech WISE-PaaS/RMM AccountMgmt forgotPwd XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9213</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-939/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-938: Advantech WISE-PaaS/RMM DeviceMgmt fuzzySearch SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9191</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-938/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-937: Advantech WISE-PaaS/RMM SQLMgmt qryData SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-937/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-18229.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-936: Advantech WISE-PaaS/RMM RecoveryMgmt addRecoverySch XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9232</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-936/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WISE-PasS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2019-18227.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-935: Advantech WISE-PaaS/RMM upload2eMap Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8892</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-935/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WISE-PaaS/RMM. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-13551.]]></description>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-934: Apple macOS AppleIntelCFLGraphicsFramebuffer.kext Untrusted Pointer Dereference Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8828</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-934/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8755, CVE-2019-8758.]]></description>
      <pubDate>Thu, 31 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-933: Jenkins iceScrum Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8882</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-933/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins iceScrum. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-10443.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-932: Jenkins NeoLoad Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8873</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-932/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins NeoLoad. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-10440.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-931: (0Day) Jenkins Delphix Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8919</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-931/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Delphix. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-930: (0Day) Jenkins View26 Test-Reporting Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8889</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-930/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins View26 Test-Reporting. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-929: (0Day) Jenkins SOASTA CloudTest Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8885</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-929/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins SOASTA CloudTest. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-928: (0Day) Jenkins ElasticBox CI Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8880</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-928/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins ElasticBox CI. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-927: (0Day) Jenkins Fortify on Demand Uploader Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8879</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-927/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Fortify On Demand Uploader. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-926: (0Day) Jenkins Extensive Testing Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8878</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-926/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Extensive Testing. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-925: (0Day) Jenkins Sofy.AI Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8877</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-925/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins Sofy.AI. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-924: (0Day) Microsoft Windows cdrom Driver Memory Corruption Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9381</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-924/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5.]]></description>
      <pubDate>Wed, 30 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-923: Phoenix Contact Automationworx BCP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7783</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-923/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-16675.]]></description>
      <pubDate>Tue, 29 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-922: Phoenix Contact Automationworx BCP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-7782</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-922/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-16675.]]></description>
      <pubDate>Tue, 29 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-921: (Pwn2Own) Google Chromium RegExpReplace Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8378</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-921/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Google Chromium. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-13698.]]></description>
      <pubDate>Tue, 29 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-920: Apple Safari FrameDestructionObserver Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8574</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-920/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.0. The following CVEs are assigned: CVE-2019-8735.]]></description>
      <pubDate>Fri, 25 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-919: Apple macOS AudioCodecs Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8093</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-919/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8592.]]></description>
      <pubDate>Fri, 25 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-918: Oracle VirtualBox VMSVGA Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8653</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-918/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.0. The following CVEs are assigned: CVE-2019-3031.]]></description>
      <pubDate>Wed, 23 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-917: Oracle VirtualBox VMSVGA Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8652</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-917/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2019-3026.]]></description>
      <pubDate>Wed, 23 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-916: Oracle VirtualBox shader_record_register_usage Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8842</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-916/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2019-3017.]]></description>
      <pubDate>Wed, 23 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-915: Foxit PhantomPDF Dwg2Pdf DXF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9276</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-915/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17145.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-914: Foxit PhantomPDF Dwg2Pdf DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9274</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-914/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17144.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-913: Foxit PhantomPDF Dwg2Pdf DWG File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9273</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-913/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-17143.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-912: Foxit PhantomPDF ListBox Field Keystroke Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9081</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-912/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17142.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-911: Foxit PhantomPDF Text Field Calculate Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9044</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-911/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17141.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-910: Foxit PhantomPDF Signature Field OnFocus Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9091</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-910/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17140.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-909: Foxit PhantomPDF HTML2PDF HTML Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8692</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-909/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17139.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-908: Foxit Studio Photo JPEG Batch Processing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8809</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-908/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-17138.]]></description>
      <pubDate>Tue, 22 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-907: Adobe Media Encoder CC MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8804</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-907/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder CC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8243.]]></description>
      <pubDate>Mon, 21 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-906: Adobe Media Encoder CC MPG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8803</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-906/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder CC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8244.]]></description>
      <pubDate>Mon, 21 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-905: Adobe Media Encoder MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8802</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-905/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8241.]]></description>
      <pubDate>Mon, 21 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-904: Adobe Media Encoder MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8785</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-904/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8242.]]></description>
      <pubDate>Mon, 21 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-903: Horner Automation Cscape CSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8445</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-903/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13545.]]></description>
      <pubDate>Fri, 18 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-902: Horner Automation Cscape CSP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8444</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-902/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Horner Automation Cscape. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13541.]]></description>
      <pubDate>Fri, 18 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-901: Adobe Acrobat Reader DC XFA Form Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9374</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-901/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8225.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-900: Adobe Acrobat Reader DC XFA closeDoc Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9317</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-900/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8224.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-899: Adobe Acrobat Pro DC XFA closeDoc Use-After-Free  Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9331</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-899/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8223.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-898: Adobe Acrobat Pro DC DWF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9362</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-898/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8166.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-897: Adobe Acrobat Pro DC XFA Form Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9330</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-897/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8219.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-896: Adobe Acrobat Reader DC XFA template Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9329</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-896/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8217.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-895: Adobe Acrobat Reader DC XFA instanceManager Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9316</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-895/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8210.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-894: Adobe Acrobat Reader DC XFA Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9295</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-894/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8208.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-893: Adobe Acrobat Reader DC XFA template Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9327</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-893/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8209.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-892: Adobe Acrobat Reader DC AcroForm Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8937</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-892/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8204.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-891: Adobe Acrobat Reader DC XFA Form Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9293</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-891/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8203.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-890: Adobe Acrobat Pro DC XFA Form Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8793</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-890/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8192.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-889: Adobe Acrobat Pro DC DWT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9153</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-889/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8191.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-888: Adobe Acrobat Pro DC DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9154</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-888/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8165.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-887: Adobe Acrobat Pro DC DXF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9155</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-887/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8190.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-886: Adobe Acrobat Pro DC DST File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9261</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-886/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8163.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-885: Adobe Acrobat Pro DC DXF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9262</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-885/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8189.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-884: Adobe Acrobat Pro DC DWG File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9263</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-884/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8188.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-883: Adobe Acrobat Pro DC DWG File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9264</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-883/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8187.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-882: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8816</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-882/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8181.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-881: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8817</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-881/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8180.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-880: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8819</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-880/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8179.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-879: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8820</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-879/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8178.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-878: Adobe Acrobat Pro DC XFA calculate Event Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8854</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-878/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8177.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-877: Adobe Acrobat Pro DC XFA validate Event Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8765</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-877/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8176.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-876: Adobe Acrobat Pro DC XFA presence Element Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8732</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-876/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8064.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-875: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8818</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-875/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8175.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-874: Adobe Acrobat Pro DC RestorePlugInFrame Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8689</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-874/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8174.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-873: Adobe Acrobat Pro DC Distiller PostScript JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8781</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-873/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8173.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-872: Adobe Acrobat Pro DC DST File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8678</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-872/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8172.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-871: Adobe Acrobat Pro DC PostScript CharString Directory NULL Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8744</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-871/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8171.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-870: Adobe Acrobat Pro DC PostScript File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8681</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-870/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8170.]]></description>
      <pubDate>Tue, 15 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-869: Microsoft Windows CreateSurfacePal Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8926</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-869/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1362.]]></description>
      <pubDate>Thu, 10 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-868: Microsoft Windows CreateSurfacePal Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8852</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-868/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-1362.]]></description>
      <pubDate>Thu, 10 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-867: Microsoft Windows user32 Cursor Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8746</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-867/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2019-1361.]]></description>
      <pubDate>Thu, 10 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-866: NETGEAR AC1200 mini_httpd Poison Null Byte Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8616</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-866/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.4. The following CVEs are assigned: CVE-2019-17137.]]></description>
      <pubDate>Thu, 10 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-865: Apple WebKit HashTable Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8739</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-865/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple WebKit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-8707.]]></description>
      <pubDate>Tue, 08 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-864: Apple WebKit CSSAnimation Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8668</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-864/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple WebKit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2019-8707.]]></description>
      <pubDate>Tue, 08 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-863: Apple macOS CFFromShiftJISLen Out-Of-Bounds Read Remote Code Execution]]></title>
      <guid isPermaLink="false">ZDI-CAN-8588</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-863/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-8745.]]></description>
      <pubDate>Tue, 08 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-862: Jenkins dingding-notifications Cleartext Storage of Credentials Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8833</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-862/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Jenkins. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2019-10433.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-861: Foxit PhantomPDF Dwg2Pdf DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8776</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-861/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17136.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-860: Foxit PhantomPDF Dwg2Pdf DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8775</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-860/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-17135.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-859: Foxit PhantomPDF Dwg2Pdf DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8774</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-859/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13334.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-858: Foxit PhantomPDF Dwg2Pdf DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8773</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-858/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13333.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-857: Apple macOS diskmanagementd Uninitialized Buffer Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8719</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-857/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.7. The following CVEs are assigned: CVE-2019-8539.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-856: Apple macOS parseText1Fast Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8584</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-856/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2019-8657.]]></description>
      <pubDate>Fri, 04 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-855: Foxit Reader XFA Form Template Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9149</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-855/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13332.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-854: Foxit Reader JPG File ConvertToPDF Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8838</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-854/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13331.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-853: Foxit Reader JPG File ConvertToPDF Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8742</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-853/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13330.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-852: Foxit Reader TIF File ConvertToPDF Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8695</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-852/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13329.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-851: Foxit Reader AcroForm Field Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8913</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-851/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13328.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-850: Foxit Reader AcroForm Field Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8888</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-850/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13327.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-849: Foxit Reader AcroForm Field Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-8864</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-849/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2019-13326.]]></description>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-848: (0Day) Microsoft Windows Storage Service Link Resolution Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9312</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-848/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1.]]></description>
      <pubDate>Tue, 24 Sep 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-847: Advantech WebAccess Node bwrunrpt Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9272</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-847/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2019-13556.]]></description>
      <pubDate>Tue, 17 Sep 2019 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-19-846: Advantech WebAccess Node BwDlgpUp Arbitrary File Deletion Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-9271</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-19-846/</link>
      <description><![CDATA[	 The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2019-13552.]]></description>
      <pubDate>Tue, 17 Sep 2019 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
