<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Fri, 08 May 2026 11:29:56 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-23-1914: Google Chromium JIT Compilation Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21536</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1914/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Google Chromium. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.5.]]></description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1913: (0Day) Kofax Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1913/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51612.]]></description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1912: (0Day) Kofax Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21836</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1912/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51611.]]></description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1911: (0Day) Kofax Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21835</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1911/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51610.]]></description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1910: (0Day) Kofax Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21834</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1910/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51609.]]></description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1909: (0Day) Kofax Power PDF J2K File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21833</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1909/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51608.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1908: (0Day) Kofax Power PDF PNG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21829</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1908/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51607.]]></description>
      <pubDate>Thu, 06 Jun 2024 00:00:00 -0500</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1907: (0Day) Kofax Power PDF U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21759</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1907/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51606.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1906: (0Day) Kofax Power PDF U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21755</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1906/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51597.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1905: (0Day) BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20854</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1905/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2023-51592.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1904: (0Day) BlueZ Audio Profile AVRCP parse_media_element Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20853</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1904/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2023-51589.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1903: (0Day) BlueZ Audio Profile AVRCP avrcp_parse_attribute_list Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20852</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1903/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The ZDI has assigned a CVSS rating of 5.4. The following CVEs are assigned: CVE-2023-51580.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1902: (0Day) BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20939</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1902/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2023-51596.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1901: (0Day) BlueZ OBEX Library Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20937</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1901/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The ZDI has assigned a CVSS rating of 2.6. The following CVEs are assigned: CVE-2023-51594.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1900: (0Day) BlueZ Audio Profile AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19909</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1900/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2023-44431.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1899: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19748</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1899/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-29460.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1898: Rockwell Automation Arena Simulation DOE File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19750</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1898/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Rockwell Automation Arena Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-29460.]]></description>
      <pubDate>Thu, 21 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1897: (0Day) Voltronic Power ViewPower Pro selectDeviceListBy SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22163</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1897/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51595.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1896: (0Day) Voltronic Power ViewPower Pro Expression Language Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22095</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1896/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51593.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1895: (0Day) Voltronic Power ViewPower Pro doDocument XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22081</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1895/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2023-51591.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1894: (0Day) Voltronic Power ViewPower Pro UpLoadAction Unrestricted File Upload Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22080</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1894/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51590.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1893: (0Day) Voltronic Power ViewPower Pro MySQL Use of Hard-coded Credentials Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22075</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1893/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Voltronic Power ViewPower Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51588.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1892: (0Day) Voltronic Power ViewPower getModbusPassword Missing Authentication Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22073</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1892/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2023-51587.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1891: (0Day) Voltronic Power ViewPower Pro selectEventConfig SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22072</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1891/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51586.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1890: (0Day) Voltronic Power ViewPower USBCommEx shutdown Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22071</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1890/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. User interaction is required to exploit this vulnerability in that an administrator must trigger a shutdown operation. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-51585.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1889: (0Day) Voltronic Power ViewPower USBCommEx shutdown Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22065</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1889/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. User interaction is required to exploit this vulnerability in that an administrator must trigger a shutdown operation. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-51584.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1888: (0Day) Voltronic Power ViewPower UpsScheduler Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22036</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1888/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51583.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1887: (0Day) Voltronic Power ViewPower LinuxMonitorConsole Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22035</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1887/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51582.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1886: (0Day) Voltronic Power ViewPower MacMonitorConsole Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22034</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1886/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51581.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1885: (0Day) Voltronic Power ViewPower Incorrect Permission Assignment Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22025</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1885/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Voltronic Power ViewPower. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51579.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1884: (0Day) Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22024</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1884/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2023-51578.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1883: (0Day) Voltronic Power ViewPower setShutdown Exposed Dangerous Method Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22023</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1883/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Voltronic Power ViewPower. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51577.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1882: (0Day) Voltronic Power ViewPower Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22012</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1882/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51576.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1881: (0Day) Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22011</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1881/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51575.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1880: (0Day) Voltronic Power ViewPower updateManagerPassword Exposed Dangerous Method Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22010</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1880/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51574.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1879: (0Day) Voltronic Power ViewPower Pro updateManagerPassword Exposed Dangerous Function Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21203</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1879/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51573.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1878: (0Day) Voltronic Power ViewPower Pro getMacAddressByIp Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21163</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1878/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51572.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1877: (0Day) Voltronic Power ViewPower Pro SocketService Missing Authentication Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21162</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1877/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2023-51571.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1876: (0Day) Voltronic Power ViewPower Pro Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21012</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1876/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-51570.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1875: Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22500</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1875/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51562.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1874: Foxit PDF Reader Annotation Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22259</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1874/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51560.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1873: Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22003</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1873/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51551.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1872: Foxit PDF Reader Doc Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22258</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1872/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51559.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1871: Foxit PDF Reader AcroForm Doc Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22257</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1871/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51558.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1870: Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22256</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1870/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51557.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1869: Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22255</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1869/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51556.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1868: Foxit PDF Reader Doc Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22254</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1868/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51555.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1867: Foxit PDF Reader Bookmark Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22110</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1867/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51553.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1866: Foxit PDF Reader Signature Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1866/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51554.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1865: Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22007</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1865/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51552.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1864: Foxit PDF Reader combobox Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21870</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1864/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51550.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1863: Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1863/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51549.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1862: Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22283</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1862/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-51561.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1861: oFono SMS Decoder Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20971</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1861/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of oFono. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2023-2794.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1860: oFono SMS Decoder Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21014</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1860/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of oFono. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2023-4232.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1859: oFono SMS Decoder Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20996</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1859/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of oFono. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2023-4233.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1858: oFono SMS Decoder Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21015</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1858/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of oFono. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2023-4234.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1857: (0Day) Hancom Office Show PPT File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20387</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1857/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hancom Office Show. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50235.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1856: (0Day) Hancom Office Cell XLS File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20386</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1856/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hancom Office Cell. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50234.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1855: (0Day) Hancom Office Word DOC File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20384</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1855/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hancom Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2023-51598.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1854: (0Day) Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18644</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1854/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2023-51605.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1853: (0Day) Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18593</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1853/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2023-51604.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1852: (0Day) Honeywell Saia PG5 Controls Suite CAB File Parsing Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18592</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1852/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51603.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1851: (0Day) Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18591</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1851/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2023-51602.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1850: (0Day) Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18563</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1850/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2023-51601.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1849: (0Day) Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18456</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1849/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2023-51600.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1848: (0Day) Honeywell Saia PG5 Controls Suite Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18412</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1848/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-51599.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1847: NETGEAR ProSAFE Network Management System saveNodeLabel Cross-Site Scripting Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21838</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1847/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Minimal user interaction is required to exploit this vulnerability.  The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2023-50231.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1846: Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21800</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1846/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50196.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1845: Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21799</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1845/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50195.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1844: Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21788</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1844/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50194.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1843: Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21787</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1843/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50193.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1842: Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21786</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1842/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50192.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1841: Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21785</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1841/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50191.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1840: Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21784</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1840/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50190.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1839: Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21783</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1839/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50189.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1838: Trimble SketchUp Viewer SKP File Parsing Uninitialized Variable Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20792</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1838/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50188.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1837: Trimble SketchUp Viewer SKP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20789</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1837/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50187.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1836: Linux Mint Xreader CBT File Parsing Argument Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22132</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1836/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44452.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1835: Linux Mint Xreader EPUB File Parsing Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21897</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1835/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Mint Xreader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44451.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1834: Linux Kernel nf_tables_expr_destroy Use-After-Free Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-17442</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1834/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2022-32250.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1833: D-Link G416 awsfile rm Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21811</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1833/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50217.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1832: D-Link G416 awsfile tar File Handling Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21810</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1832/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50216.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1831: D-Link G416 nodered gz File Handling Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21809</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1831/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50215.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1830: D-Link G416 nodered tar File Handling Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21808</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1830/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50214.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1829: D-Link G416 nodered File Handling Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21807</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1829/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50213.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1828: D-Link G416 httpd Improper Handling of Exceptional Conditions Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21664</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1828/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2023-50212.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1827: D-Link G416 httpd API-AUTH Timestamp Processing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21663</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1827/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50211.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1826: D-Link G416 httpd API-AUTH Digest Processing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21662</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1826/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50210.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1825: D-Link G416 cfgsave Stack-Based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21442</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1825/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50209.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1824: D-Link G416 ovpncfg Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21441</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1824/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50208.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1823: D-Link G416 flupl filename Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21300</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1823/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50207.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1822: D-Link G416 flupl query_type edit Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21299</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1822/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50206.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1821: D-Link G416 awsfile chmod Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21298</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1821/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50205.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1820: D-Link G416 flupl pythonapp Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21297</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1820/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50204.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1819: D-Link G416 nodered chmod Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21296</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1819/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50203.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1818: D-Link G416 flupl pythonmodules Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21295</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1818/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50202.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1817: D-Link G416 cfgsave upusb Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21289</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1817/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50201.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1816: D-Link G416 cfgsave backusb Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21288</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1816/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50200.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1815: D-Link G416 httpd Missing Authentication for Critical Function Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21287</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1815/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50199.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1814: D-Link G416 cfgsave Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21286</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1814/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50198.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1813: Inductive Automation Ignition ModuleInvoke Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21624</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1813/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-50218.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1812: BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20938</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1812/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2023-50230.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1811: BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20936</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1811/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2023-50229.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1810: QEMU NVMe Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21521</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1810/</link>
      <description><![CDATA[This vulnerability allows local attackers to disclose sensitive information on affected installations of QEMU. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.0. The following CVEs are assigned: CVE-2023-4135.]]></description>
      <pubDate>Wed, 20 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1809: TP-Link TL-WR902AC dm_fillObjByStr Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21819</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1809/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR902AC routers. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2023-50225.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1808: TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19899</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1808/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned: CVE-2023-50224.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1807: X.Org Server Damage Object Use-After-Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21213</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1807/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-5574.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1806: X.Org Server Window Object Use-After-Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21608</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1806/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-5380.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1805: Parallels Desktop Updater Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21227</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1805/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50226.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1804: Parallels Desktop virtio-gpu Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21260</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1804/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Parallels Desktop. User interaction is required to exploit this vulnerability in that the target in a guest system must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.3. The following CVEs are assigned: CVE-2023-50227.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1803: Parallels Desktop Updater Improper Verification of Cryptographic Signature Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21817</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1803/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50228.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1802: Ivanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19503</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1802/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Ivanti Avalanche. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-43555.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1801: Ivanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19502</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1801/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Ivanti Avalanche. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-43554.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1800: Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21006</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1800/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Ivanti Avalanche. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-41725.]]></description>
      <pubDate>Tue, 19 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1799: Ivanti Avalanche Incorrect Default Permissions Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21231</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1799/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Ivanti Avalanche. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-41726.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1798: PaperCut NG Uncontrolled Search Path Element Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21500</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1798/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2023-6006.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1797: Schneider Electric C-Bus Toolkit TransferCommand Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21115</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1797/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric C-Bus Toolkit. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-5402.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1796: Schneider Electric C-Bus Toolkit FileCommand Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21129</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1796/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric C-Bus Toolkit. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-5399.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1795: Schneider Electric EcoStruxure Power Monitoring Expert GetFilteredSinkProvider Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21035</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1795/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric EcoStruxure Power Monitoring Expert. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-5391.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1794: Schneider Electric APC Easy UPS Online deletePdfReportFile Directory Traversal Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21370</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1794/</link>
      <description><![CDATA[This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Schneider Electric APC Easy UPS Online. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.3. The following CVEs are assigned: CVE-2023-6407.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1793: Delta Electronics DOPSoft DPA File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18920</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1793/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DOPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-5944.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1792: Microsoft Windows win32kfull UMPDDrvCopyBits Use-After-Free Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21865</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1792/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-36804.]]></description>
      <pubDate>Fri, 15 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1791: Microsoft Excel SKP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18968</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1791/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-33146.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1790: Microsoft Excel SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19241</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1790/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-33146.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1789: Microsoft Excel SKP File Parsing Uninitialized Variable Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20358</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1789/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-33146.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1788: Microsoft Excel SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19177</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1788/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-33146.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1787: Microsoft Excel SKP File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19178</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1787/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-33146.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1786: Microsoft Word SKP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18056</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1786/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1785: Microsoft Office SKP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18514</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1785/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1784: Microsoft Word SKP File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-18976</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1784/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1783: Adobe After Effects AEP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22172</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1783/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-48632.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1782: Adobe After Effects AEP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22174</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1782/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-48635.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1781: Adobe After Effects AEP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22175</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1781/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe After Effects. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-48634.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1780: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22249</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1780/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-47078.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1779: Adobe Dimension GLTF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22284</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1779/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-47062.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1778: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22279</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1778/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-47079.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1777: Adobe Dimension GLB File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22278</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1777/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Dimension. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-47061.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1776: Adobe Prelude MP4 File Uninitialized Variable Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21791</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1776/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Prelude. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-44362.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1775: Adobe Illustrator JP2 File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21812</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1775/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Illustrator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-47074.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1774: Adobe Illustrator JP2 File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22006</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1774/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Illustrator. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-47075.]]></description>
      <pubDate>Thu, 14 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1773: (0Day) Intel Driver &amp; Support Assistant Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21845</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1773/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver &amp; Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-50197.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1772: (0Day) OpenAI ChatGPT Improper Input Validation Model Policy Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22660</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1772/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass policy restictions on affected versions of OpenAI ChatGPT. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1771: Microsoft Excel SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19120</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1771/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2022-26804.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1770: Microsoft Office Visio EMF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1770/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1769: Microsoft Skype Cross-Site Scripting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19099</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1769/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Skype. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1768: Microsoft Word SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19625</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1768/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1767: Microsoft Teams Isolated Webview Prototype Pollution Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20812</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1767/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Teams. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.1.]]></description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1766: Extreme Networks AP410C ah_webui Missing Authentication for Critical Function Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20530</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1766/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to reach critical functions on affected installations of Extreme Networks AP410C routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-46271.]]></description>
      <pubDate>Tue, 12 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1765: Extreme Networks HiveOS ah_auth Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-20728</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1765/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Extreme Networks routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-46272.]]></description>
      <pubDate>Tue, 12 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1764: Check Point ZoneAlarm Extreme Security Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-19062</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1764/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-28134.]]></description>
      <pubDate>Tue, 12 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1763: Apple macOS Hydra Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21505</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1763/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the Hydra library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-42826.]]></description>
      <pubDate>Thu, 07 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1762: SolarWinds Orion Platform VimChartInfo SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21962</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1762/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Orion Platform. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-40056.]]></description>
      <pubDate>Tue, 05 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1761: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22563</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1761/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Tue, 05 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1760: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22567</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1760/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Tue, 05 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1759: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22562</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1759/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Tue, 05 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1758: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22564</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1758/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Tue, 05 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1757: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22568</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1757/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Tue, 05 Dec 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1756: Delta Electronics InfraSuite Device Master PlayWaveFile Directory Traversal Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22013</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1756/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Delta Electronics InfraSuite Device Master. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2023-47279.]]></description>
      <pubDate>Thu, 30 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1755: Delta Electronics InfraSuite Device Master RunScript Exposed Dangerous Method Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21859</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1755/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics InfraSuite Device Master. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-39226.]]></description>
      <pubDate>Thu, 30 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1754: Delta Electronics InfraSuite Device Master Device-DataCollect Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21771</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1754/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics InfraSuite Device Master. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-47207.]]></description>
      <pubDate>Thu, 30 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1753: Delta Electronics InfraSuite Device Master Device-Gateway Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21770</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1753/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics InfraSuite Device Master. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2023-47207.]]></description>
      <pubDate>Thu, 30 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1752: Delta Electronics InfraSuite Device Master UploadMedia Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21707</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1752/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics InfraSuite Device Master. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-46690.]]></description>
      <pubDate>Thu, 30 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1751: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22600</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1751/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1750: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22599</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1750/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1749: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22566</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1749/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1748: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22292</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1748/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1747: Adobe Acrobat Reader DC Font Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22612</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1747/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1746: Adobe Acrobat Reader DC Font Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22601</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1746/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1745: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22598</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1745/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1744: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22597</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1744/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1743: Adobe Acrobat Reader DC Font Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22602</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1743/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1742: Adobe Acrobat Reader DC Font Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22603</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1742/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1741: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22605</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1741/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1740: Adobe Acrobat Reader DC Font Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22604</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1740/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1739: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22606</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1739/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1738: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22607</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1738/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1737: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22608</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1737/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1736: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22609</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1736/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44371.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1735: Fuji Electric Tellus Lite V-Simulator V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21212</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1735/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-40152.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1734: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21214</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1734/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1733: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21304</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1733/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1732: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21303</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1732/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1731: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21302</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1731/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1730: Fuji Electric Tellus Lite Incorrect Default Permissions Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21224</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1730/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Fuji Electric Tellus Lite. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2023-5299.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1729: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21238</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1729/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-40152.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1728: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21236</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1728/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1727: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21176</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1727/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1726: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21178</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1726/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1725: Fuji Electric Tellus Lite V-Simulator V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21211</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1725/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-40152.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1724: Fuji Electric Tellus Lite V-Simulator V9 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21210</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1724/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-40152.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1723: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21175</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1723/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1722: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21174</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1722/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1721: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21215</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1721/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1720: Fuji Electric Tellus Lite V-Simulator 6 V9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21121</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1720/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-35127.]]></description>
      <pubDate>Mon, 27 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1719: ManageEngine Recovery Manager Plus getEscapedValue Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21173</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1719/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of ManageEngine Recovery Manager Plus. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2023-48646.]]></description>
      <pubDate>Wed, 22 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1718: NETGEAR ProSAFE Network Management System getNodesByTopologyMapSearch SQL Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21858</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1718/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-44450.]]></description>
      <pubDate>Mon, 20 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1717: NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21875</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1717/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-44449.]]></description>
      <pubDate>Mon, 20 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1716: Luxion KeyShot Viewer KSP File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-22139</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1716/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-0412.]]></description>
      <pubDate>Thu, 16 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-23-1715: ManageEngine Applications Manager SingleSignOn Cross-Site Scripting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-21226</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-23-1715/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of ManageEngine Applications Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2023-38333.]]></description>
      <pubDate>Wed, 15 Nov 2023 00:00:00 -0600</pubDate>
    </item>
    
  </channel>
</rss>
