<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Fri, 01 May 2026 12:53:12 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-22-1706: D-Link DIR-825/EE xupnpd Upload Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19464</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1706/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43647.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1705: D-Link DIR-825/EE xupnpd Vimeo Plugin Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19463</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1705/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43646.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1704: D-Link DIR-825/EE xupnpd IVI Plugin Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19462</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1704/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43645.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1703: D-Link DIR-825/EE xupnpd Dreambox Plugin Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19461</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1703/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43644.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1702: D-Link DIR-825/EE xupnpd Generic Plugin Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19460</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1702/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43643.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1701: D-Link DIR-825/EE xupnpd YouTube Plugin Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19222</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1701/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43642.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1700: X.Org Server XkbCopyNames Double Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19530</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1700/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-4283.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1699: X.Org Server ProcXIChangeProperty Numeric Truncation Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19405</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1699/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2022-46344.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1698: X.Org Server ScreenSaverSetAttributes Use-After-Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19404</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1698/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46343.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1697: X.Org Server XvdiSelectVideoNotify Use-After-Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19400</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1697/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46342.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1696: X.Org Server ProcXIPassiveUngrabDevice Improper Validation of Array Index Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19381</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1696/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46341.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1695: X.Org Server XTestFakeInput Type Confusion Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19265</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1695/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46340.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1694: Microsoft Windows StretchBlt Untrusted Pointer Dereference Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18524</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1694/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41121.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1693: Microsoft Windows PlgBlt Untrusted Pointer Dereference Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18523</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1693/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41121.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1692: Microsoft Windows GreDrawStream Use-After-Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18562</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1692/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-44671.]]></description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1691: Linux Kernel ksmbd Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17817</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1691/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.6. The following CVEs are assigned: CVE-2022-47943.]]></description>
      <pubDate>Mon, 23 Jan 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1690: Linux Kernel ksmbd Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17816</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1690/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2022-47939.]]></description>
      <pubDate>Thu, 22 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1689: Linux Kernel ksmbd Out-Of-Bounds Read Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17818</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1689/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2022-47938.]]></description>
      <pubDate>Thu, 22 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1688: Linux Kernel ksmbd Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17771</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1688/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.5. The following CVEs are assigned: CVE-2022-47942.]]></description>
      <pubDate>Thu, 22 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1687: Linux Kernel ksmbd Memory Exhaustion Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17815</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1687/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2022-47941.]]></description>
      <pubDate>Thu, 22 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1686: VMware ESXi TCP/IP Memory Corruption Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17737</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1686/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of VMware ESXi. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-31696.]]></description>
      <pubDate>Wed, 21 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1685: Adobe Illustrator Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18888</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1685/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Illustrator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-44502.]]></description>
      <pubDate>Wed, 21 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1684: Siemens JT2Go RAS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19056</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1684/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-45484.]]></description>
      <pubDate>Wed, 21 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1683: Siemens Solid Edge Viewer X_B File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19383</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1683/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46348.]]></description>
      <pubDate>Wed, 21 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1682: Apple Safari DFG JIT Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18337</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1682/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-42852.]]></description>
      <pubDate>Wed, 21 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1681: Siemens Solid Edge Viewer X_B File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19384</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1681/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46349.]]></description>
      <pubDate>Tue, 20 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1680: Siemens Solid Edge Viewer X_B File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19079</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1680/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46347.]]></description>
      <pubDate>Mon, 19 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1679: Siemens Solid Edge Viewer X_B File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19071</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1679/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46346.]]></description>
      <pubDate>Mon, 19 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1678: Siemens Solid Edge Viewer X_B File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19070</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1678/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-46345.]]></description>
      <pubDate>Mon, 19 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1677: Microsoft Office SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18517</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1677/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-47211.]]></description>
      <pubDate>Mon, 19 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1676: Microsoft Excel SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19182</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1676/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-47212.]]></description>
      <pubDate>Mon, 19 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1675: Microsoft Windows win32kfull Null Pointer Dereference Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18070</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1675/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2022-44697.]]></description>
      <pubDate>Fri, 16 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1674: Microsoft Office Visio DWG File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19063</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1674/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44694.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1673: Microsoft Office Visio DWG File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1673/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44694.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1672: Microsoft Office Visio DWG File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19048</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1672/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-44695.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1671: Microsoft Office Visio DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19064</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1671/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44696.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1670: Microsoft Office Visio DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1670/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44696.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1669: Microsoft Excel SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1669/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-26805.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1668: Microsoft Excel SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19285</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1668/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-26806.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1667: Microsoft Office Visio DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19047</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1667/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44694.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1666: Canon imageCLASS MF644Cdw BJNP Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16032</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1666/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw printers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-43608.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1665: Trend Micro Apex One Damage Cleanup Engine Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16543</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1665/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-45798.]]></description>
      <pubDate>Thu, 15 Dec 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1664: SolarWinds Network Performance Monitor DeserializeFromStrippedXml Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17718</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1664/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-36964.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1663: SolarWinds Network Performance Monitor GetPdf Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17678</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1663/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute code on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2022-36962.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1662: SolarWinds Network Performance Monitor WebUserSettingsCrudHandler Improper Input Validation Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17644</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1662/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-36960.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1661: Foxit PDF Reader U3D File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18894</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1661/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-43641.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1660: Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18629</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1660/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-43640.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1659: Foxit PDF Reader U3D File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18628</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1659/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-43639.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1658: Foxit PDF Reader U3D File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18627</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1658/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-43638.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1657: Foxit PDF Reader U3D File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18626</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1657/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-43637.]]></description>
      <pubDate>Wed, 23 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1656: SAP 3D Visual Enterprise Author EMF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18154</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1656/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41175.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1655: (Pwn2Own) Microsoft Teams chat Client-Side Template Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17427</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1655/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization. The ZDI has assigned a CVSS rating of 6.3.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1654: Microsoft Exchange DagNetMultiValuedProperty Exposed Dangerous Function Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18986</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1654/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1653: Microsoft Exchange FileHandler Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18972</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1653/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1652: Microsoft Exchange MatlabWriter Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18973</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1652/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1651: Microsoft Exchange FormattedTextWriterTraceListener Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18959</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1651/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1650: Microsoft Exchange OrganizationInitializationDefinition External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18958</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1650/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1649: Microsoft Exchange FileLog Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18957</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1649/</link>
      <description><![CDATA[This vulnerability allows remote attackers to delete arbitrary files and create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1648: Microsoft Exchange TraceFile Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18956</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1648/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1647: Microsoft Exchange PEFile Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18955</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1647/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1646: Microsoft Exchange FlatFileTraceListener Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18954</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1646/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1645: Microsoft Exchange MsiDatabase Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18953</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1645/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1644: Microsoft Exchange RecipientProvisioningDefinition External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18952</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1644/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1643: Microsoft Exchange DbgEngDataReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18951</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1643/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1642: Microsoft Exchange FileDependency Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18950</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1642/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1641: Microsoft Exchange EtwFile Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18949</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1641/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1640: Microsoft Exchange DumpReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18948</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1640/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1639: Microsoft Exchange PstStatusLog Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18947</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1639/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1638: Microsoft Exchange DumpDataReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18946</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1638/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1637: Microsoft Exchange FileConfigurationSource Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18945</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1637/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1636: Microsoft Exchange PdbReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18944</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1636/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1635: Microsoft Exchange PromptPreviewRpcResponse Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18943</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1635/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1634: Microsoft Exchange GsmReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18942</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1634/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1633: Microsoft Exchange ScriptingAgentConfiguration Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18941</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1633/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1632: Microsoft Exchange AppConfigAssemblyResolver Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18940</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1632/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1631: Microsoft Exchange PcmReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18939</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1631/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1630: Microsoft Exchange G711Reader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18938</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1630/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1629: Microsoft Exchange GsmWriter Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18937</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1629/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1628: Microsoft Exchange WmaReader Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18936</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1628/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1627: Microsoft Exchange StreamWriterWrapper Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18901</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1627/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1626: Microsoft Exchange MsgStorageWriter Exposed Dangerous Function Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18900</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1626/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1625: Microsoft Exchange Command Exposed Dangerous Function Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18932</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1625/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Tue, 22 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1624: Microsoft Exchange PowerShell Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18333</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1624/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41082.]]></description>
      <pubDate>Mon, 17 Oct 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1623: Hewlett Packard Enterprise OfficeConnect 1820 Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17747</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1623/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Hewlett Packard Enterprise OfficeConnect 1820 switches. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-37932.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1622: Trend Micro Apex One Security Agent Directory Traversal Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16928</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1622/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44653.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1621: Trend Micro Apex One Improper Handling of Exceptional Conditions Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16539</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1621/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44652.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1620: Trend Micro Apex One Security Agent Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17337</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1620/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-44651.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1619: Trend Micro Apex One Unauthorized Change Prevention Service Out-Of-Bounds Access Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17387</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1619/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2022-44649.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1618: Trend Micro Apex One Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16566</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1618/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2022-44648.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1617: Trend Micro Apex One Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16565</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1617/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.4. The following CVEs are assigned: CVE-2022-44647.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1616: Trend Micro Apex One Unauthorized Change Prevention Service Memory Corruption Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17432</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1616/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2022-44650.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1615: TP-Link TL-WR940N httpd Incorrect Implementation of Authentication Algorithm Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17332</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1615/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2022-43635.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1614: TP-Link TL-WR940N httpd Use of Insufficiently Random Values Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18334</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1614/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2022-43636.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1613: ManageEngine ServiceDesk Plus MSP generateSQLReport Improper Input Validation Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18609</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1613/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of ManageEngine ServiceDesk Plus MSP. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-40772.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1612: ManageEngine ServiceDesk Plus getAsDoc XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18280</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1612/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of ManageEngine ServiceDesk Plus. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2022-40771.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1611: ManageEngine ServiceDesk Plus invokeDataUploadTool Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18260</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1611/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of ManageEngine ServiceDesk Plus. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2022-40770.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1610: (Pwn2Own) Microsoft Teams electronSafeIpc Arbitrary File Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17466</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1610/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1609: (Pwn2Own) Microsoft Teams chat Client-Side Template Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17462</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1609/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization. The ZDI has assigned a CVSS rating of 6.3.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1608: (Pwn2Own) Microsoft Teams URL Allowlist Bypass Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17397</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1608/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1607: (Pwn2Own) Microsoft Teams Unnecessary Privileges Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17526</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1607/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Teams. An attacker must first obtain the ability to execute script within the application window in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.8.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1606: (Pwn2Own) Microsoft Teams pluginHost Sandbox Escape Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17467</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1606/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escape the sandbox on affected installations of Microsoft Teams. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1605: (Pwn2Own) Microsoft Teams WebView Incorrect Privilege Assignment Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17393</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1605/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization and are both participants in a meeting. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1604: Microsoft Exchange SerializationTypeConverter Deserialization of Untrusted Data NTLM Relay Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18882</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1604/</link>
      <description><![CDATA[This vulnerability allows remote attackers to relay NTLM credentials on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41079.]]></description>
      <pubDate>Wed, 16 Oct 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1603: Microsoft Exchange GetTorusCmdletConfigurationEntries Uncontrolled Search Path Element Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19100</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1603/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Exchange. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2022-41123.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1602: Microsoft Exchange TorusTryAccessCheck Uncontrolled Search Path Element Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19043</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1602/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Exchange. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41123.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1601: Microsoft Exchange ApprovedApplication Exposed Dangerous Method NTLM Relay Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18881</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1601/</link>
      <description><![CDATA[This vulnerability allows remote attackers to relay NTLM credentials on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-41078.]]></description>
      <pubDate>Wed, 16 Oct 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1600: Microsoft PowerPoint FBX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18390</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1600/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft PowerPoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41107.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1599: Microsoft Word FBX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18389</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1599/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41107.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1598: Microsoft Excel FBX File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18382</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1598/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41107.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1597: Microsoft Excel FBX File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18371</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1597/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41107.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1596: Microsoft Raw Image Extension CR2 File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18224</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1596/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Raw Image Extension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41052.]]></description>
      <pubDate>Mon, 21 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1595: Microsoft Exchange Autodiscover Server-Side Request Forgery Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18802</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1595/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2022-41040.]]></description>
      <pubDate>Mon, 17 Oct 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1594: Siemens Simcenter Femap X_T File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17745</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1594/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39157.]]></description>
      <pubDate>Thu, 17 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1593: Siemens Simcenter Femap X_T File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17854</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1593/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-43397.]]></description>
      <pubDate>Thu, 17 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1592: Parse Server _expandResultOnKeyPath Prototype Pollution Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18806</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1592/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2022-41879.]]></description>
      <pubDate>Tue, 15 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1591: Parse Server buildUpdatedObject Prototype Pollution Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18750</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1591/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2022-41878.]]></description>
      <pubDate>Tue, 15 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1590: Parse Server transformUpdate Prototype Pollution Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18358</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1590/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parse Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2022-39396.]]></description>
      <pubDate>Tue, 15 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1589: Microsoft Windows Output Protection Manager Integer Overflow Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17568</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1589/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41092.]]></description>
      <pubDate>Tue, 15 Nov 2022 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1588: SAP 3D Visual Enterprise Author SLDPRT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18153</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1588/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39804.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1587: SAP 3D Visual Enterprise Author EMF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18152</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1587/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41176.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1586: SAP 3D Visual Enterprise Author SAT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18223</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1586/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1585: SAP 3D Visual Enterprise Author X_B File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18222</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1585/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41182.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1584: SAP 3D Visual Enterprise Author X_B File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18221</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1584/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41182.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1583: SAP 3D Visual Enterprise Author PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18220</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1583/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41181.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1582: SAP 3D Visual Enterprise Author PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18219</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1582/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41180.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1581: SAP 3D Visual Enterprise Author PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18218</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1581/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41180.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1580: SAP 3D Visual Enterprise Author PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18217</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1580/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41180.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1579: SAP 3D Visual Enterprise Author PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18216</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1579/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41180.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1578: SAP 3D Visual Enterprise Author JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18215</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1578/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41179.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1577: SAP 3D Visual Enterprise Author JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18214</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1577/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41179.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1576: SAP 3D Visual Enterprise Author JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18213</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1576/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41179.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1575: SAP 3D Visual Enterprise Author JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18212</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1575/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41179.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1574: SAP 3D Visual Enterprise Author DXF File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18211</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1574/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41172.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1573: SAP 3D Visual Enterprise Author DXF File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18210</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1573/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41173.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1572: SAP 3D Visual Enterprise Author DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18209</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1572/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41172.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1571: SAP 3D Visual Enterprise Author DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18208</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1571/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41172.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1570: SAP 3D Visual Enterprise Author DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18207</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1570/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41172.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1569: SAP 3D Visual Enterprise Author DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18206</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1569/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41172.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1568: SAP 3D Visual Enterprise Author CATPart File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18205</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1568/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41168.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1567: SAP 3D Visual Enterprise Viewer OBJ File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18159</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1567/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41187.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1566: SAP 3D Visual Enterprise Author SAT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1566/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1565: SAP 3D Visual Enterprise Author SAT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18142</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1565/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1564: SAP 3D Visual Enterprise Author SAT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18141</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1564/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1563: SAP 3D Visual Enterprise Author SAT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18140</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1563/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1562: SAP 3D Visual Enterprise Author SAT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1562/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1561: SAP 3D Visual Enterprise Author SAT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18138</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1561/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1560: SAP 3D Visual Enterprise Author OBJ File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18137</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1560/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-39808.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1559: SAP 3D Visual Enterprise Author MODEL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18136</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1559/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41170.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1558: SAP 3D Visual Enterprise Author MODEL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18135</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1558/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41171.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1557: SAP 3D Visual Enterprise Author IGES File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18134</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1557/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41177.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1556: SAP 3D Visual Enterprise Author IGES File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18133</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1556/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41177.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1555: SAP 3D Visual Enterprise Author IGES File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18132</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1555/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41178.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1554: SAP 3D Visual Enterprise Author IGES File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18131</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1554/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41177.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1553: SAP 3D Visual Enterprise Author IGES File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18130</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1553/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41177.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1552: SAP 3D Visual Enterprise Author EMF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18129</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1552/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41176.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1551: SAP 3D Visual Enterprise Author EMF File Parsing Uninitialized Pointer Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18128</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1551/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41175.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1550: SAP 3D Visual Enterprise Author DWG File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18127</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1550/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41167.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1549: SAP 3D Visual Enterprise Author DWG File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18126</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1549/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41167.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1548: SAP 3D Visual Enterprise Author CUR File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18125</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1548/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41184.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1547: SAP 3D Visual Enterprise Author CUR File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18124</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1547/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41183.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1546: SAP 3D Visual Enterprise Author CATPart File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18123</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1546/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41168.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1545: SAP 3D Visual Enterprise Author CATPart File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1545/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41169.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1544: SAP 3D Visual Enterprise Author DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18121</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1544/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41167.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1543: SAP 3D Visual Enterprise Author OBJ File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18120</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1543/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41166.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1542: SAP 3D Visual Enterprise Author DXF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18119</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1542/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41173.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1541: SAP 3D Visual Enterprise Author CGM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18117</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1541/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39805.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1540: SAP 3D Visual Enterprise Author SLDPRT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1540/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39804.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1539: SAP 3D Visual Enterprise Author SLDPRT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1539/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39804.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1538: SAP 3D Visual Enterprise Author SLDDRW File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18145</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1538/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39806.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1537: SAP 3D Visual Enterprise Author SLDASM File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18144</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1537/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-39807.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1536: SAP 3D Visual Enterprise Author SAT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18148</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1536/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Author. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-39803.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1535: SAP 3D Visual Enterprise Viewer WRL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18067</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1535/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41197.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1534: SAP 3D Visual Enterprise Viewer VDS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18010</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1534/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41202.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1533: SAP 3D Visual Enterprise Viewer IV File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18009</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1533/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41199.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1532: SAP 3D Visual Enterprise Viewer WRL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18011</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1532/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41196.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1531: SAP 3D Visual Enterprise Viewer WRL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18020</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1531/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41196.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1530: SAP 3D Visual Enterprise Viewer JT File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17926</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1530/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41191.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1529: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17924</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1529/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41192.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1528: SAP 3D Visual Enterprise Viewer DXF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18012</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1528/</link>
      <description><![CDATA[This vulnerability allows remote attackers todisclose sensitive information on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41190.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1527: SAP 3D Visual Enterprise Viewer IFF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17968</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1527/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41195.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1526: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17805</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1526/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41191.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1525: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1525/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41191.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1524: SAP 3D Visual Enterprise Viewer CGM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17895</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1524/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41186.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1523: SAP 3D Visual Enterprise Viewer CGM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17783</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1523/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41186.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1522: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17780</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1522/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41192.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1521: SAP 3D Visual Enterprise Viewer SVG File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17779</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1521/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41200.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1520: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17953</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1520/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41191.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1519: SAP 3D Visual Enterprise Viewer CGM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17914</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1519/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41186.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1518: SAP 3D Visual Enterprise Viewer IFF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17774</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1518/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41195.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1517: SAP 3D Visual Enterprise Viewer DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17773</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1517/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2022-41190.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1516: SAP 3D Visual Enterprise Viewer JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17776</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1516/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41192.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1515: SAP 3D Visual Enterprise Viewer CGM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17775</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1515/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41186.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1514: SAP 3D Visual Enterprise Viewer OBJ File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17761</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1514/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41188.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1513: SAP 3D Visual Enterprise Viewer OBJ File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17760</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1513/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2022-41187.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1512: SAP 3D Visual Enterprise Viewer EPS File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17759</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1512/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41193.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1511: SAP 3D Visual Enterprise Viewer DWG File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17758</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1511/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2022-41189.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1510: SAP 3D Visual Enterprise Viewer DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17757</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1510/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2022-41190.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1509: SAP 3D Visual Enterprise Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17756</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1509/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2022-41198.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1508: SAP 3D Visual Enterprise Viewer DWG File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17777</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1508/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2022-41189.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-22-1507: SAP 3D Visual Enterprise Viewer DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-16004</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-22-1507/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-41189.]]></description>
      <pubDate>Thu, 03 Nov 2022 00:00:00 -0500</pubDate>
    </item>
    
  </channel>
</rss>
