<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Sun, 03 May 2026 06:17:43 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-20-1453: Qognify Ocularis EventCoordinator ConnectedChannel_GotMessage Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11257</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1453/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Qognify Ocularis. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-27868.]]></description>
      <pubDate>Tue, 29 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1452: (0Day) Microsoft 3D Builder GLB File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11486</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1452/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft 3D Builder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.6.]]></description>
      <pubDate>Mon, 21 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1451: NETGEAR Multiple Routers mini_httpd Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11355</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1451/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-27866.]]></description>
      <pubDate>Fri, 18 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1450: VMware Workstation SetGuestInfo Null Pointer Dereference Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11695</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1450/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.	 The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2020-3999.]]></description>
      <pubDate>Fri, 18 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1449: Hewlett Packard Enterprise Systems Insight Manager AMF Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11847</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1449/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise Systems Insight Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-7200.]]></description>
      <pubDate>Fri, 18 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1448: (Pwn2Own) Western Digital MyCloud PR4100 nasAdmin Incorrect Authorization Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12385</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1448/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability. The following CVEs are assigned: CVE-2020-28970.]]></description>
      <pubDate>Wed, 16 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1447: (Pwn2Own) Western Digital MyCloud PR4100 nasAdmin Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12327</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1447/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2020-28971.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1446: (Pwn2Own) Western Digital MyCloud PR4100 nasAdmin Incorrect Authorization Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12465</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1446/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-29563.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1445: (Pwn2Own) Western Digital MyCloud PR4100 nasAdmin Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12214</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1445/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2020-28940.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1444: (0Day) Eaton EASYsoft  E70 File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11083</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1444/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Eaton EASYsoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1443: (0Day) Eaton EASYsoft E70 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11082</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1443/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Eaton EASYsoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1442: (0Day) Eaton EASYsoft  E70 File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1442/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Eaton EASYsoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1441: (0Day) Eaton EASYsoft E70 File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11078</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1441/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Eaton EASYsoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1440: (0Day) Linux Kernel eBPF Improper Input Validation Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10905</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1440/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1439: (0Day) LibTIFF tiff2pdf Converter Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11115</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1439/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of LibTIFF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1438: (0Day) D-Link DCS-960L HTTP Authorization Header Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11359</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1438/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1437: (0Day) D-Link DCS-960L HNAP LoginPassword Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11352</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1437/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1436: (0Day) D-Link DCS-960L HNAP Login Cookie Format String Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11366</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1436/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1435: (0Day) D-Link DCS-960L HNAP Cookie Format String Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11360</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1435/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DCS-960L Wi-Fi cameras. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1434: (0Day) Microsoft Windows splwow64 Untrusted Pointer Dereference Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11350</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1434/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 2.5. The following CVEs are assigned: CVE-2021-1648.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1433: (0Day) Microsoft Windows splwow64 Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11349</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1433/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 2.5. The following CVEs are assigned: CVE-2021-1648.]]></description>
      <pubDate>Fri, 08 Jan 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1432: (0Day) Microsoft Windows splwow64 Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11351</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1432/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2021-1648.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1431: FreeBSD FTPD Improper Handling of Exceptional Conditions Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11632</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1431/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of FreeBSD FTPD. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-7468.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1430: NETGEAR Orbi UA_Parser Host Name Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11076</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1430/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-27861.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1429: D-Link DAP-1860 uhttpd Authentication Bypass Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10894</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1429/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 WiFi extenders. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-27865.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1428: D-Link DAP-1860 HNAP Authorization Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10880</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1428/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1860 WiFi extenders. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-27864.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1427: D-Link Multiple Routers dhttpd Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10912</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1427/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2020-27863.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1426: D-Link Multiple Routers dhttpd Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10911</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1426/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DVA-2800 and DSL-2888A routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-27862.]]></description>
      <pubDate>Tue, 15 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1425: Microsoft Excel XLS File Parsing Integer Signedness Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11752</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1425/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2020-17128.]]></description>
      <pubDate>Fri, 11 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1424: Microsoft Excel XLS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11888</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1424/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17125.]]></description>
      <pubDate>Fri, 11 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1423: NETGEAR Multiple Routers mini_httpd  Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11653</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1423/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2020-27867.]]></description>
      <pubDate>Mon, 21 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1422: Microsoft Outlook MSG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11887</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1422/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Outlook. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 2.5. The following CVEs are assigned: CVE-2020-17119.]]></description>
      <pubDate>Fri, 11 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1421: X.Org Server XkbSetDeviceInfo Heap-based Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11839</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1421/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-25712.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1420: X.Org Server XkbSetMap Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11572</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1420/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-14360.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1419: X.Org Server XRecordRegisterClients Integer Underflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11574</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1419/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-14362.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1418: X.Org Server XkbSelectEvents Integer Underflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11573</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1418/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-14361.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1417: X.Org Server XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11429</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1417/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-14346.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1416: X.Org Server XkbSetNames Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11428</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1416/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-14345.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1415: Foxit Reader XFA Template Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11727</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1415/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27860.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1414: Microsoft PowerPoint PPTX File Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11894</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1414/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17124.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1413: Microsoft Chakra LinearScan Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11906</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1413/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-17131.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1412: Microsoft SharePoint Site Import Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11873</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1412/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-17121.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1411: Apple macOS libFontParser TTF Font Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11588</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1411/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2020-9956.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1410: Apple macOS KTX Image DecodeRow Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11307</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1410/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2020-9955.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1409: Apple macOS process_token_BlitLibSetup3D Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1409/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-10015.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1408: Apple macOS process_token_BlitLibSetup2D Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11123</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1408/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-10015.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1407: Apple macOS process_token_GenerateMipmaps Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11124</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1407/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27907.]]></description>
      <pubDate>Wed, 09 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1406: Apple macOS CoreText MorxLigatureSubtableBuilder TTF Parsing Out-of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11828</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1406/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the CoreText library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-9999.]]></description>
      <pubDate>Tue, 08 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1405: Apple macOS libFontParser TwOFFStream TTF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11801</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1405/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the libFontParser library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-27931.]]></description>
      <pubDate>Tue, 08 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1404: Apple macOS libFontParser TTF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11598</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1404/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the libFontParser library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27952.]]></description>
      <pubDate>Tue, 08 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1403: Apple macOS Kernel Command 0x10007 Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11209</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1403/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27897.]]></description>
      <pubDate>Tue, 08 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1402: Apple macOS Kernel Command 0x10006 Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11208</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1402/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27897.]]></description>
      <pubDate>Tue, 08 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1401: Apple macOS Kernel Command 0x10005 Out-Of-Bounds Write Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11207</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1401/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27897.]]></description>
      <pubDate>Tue, 08 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1400: (0Day) Realtek RTL8811AU Wi-Fi Driver rtwlane Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10758</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1400/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of the Realtek RTL8811AU Wi-Fi driver. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0.]]></description>
      <pubDate>Mon, 07 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1399: (0Day) Realtek RTL8811AU Wi-Fi Driver rtwlanu Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10715</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1399/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of the Realtek RTL8811AU Wi-Fi driver. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.0.]]></description>
      <pubDate>Mon, 07 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1398: Microsoft SharePoint DataFormWebPart Server-Side Include Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11267</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1398/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft SharePoint Server. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2020-0971.]]></description>
      <pubDate>Fri, 04 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1397: Arcserve D2D getNews XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11103</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1397/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of CA Arcserve D2D. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2020-27858.]]></description>
      <pubDate>Fri, 04 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1396: Apple macOS AudioCodecs AAC Decoding Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11507</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1396/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-10017.]]></description>
      <pubDate>Fri, 04 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1395: Apple macOS powerd Uninitialized Memory Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11183</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1395/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2020-10007.]]></description>
      <pubDate>Fri, 04 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1394: Apple Safari TextNode Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11498</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1394/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2020-9950.]]></description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1393: Apple macOS libnetworkextension ne_filter_protocol_remove_input_handler Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11457</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1393/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-9996.]]></description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1392: Apple macOS AudioCodecs Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11235</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1392/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-9954.]]></description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1391: Apple macOS AudioToolboxCore Wave Header Parsing Sign Extension Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11189</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1391/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the AudioToolbox library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-9889.]]></description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1390: Apple Safari RenderObject Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11125</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1390/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-9947.]]></description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1389: Apple macOS CoreGraphics JBIG2Stream Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11210</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1389/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the CoreGraphics library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-9883.]]></description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1388: McAfee Total Protection Junction Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11575</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1388/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of McAfee Total Protection. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2020-7335.]]></description>
      <pubDate>Tue, 01 Dec 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1387: Trend Micro OfficeScan Improper Access Control Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11583</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1387/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro OfficeScan. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-28583.]]></description>
      <pubDate>Fri, 27 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1386: Trend Micro OfficeScan Improper Access Control Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11582</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1386/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro OfficeScan. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-28582.]]></description>
      <pubDate>Fri, 27 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1385: VMware ESXi SLP Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1385/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of VMware ESXi. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-3992.]]></description>
      <pubDate>Wed, 25 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1384: Fuji Electric V-Server Lite VPR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11353</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1384/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric V-Server Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-25171.]]></description>
      <pubDate>Wed, 25 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1383: SaltStack Salt rest_cherrypy ssh_remote_port_forwards Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11173</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1383/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2020-16846.]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1382: SaltStack Salt rest_cherrypy ssh_port Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11172</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1382/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2020-16846.]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1381: SaltStack Salt rest_cherrypy ssh_options Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11169</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1381/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2020-16846.]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1380: SaltStack Salt rest_cherrypy tgt Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11167</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1380/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2020-16846.]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1379: SaltStack Salt rest_cherrypy ssh_priv Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1379/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SaltStack Salt. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2020-16846.]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1378: Trend Micro ServerProtect ioctlMod Heap-based Buffer Overflow Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11064</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1378/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro ServerProtect. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2020-28575.]]></description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1377: VMware ESXi SLP Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12190</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1377/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of VMware ESXi. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-3992.]]></description>
      <pubDate>Mon, 23 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1376: Trend Micro Apex One Improper Access Control Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11571</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1376/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Apex One. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-28577.]]></description>
      <pubDate>Sun, 22 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1375: Trend Micro Apex One Improper Access Control Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11237</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1375/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Apex One. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-28576.]]></description>
      <pubDate>Sun, 22 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1374: Trend Micro Apex One Improper Access Control Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11236</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1374/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Apex One. Authentication is not required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-28573.]]></description>
      <pubDate>Sun, 22 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1373: Microsoft Windows WebM Video Parsing Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1373/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-1319.]]></description>
      <pubDate>Sun, 22 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1372: Linux Kernel Performance Counters Race Condition Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11510</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1372/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-14351.]]></description>
      <pubDate>Sun, 22 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1371: Microsoft Windows DirectComposition Uninitialized Pointer Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1371/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-17057.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1370: Microsoft Chakra Array Iterator Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11871</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1370/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2020-17048.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1369: Microsoft Internet Explorer array Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11875</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1369/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-17053.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1368: Microsoft Internet Explorer array Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11874</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1368/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-17053.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1367: Microsoft Excel XLS File Parsing Double Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11518</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1367/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17019.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1366: Microsoft Windows Print Spooler Directory Junction Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11796</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1366/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2020-17014.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1365: Microsoft Windows bindflt Driver Missing Authentication Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11361</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1365/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17012.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1364: SAP 3D Visual Enterprise Viewer HPGL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11866</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1364/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-26817.]]></description>
      <pubDate>Wed, 11 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1363: Cisco WebEx Network Recording Player ARF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11175</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1363/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-3604.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1362: Cisco WebEx Network Recording Player ARF File Parsing Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1362/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-3573.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1361: Cisco WebEx Network Recording Player ARF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11133</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1361/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-3603.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1360: WECON PLC Editor WCP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11187</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1360/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-25181.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1359: WECON PLC Editor WCP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11186</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1359/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-25181.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1358: WECON PLC Editor WCP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11185</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1358/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON PLC Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-25177.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1357: Adobe Acrobat Reader DC AVDocumentLocal Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-12015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1357/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-24438.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1356: Adobe Acrobat Pro DC PDF Export Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11958</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1356/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-24434.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1355: Adobe Acrobat Pro DC PDF Export Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11957</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1355/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-24436.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1354: Adobe Acrobat Reader DC ID Parameter Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11540</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1354/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-24426.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1353: WECON LeviStudioU HSC File Parsing CharSize Attribute Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11100</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1353/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-16243.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1352: WECON LeviStudioU HFT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11098</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1352/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-16243.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1351: WECON LeviStudioU HFT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11097</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1351/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of WECON LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-16243.]]></description>
      <pubDate>Tue, 10 Nov 2020 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1350: Foxit Studio Photo NEF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11488</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1350/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-27857.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1349: Foxit Studio Photo CR2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11434</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1349/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-27856.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1348: Foxit Studio Photo SR2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11433</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1348/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-27855.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1347: Foxit Studio Photo CMP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11432</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1347/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17436.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1346: Foxit Studio Photo CR2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11358</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1346/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17435.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1345: Foxit Studio Photo ARW File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11357</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1345/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17434.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1344: Foxit Studio Photo CMP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11356</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1344/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17433.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1343: Foxit Studio Photo CR2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11335</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1343/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17432.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1342: Foxit Studio Photo CR2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11333</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1342/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17431.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1341: Foxit Studio Photo CR2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11332</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1341/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17430.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1340: Foxit Studio Photo CMP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11337</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1340/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17429.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1339: Foxit Studio Photo CMP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11336</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1339/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17428.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1338: Foxit Studio Photo NEF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11334</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1338/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17427.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1337: Foxit Studio Photo CR2 File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11230</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1337/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17426.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1336: Foxit Studio Photo EPS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11259</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1336/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17425.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1335: Foxit Studio Photo EZI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11247</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1335/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17424.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1334: Foxit Studio Photo ARW File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11196</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1334/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17423.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1333: Foxit Studio Photo EPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11195</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1333/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17422.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1332: Foxit Studio Photo NEF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11194</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1332/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17421.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1331: Foxit Studio Photo NEF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11193</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1331/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2020-17420.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1330: Foxit Studio Photo NEF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11192</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1330/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17419.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1329: Foxit Studio Photo EZIX channel id Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11197</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1329/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-17418.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1328: Micro Focus Operations Bridge Manager SAMDownloadServlet Deserialization Of Untrusted Data Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11198</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1328/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1327: Micro Focus Operations Bridge Manager RegistrationServlet Deserialization Of Untrusted Data Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11203</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1327/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1326: Micro Focus Operations Bridge Manager Service Incorrect Permission Assignment Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11204</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1326/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Micro Focus Operations Bridge Manager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-11858.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1325: Micro Focus Operations Bridge Manager GenericAdapterService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11417</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1325/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1324: Micro Focus Operations Bridge Manager LicensingService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11416</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1324/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1323: Micro Focus Operations Bridge Manager AutomationMappingService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11415</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1323/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1322: Micro Focus Operations Bridge Manager ResourceManagementService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11414</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1322/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1321: Micro Focus Operations Bridge Manager MultiTenancyService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11413</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1321/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1320: Micro Focus Operations Bridge Manager CITService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11412</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1320/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1319: Micro Focus Operations Bridge Manager LDAPService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11411</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1319/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1318: Micro Focus Operations Bridge Manager SnapshotService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11410</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1318/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1317: Micro Focus Operations Bridge Manager ClassModelService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1317/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1316: Micro Focus Operations Bridge Manager PermissionsService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11408</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1316/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1315: Micro Focus Operations Bridge Manager CommonService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11407</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1315/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1314: Micro Focus Operations Bridge Manager ImpactService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11406</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1314/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1313: Micro Focus Operations Bridge Manager SchedulerService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11405</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1313/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1312: Micro Focus Operations Bridge Manager LocationService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11404</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1312/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1311: Micro Focus Operations Bridge Manager BundleService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11403</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1311/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1310: Micro Focus Operations Bridge Manager HistoryService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11402</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1310/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1309: Micro Focus Operations Bridge Manager CIService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11401</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1309/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1308: Micro Focus Operations Bridge Manager DataAcquisitionService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11400</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1308/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1307: Micro Focus Operations Bridge Manager SoftwareLibraryService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11399</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1307/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1306: Micro Focus Operations Bridge Manager ServiceDiscoveryService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11398</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1306/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1305: Micro Focus Operations Bridge Manager DiscoveryService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11397</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1305/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1304: Micro Focus Operations Bridge Manager MailService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11396</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1304/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1303: Micro Focus Operations Bridge Manager RelatedCIsService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11395</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1303/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1302: Micro Focus Operations Bridge Manager FolderService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11394</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1302/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1301: Micro Focus Operations Bridge Manager PatternService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11393</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1301/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1300: Micro Focus Operations Bridge Manager CMSImagesService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11392</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1300/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1299: Micro Focus Operations Bridge Manager ReportService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11391</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1299/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1298: Micro Focus Operations Bridge Manager TopologyService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11390</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1298/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1297: Micro Focus Operations Bridge Manager WatchServerAPI Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11389</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1297/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1296: Micro Focus Operations Bridge Manager BusinessModelFacadeForGui Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11388</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1296/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1295: Micro Focus Operations Bridge Manager FoldersFacade Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11387</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1295/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1294: Micro Focus Operations Bridge Manager SchedulerFacadeForGui Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11386</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1294/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1293: Micro Focus Operations Bridge Manager PackageFacadeForGui Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11385</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1293/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1292: Micro Focus Operations Bridge Manager CorrelationRunnerFacade Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11384</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1292/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1291: Micro Focus Operations Bridge Manager CorrelationFacadeForGui Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11383</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1291/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1290: Micro Focus Operations Bridge Manager CategoryFacadeForGui Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11382</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1290/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1289: Micro Focus Operations Bridge Manager CmdbOperationExecuterService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11381</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1289/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1288: Micro Focus Operations Bridge Manager SecurityService Deserialization Of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11200</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1288/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-11853.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1287: Micro Focus Operations Bridge Manager diagnostics Use of Hard-coded Credentials Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11201</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1287/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Micro Focus Operations Bridge Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-11854.]]></description>
      <pubDate>Wed, 28 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1286: Trend Micro Antivirus for Mac Error Message Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11047</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1286/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Antivirus for Mac. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.0. The following CVEs are assigned: CVE-2020-27015.]]></description>
      <pubDate>Mon, 26 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1285: Trend Micro Antivirus for Mac Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11045</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1285/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Antivirus for Mac. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2020-27014.]]></description>
      <pubDate>Mon, 26 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1284: WECON LeviStudioU XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10607</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1284/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of WECON LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2020-25186.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1283: Oracle E-Business Suite ozfVendorLov SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11687</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1283/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Oracle E-Business Suite. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2020-14876.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1282: Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11829</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1282/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-14825.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1281: Oracle VirtualBox Shader Bytecode Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11679</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1281/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-14885.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1280: Oracle VirtualBox Shader Bytecode Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11677</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1280/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-14886.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1279: Oracle VirtualBox Shader Bytecode Type Confusion Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11676</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1279/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-14884.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1278: Oracle VirtualBox Shader Bytecode Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11678</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1278/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2020-14881.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1277: Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11591</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1277/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-14825.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1276: Oracle WebLogic Server IIOP Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11453</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1276/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-14841.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1275: Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11305</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1275/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-14859.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1274: Oracle WebLogic Server IIOP Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10818</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1274/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-14841.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1273: Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10968</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1273/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-14825.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1272: Adobe Illustrator PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11477</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1272/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Illustrator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-24410.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1271: Adobe Illustrator PDF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11474</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1271/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Illustrator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-24409.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1270: Adobe Illustrator PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11346</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1270/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Illustrator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-24411.]]></description>
      <pubDate>Thu, 22 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1269: VMware ESXi SLP Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11563</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1269/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of VMware ESXi. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2020-3992.]]></description>
      <pubDate>Tue, 20 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1268: VMware Workstation BDOOR_CMD_PATCH_ACPI_TABLES Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11228</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1268/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of VMware Workstation. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2020-3982.]]></description>
      <pubDate>Tue, 20 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1267: VMware Workstation BDOOR_CMD_PATCH_ACPI_TABLES Time-Of-Check Time-Of-Use Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11227</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1267/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of VMware Workstation. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.0. The following CVEs are assigned: CVE-2020-3981.]]></description>
      <pubDate>Tue, 20 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1266: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11705</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1266/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-6374.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1265: SAP 3D Visual Enterprise Viewer SVG File XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11243</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1265/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2020-6315.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1264: SAP 3D Visual Enterprise Viewer PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11467</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1264/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-6372.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1263: SAP 3D Visual Enterprise Viewer PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11462</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1263/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-6373.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1262: Advantech R-SeeNet device_position device_id SQL Injection Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11373</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1262/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech R-SeeNet. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2020-25157.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1261: Advantech WebAccess/SCADA WADashboard External Control of File Path Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11262</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1261/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-25161.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1260: Apple macOS process_token_SetFence Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10924</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1260/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-9990.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1259: Apple macOS process_token_SetFence Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-10823</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1259/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-9990.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1258: Microsoft Windows Camera Codec Pack Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11981</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1258/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-16968.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1257: Microsoft Windows Media Player HEVC Stream Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11980</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1257/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2020-16915.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1256: Microsoft Excel XLS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11602</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1256/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-16930.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1255: Microsoft Excel XLS File Parsing Uninitialized Variable Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11613</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1255/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2020-16931.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-20-1254: Microsoft Windows Group Policy Client Service Link Resolution Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-11622</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-20-1254/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2020-16939.]]></description>
      <pubDate>Mon, 19 Oct 2020 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
