<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Sun, 26 Apr 2026 21:33:15 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-21-1604: SolarWinds Network Performance Monitor SendSyslog Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14859</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1604/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1603: SolarWinds Network Performance Monitor SnmpTrap Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15319</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1603/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1602: SolarWinds Network Performance Monitor SendHttpRequest Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15318</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1602/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1601: SolarWinds Network Performance Monitor Email Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15317</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1601/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1600: SolarWinds Network Performance Monitor WriteToEventLog Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15316</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1600/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1599: SolarWinds Network Performance Monitor CustomProperty Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15315</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1599/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1598: SolarWinds Network Performance Monitor CustomStatus Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15314</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1598/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1597: SolarWinds Network Performance Monitor PlaySound Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15313</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1597/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1596: SolarWinds Network Performance Monitor TextToSpeech Exposed Dangerous Function Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1596/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-35234.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1595: Microsoft Azure Defender for IoT maintenanceWindow Endpoint SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14189</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1595/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Azure Defender for IoT. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-41365.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1594: Veritas Enterprise Vault EVStgOfflineOpns Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1594/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-44681.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1593: Veritas Enterprise Vault EVStorageQueueBroker Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14079</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1593/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-44682.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1592: Veritas Enterprise Vault EVExchangeWebServicesProxy Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14078</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1592/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-44677.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1591: Veritas Enterprise Vault MonitoringAgent Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14076</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1591/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-44678.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1590: Veritas Enterprise Vault EVMonitoring Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1590/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-44680.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1589: Veritas Enterprise Vault EVTaskGuardian Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14074</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1589/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-44679.]]></description>
      <pubDate>Thu, 23 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1588: Adobe Prelude JPEG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15270</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1588/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Prelude. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44696.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1587: Adobe Premiere Rush MP4 File Parsing Uninitialized Variable Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1587/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Rush. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43030.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1586: Adobe Premiere Pro 3GP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15268</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1586/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Premiere Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-40795.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1585: Adobe Premiere Pro MOV File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15267</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1585/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-40790.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1584: Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15265</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1584/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43751.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1583: Adobe Premiere Pro MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15264</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1583/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-42265.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1582: Adobe Premiere Pro JPEG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15243</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1582/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-40791.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1581: Adobe Photoshop Lightroom TIF File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15242</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1581/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of of Adobe Photoshop Lightroom. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43753.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1580: Adobe Media Encoder MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15269</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1580/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43759.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1579: Adobe Audition MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15263</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1579/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Audition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44699.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1578: Adobe Audition MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15262</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1578/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Audition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44697.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1577: Adobe Audition MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15261</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1577/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Audition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44698.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1576: Adobe Media Encoder 3GP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15260</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1576/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Media Encoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-43757.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1575: Adobe Media Encoder MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15259</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1575/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43758.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1574: Adobe Media Encoder MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15258</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1574/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Media Encoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43760.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1573: Adobe Dimension SVG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15276</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1573/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44182.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1572: Adobe Dimension TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15252</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1572/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44183.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1571: Adobe Dimension PCX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15250</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1571/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-44180.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1570: Adobe Dimension GIF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15249</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1570/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-44181.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1569: Adobe Dimension GIF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15248</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1569/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-44179.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1568: Adobe After Effects MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15281</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1568/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44192.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1567: Adobe After Effects 3GP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15280</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1567/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44194.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1566: Adobe After Effects MOV File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15279</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1566/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44193.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1565: Adobe After Effects 3GP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15257</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1565/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-44188.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1564: Adobe After Effects MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15256</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1564/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44191.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1563: Adobe After Effects MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15255</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1563/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44190.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1562: Adobe After Effects JPEG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15247</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1562/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44195.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1561: Adobe Dimension TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15229</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1561/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43763.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1560: Adobe Photoshop JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1560/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Photoshop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-43018.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1559: Adobe After Effects JPEG2000 Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15149</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1559/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44189.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1558: Adobe After Effects TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15042</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1558/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43027.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1557: Adobe Premiere Rush MP4 File Parsing Uninitialized Variable Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13736</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1557/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Rush. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-43746.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1556: Microsoft Azure Defender for IoT update-handshake Endpoint SQL Injection Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14160</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1556/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Microsoft Azure Defender for IoT. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-42311.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1555: Microsoft Azure Defender for IoT sync Endpoint SQL Injection Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14159</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1555/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Microsoft Azure Defender for IoT. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-42313.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1554: Microsoft Windows tcpip.sys Heap-based Buffer Overflow Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14456</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1554/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2021-43247.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1553: Microsoft Azure Defender for IoT Improper Certificate Validation Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14728</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1553/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Microsoft Azure Defender for IoT console and sensor appliances. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2021-43882.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1552: Microsoft Windows Print Spooler Link Following Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14459</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1552/</link>
      <description><![CDATA[This vulnerability allows local attackers to escape the low integrity sandbox on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-41333.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1551: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16001</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1551/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-42069.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1550: X.Org Server SwapCreateRegister Out-Of-Bounds Access Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14952</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1550/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-4011.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1549: X.Org Server SProcScreenSaverSuspend Out-Of-Bounds Access Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14951</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1549/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-4010.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1548: X.Org Server SProcXFixesCreatePointerBarrier Out-Of-Bounds Access Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14950</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1548/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-4009.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1547: X.Org Server SProcRenderCompositeGlyphs Out-Of-Bounds Access Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14192</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1547/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-4008.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1546: Open Design Alliance (ODA) Drawings Explorer BMP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14627</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1546/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Open Design Alliance (ODA) Drawings Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44423.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1545: Open Design Alliance (ODA) Drawings Explorer TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14726</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1545/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Open Design Alliance (ODA) Drawings Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44860.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1544: Open Design Alliance (ODA) Drawings Explorer TGA File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14699</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1544/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Open Design Alliance (ODA) Drawings Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44859.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1543: Open Design Alliance (ODA) Drawings Explorer BMP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14673</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1543/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open Design Alliance (ODA) Drawings Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-44422.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1542: Open Design Alliance (ODA) Drawings Explorer BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14669</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1542/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open Design Alliance (ODA) Drawings Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-44422.]]></description>
      <pubDate>Tue, 21 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1541: Apache Log4j StrSubstitutor Uncontrolled Recursion Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16160</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1541/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Apache Log4j. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2021-45105.]]></description>
      <pubDate>Sun, 19 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1540: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13816</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1540/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 14 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1539: Tencent WeChat WXAM Decoder Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13815</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1539/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 14 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1538: Tencent WeChat WXAM Decoder Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13814</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1538/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 14 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1537: Tencent WeChat WXAM Decoder Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13813</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1537/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 14 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1536: Trend Micro Maximum Security Link Following Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14587</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1536/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2021-44023.]]></description>
      <pubDate>Tue, 14 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1535: McAfee Database Security Improper Access Control Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14792</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1535/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of McAfee Database Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.9. The following CVEs are assigned: CVE-2021-31850.]]></description>
      <pubDate>Tue, 14 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1534: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15055</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1534/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34946.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1533: Bentley View JT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15054</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1533/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34945.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1532: Bentley View JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15052</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1532/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34944.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1531: Bentley View JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15051</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1531/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34943.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1530: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15041</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1530/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34942.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1529: Bentley View JT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15040</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1529/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34941.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1528: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15039</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1528/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34940.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1527: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14996</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1527/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34939.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1526: Bentley View JT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14995</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1526/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34938.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1525: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14915</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1525/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34937.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1524: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14914</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1524/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34936.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1523: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14913</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1523/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34935.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1522: Bentley View JT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14912</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1522/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34934.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1521: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14911</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1521/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34933.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1520: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14910</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1520/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34932.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1519: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14909</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1519/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34931.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1518: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14908</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1518/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34930.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1517: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14907</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1517/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34929.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1516: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14906</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1516/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34928.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1515: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14905</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1515/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34927.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1514: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14904</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1514/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34926.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1513: Bentley View JT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14903</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1513/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34925.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1512: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14902</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1512/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34924.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1511: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14901</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1511/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34923.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1510: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14900</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1510/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34922.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1509: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14899</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1509/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34921.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1508: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14898</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1508/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34920.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1507: Bentley View JP2 File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14897</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1507/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34919.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1506: Bentley View JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14896</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1506/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34918.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1505: Bentley View J2K File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14895</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1505/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34917.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1504: Bentley View DWG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14894</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1504/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34916.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1503: Bentley View J2K File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14893</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1503/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34915.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1502: Bentley View DGN File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14892</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1502/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34914.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1501: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14885</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1501/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34912.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1500: Bentley View 3DS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14884</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1500/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34911.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1499: Bentley View DGN File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14883</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1499/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34910.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1498: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14882</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1498/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34909.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1497: Bentley View J2K File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14881</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1497/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34908.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1496: Bentley View BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14880</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1496/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34907.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1495: Bentley View J2K File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14879</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1495/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34906.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1494: Bentley View DGN File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14878</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1494/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34905.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1493: Bentley View DGN File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14877</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1493/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34904.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1492: Bentley View BMP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14876</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1492/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34903.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1491: Bentley View DWG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14875</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1491/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34902.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1490: Bentley View 3DS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14874</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1490/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34901.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1489: Bentley View J2K File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1489/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34900.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1488: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14866</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1488/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34899.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1487: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14865</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1487/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34898.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1486: Bentley View DGN File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14864</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1486/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34897.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1485: Bentley View BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14863</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1485/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34896.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1484: Bentley View 3DS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14862</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1484/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34895.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1483: Bentley View 3DS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14847</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1483/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34894.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1482: Bentley View BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14846</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1482/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34893.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1481: Bentley View JT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14845</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1481/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34892.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1480: Bentley View JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14844</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1480/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34891.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1479: Bentley View JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14843</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1479/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34890.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1478: Bentley View 3DS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14842</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1478/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34889.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1477: Bentley View JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14841</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1477/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34888.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1476: Bentley View PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14840</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1476/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34887.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1475: Bentley View FBX File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14839</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1475/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34886.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1474: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14838</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1474/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34885.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1473: Bentley View JP2 File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1473/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34884.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1472: Bentley View J2K File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14836</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1472/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34883.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1471: Bentley View JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14835</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1471/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34882.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1470: Bentley View OBJ File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14834</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1470/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-34881.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1469: Bentley View 3DS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14833</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1469/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34880.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1468: Bentley View J2K File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14832</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1468/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34879.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1467: Bentley View JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14831</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1467/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34913.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1466: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14830</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1466/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34878.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1465: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14829</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1465/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34877.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1464: Bentley View JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14828</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1464/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34876.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1463: Bentley View 3DS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14827</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1463/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34875.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1462: Bentley View SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14737</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1462/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34872.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1461: Bentley View 3DS File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14736</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1461/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34874.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1460: Bentley View PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14696</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1460/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34873.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1459: Bentley View BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14695</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1459/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2021-34871.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1458: Tencent WeChat WXAM Decoder Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13513</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1458/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1457: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13369</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1457/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1456: Tencent WeChat WXAM Decoder Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13368</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1456/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1455: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13367</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1455/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1454: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13366</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1454/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1453: Adobe Bridge RGB File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15253</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1453/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44185.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1452: Adobe Bridge SGI File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15322</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1452/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44186.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1451: Adobe Bridge SGI File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-15321</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1451/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2021-44187.]]></description>
      <pubDate>Wed, 08 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1450: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13626</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1450/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1449: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13624</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1449/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1448: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13623</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1448/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1447: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13622</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1447/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1446: Tencent WeChat WAXM Decoder Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13336</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1446/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1445: Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-13498</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1445/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1444: OpenText Brava! Desktop DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14979</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1444/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1443: OpenText Brava! Desktop DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14186</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1443/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1442: OpenText Brava! Desktop DXF File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14185</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1442/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1441: OpenText Brava! Desktop DWG File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1441/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1440: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14183</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1440/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1439: OpenText Brava! Desktop pdf2dl Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14182</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1439/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1438: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14181</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1438/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1437: OpenText Brava! Desktop DWF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14180</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1437/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1436: OpenText Brava! Desktop DWF File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14179</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1436/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1435: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14178</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1435/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1434: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14177</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1434/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1433: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1433/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1432: OpenText Brava! Desktop PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14175</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1432/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1431: OpenText Brava! Desktop DXF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14174</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1431/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1430: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14173</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1430/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1429: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14172</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1429/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1428: OpenText Brava! Desktop DWG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14171</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1428/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1427: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14170</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1427/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1426: OpenText Brava! Desktop DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14169</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1426/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1425: OpenText Brava! Desktop DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14168</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1425/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1424: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14167</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1424/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1423: OpenText Brava! Desktop PDF File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14166</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1423/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1422: OpenText Brava! Desktop PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14165</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1422/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1421: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14164</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1421/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1420: OpenText Brava! Desktop DWF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14163</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1420/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1419: OpenText Brava! Desktop JXR File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14161</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1419/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1418: OpenText Brava! Desktop HTML File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14152</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1418/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1417: OpenText Brava! Desktop CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14151</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1417/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1416: OpenText Brava! Desktop JXR File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14150</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1416/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1415: OpenText Brava! Desktop JXR File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14149</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1415/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1414: OpenText Brava! Desktop DGN File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1414/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1413: OpenText Brava! Desktop CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1413/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1412: OpenText Brava! Desktop CGM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1412/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1411: OpenText Brava! Desktop XGL File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14145</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1411/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1410: OpenText Brava! Desktop XGL File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14144</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1410/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1409: OpenText Brava! Desktop XGL File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1409/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1408: OpenText Brava! Desktop CGM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14142</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1408/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1407: OpenText Brava! Desktop DGN File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14141</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1407/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1406: OpenText Brava! Desktop EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14140</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1406/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-21-1405: OpenText Brava! Desktop SLDDRW File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-14139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-21-1405/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Fri, 03 Dec 2021 00:00:00 -0600</pubDate>
    </item>
    
  </channel>
</rss>
