<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="https://www.zerodayinitiative.com/rss/published/" rel="self" type="application/xml" />
    <title><![CDATA[ZDI: Published Advisories]]></title>
    <link>http://www.zerodayinitiative.com/advisories/published/</link>
    <description><![CDATA[The following is a list of publicly disclosed vulnerabilities discovered by
                   Zero Day Initiative researchers. While the affected vendor is working on a patch for these
                   vulnerabilities, TrendAI customers are protected from exploitation by security filters
                   delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
                   Zero Day Initiative are handled according to the ZDI Disclosure Policy.
        ]]></description>
    <pubDate>Thu, 16 Apr 2026 21:27:23 -0500</pubDate>
    <copyright>Trend Micro, all rights reserved</copyright>
    <language>en</language>
    
    <item>
      <title><![CDATA[ZDI-25-1202: (0Day) Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27040</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1202/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15351.]]></description>
      <pubDate>Tue, 30 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1201: (0Day) Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27039</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1201/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu VectorStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15350.]]></description>
      <pubDate>Tue, 30 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1200: (0Day) Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27315</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1200/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Anritsu ShockLine. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-15349.]]></description>
      <pubDate>Tue, 30 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1199: (0Day) Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27833</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1199/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15348.]]></description>
      <pubDate>Tue, 30 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1198: Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27769</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1198/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15062.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1197: Framelink Figma MCP Server fetchWithRetry Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27877</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1197/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Framelink Figma MCP Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-15061.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1196: GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28232</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1196/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15059.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1195: (0Day) FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28564</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1195/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15269.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1194: (0Day) FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28563</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1194/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15270.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1193: (0Day) FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28562</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1193/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15271.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1192: (0Day) FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28547</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1192/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15272.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1191: (0Day) FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28546</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1191/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15273.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1190: (0Day) FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28544</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1190/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15274.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1189: (0Day) FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28543</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1189/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15275.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1188: (0Day) FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28525</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1188/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-15280.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1187: (0Day) FontForge SFD File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28198</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1187/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15276.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1186: (0Day) FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27920</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1186/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15277.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1185: (0Day) FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27865</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1185/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15278.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1184: (0Day) FontForge GUtils BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27517</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1184/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-15279.]]></description>
      <pubDate>Mon, 29 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1183: Tencent FaceDetection-DSFD resnet Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27197</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1183/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent FaceDetection-DSFD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13715.]]></description>
      <pubDate>Tue, 23 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1182: LibreNMS Alert Rule API Cross-Site Scripting Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28575</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1182/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary script on affected installations of LibreNMS. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-68614.]]></description>
      <pubDate>Tue, 23 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1181: Net-SNMP SnmpTrapd Agent Message Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27507</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1181/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Net-SNMP. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-68615.]]></description>
      <pubDate>Tue, 23 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1180: Foxit PDF Reader PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28558</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1180/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66499.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1179: Foxit PDF Reader U3D File Parsing Use-After-Free Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28532</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1179/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-66498.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1178: Foxit PDF Reader U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28531</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1178/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-66497.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1177: Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28523</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1177/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66496.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1176: Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28403</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1176/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66495.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1175: Foxit PDF Reader PDF File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28306</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1175/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66494.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1174: Foxit PDF Reader AcroForm User-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28210</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1174/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66493.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1173: Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28053</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1173/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13941.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1172: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27668</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1172/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14492.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1171: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27678</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1171/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14496.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1170: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27675</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1170/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14493.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1169: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27677</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1169/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14495.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1168: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27680</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1168/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14497.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1167: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27657</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1167/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14488.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1166: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27659</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1166/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14490.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1165: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27658</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1165/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14489.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1164: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27660</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1164/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14491.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1163: RealDefense SUPERAntiSpyware Exposed Dangerous Function Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27676</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1163/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of RealDefense SUPERAntiSpyware. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14494.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1162: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26837</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1162/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66590.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1161: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26840</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1161/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66589.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1160: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26836</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1160/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66589.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1159: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26835</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1159/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66589.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1158: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25521</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1158/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66589.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1157: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25511</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1157/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66589.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1156: AzeoTech DAQFactory CTL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25510</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1156/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66589.]]></description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1155: (0Day) NSF Unidata NetCDF-C Attribute Name Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27269</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1155/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14936.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1154: (0Day) NSF Unidata NetCDF-C Dimension Name Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27168</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1154/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14935.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1153: (0Day) NSF Unidata NetCDF-C Time Unit Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27273</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1153/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14932.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1152: (0Day) NSF Unidata NetCDF-C Variable Name Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27267</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1152/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14934.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1151: (0Day) NSF Unidata NetCDF-C NC Variable Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27266</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1151/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14933.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1150: (0Day) Hugging Face Transformers Perceiver Model Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25423</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1150/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14920.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1149: (0Day) Hugging Face Transformers Transformer-XL Model Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25424</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1149/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14921.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1148: (0Day) Hugging Face Transformers SEW-D convert_config Code Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28252</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1148/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14927.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1147: (0Day) Hugging Face Transformers SEW convert_config Code Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28251</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1147/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14926.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1146: (0Day) Hugging Face Transformers HuBERT convert_config Code Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28253</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1146/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14928.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1145: (0Day) Hugging Face Transformers GLM4 Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28309</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1145/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14930.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1144: (0Day) Hugging Face Transformers X-CLIP Checkpoint Conversion Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28308</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1144/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14929.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1143: (0Day) Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28312</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1143/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face smolagents. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 10.0. The following CVEs are assigned: CVE-2025-14931.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1142: (0Day) Hugging Face Diffusers CogView4 Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27424</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1142/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Diffusers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14922.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1141: (0Day) Hugging Face Transformers megatron_gpt2 Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27984</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1141/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14924.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1140: (0Day) Hugging Face Accelerate Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27985</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1140/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Accelerate. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14925.]]></description>
      <pubDate>Thu, 18 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1139: GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28248</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1139/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14425.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1138: GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28376</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1138/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14424.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1137: GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1137/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14423.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1136: GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28273</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1136/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14422.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1135: Autodesk AutoCAD CATPRODUCT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27960</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1135/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10881.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1134: AzeoTech DAQFactory CTL File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26883</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1134/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66586.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1133: AzeoTech DAQFactory CTL File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25515</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1133/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66586.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1132: AzeoTech DAQFactory CTL File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25513</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1132/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66586.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1131: AzeoTech DAQFactory CTL File Parsing Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27523</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1131/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66586.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1130: AzeoTech DAQFactory CTL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25512</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1130/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66590.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1129: AzeoTech DAQFactory CTL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27811</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1129/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66590.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1128: AzeoTech DAQFactory CTL File Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25514</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1128/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of AzeoTech DAQFactory. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66585.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1127: Apple Safari JavaScriptCore FTL DataView byteLength Property Handling Type Confusion Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28038</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1127/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-43541.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1126: Apple Safari JavaScriptCore HashTable Expansion Integer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28284</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1126/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-43501.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1125: Trend Micro Cleaner One Pro Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27644</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1125/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Cleaner One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2025-53503.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1124: Siemens Simcenter Femap SLDPRT File Parsing Uninitialized Memory Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27146</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1124/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-40829.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1123: Autodesk AutoCAD CATPART File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28421</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1123/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14593.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1122: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28179</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1122/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10900.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1121: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28180</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1121/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10899.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1120: Autodesk AutoCAD SLDPRT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27970</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1120/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9452.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1119: Autodesk AutoCAD PRT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27971</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1119/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9453.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1118: Autodesk AutoCAD PRT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27972</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1118/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9454.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1117: Autodesk AutoCAD CATPRODUCT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27963</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1117/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9455.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1116: Autodesk AutoCAD SLDPRT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27964</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1116/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9456.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1115: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27961</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1115/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9457.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1114: Autodesk AutoCAD SLDPRT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27966</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1114/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9459.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1113: Autodesk AutoCAD SLDPRT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27967</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1113/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-9460.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1112: Autodesk AutoCAD X_T File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27973</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1112/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10882.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1111: Autodesk AutoCAD CATPRODUCT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27974</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1111/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10883.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1110: Autodesk AutoCAD CATPART File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27998</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1110/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10884.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1109: Autodesk AutoCAD MODEL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28120</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1109/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10886.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1108: Autodesk AutoCAD MODEL File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28126</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1108/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10886.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1107: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28127</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1107/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10888.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1106: Autodesk AutoCAD CATPART File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28128</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1106/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10889.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1105: Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28181</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1105/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-10898.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1104: Sante PACS Server HTTP Content-Length Header Handling NULL Pointer Dereference Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26770</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1104/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-14501.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1103: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27360</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1103/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-53524.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1102: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27436</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1102/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-53524.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1101: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27438</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1101/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-53524.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1100: Fuji Electric Monitouch V-SFT V7 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27440</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1100/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-53524.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1099: Microsoft Edge Mark-Of-The-Web Removal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27795</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1099/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-60711.]]></description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1098: Fortinet FortiSandbox hcproxy Cross-Site Scripting Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27306</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1098/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiSandbox. Minimal user interaction is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 5.5. The following CVEs are assigned: CVE-2025-54353.]]></description>
      <pubDate>Tue, 16 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1097: Fortinet FortiSandbox name Parameter Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27309</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1097/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiSandbox. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-53949.]]></description>
      <pubDate>Tue, 16 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1096: Fortinet FortiSandbox upload_vdi_file Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27308</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1096/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiSandbox. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-53949.]]></description>
      <pubDate>Tue, 16 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1095: Fortinet FortiSandbox names admindel_confirm Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27305</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1095/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiSandbox. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-53949.]]></description>
      <pubDate>Tue, 16 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1094: Fortinet FortiWeb ApacheCookie_parse Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28211</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1094/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of Fortinet FortiWeb. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2025-64447.]]></description>
      <pubDate>Tue, 16 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1093: (0Day) PDFsam Enhanced Uncontrolled Search Path Element Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27867</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1093/</link>
      <description><![CDATA[This vulnerability allows phyiscally-present attackers to escalate privileges on affected installations of PDFsam Enhanced. An attacker must first obtain the ability to mount a malicious drive onto the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.6. The following CVEs are assigned: CVE-2025-14405.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1092: (0Day) PDFsam Enhanced XLS File Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27498</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1092/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDFsam Enhanced. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-14404.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1091: (0Day) PDFsam Enhanced Launch Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27500</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1091/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDFsam Enhanced. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14403.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1090: (0Day) PDFsam Enhanced DOC File Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27499</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1090/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDFsam Enhanced. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-14402.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1089: (0Day) PDFsam Enhanced App Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27260</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1089/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDFsam Enhanced. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14401.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1088: (0Day) Soda PDF Desktop Launch Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27494</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1088/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-14415.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1087: (0Day) Soda PDF Desktop Word File Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27496</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1087/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14414.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1086: (0Day) Soda PDF Desktop CBZ File Parsing Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27509</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1086/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14413.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1085: (0Day) Soda PDF Desktop XLS File Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27495</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1085/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14412.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1084: (0Day) Soda PDF Desktop PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27140</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1084/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-14411.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1083: (0Day) Soda PDF Desktop PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27142</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1083/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-14410.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1082: (0Day) Soda PDF Desktop PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27120</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1082/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14409.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1081: (0Day) Soda PDF Desktop PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27143</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1081/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-14408.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1080: (0Day) Soda PDF Desktop PDF File Parsing Memory Corruption Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27141</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1080/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Soda PDF Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-14407.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1079: (0Day) Soda PDF Desktop Uncontrolled Search Path Element Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25793</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1079/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Soda PDF Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14406.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1078: (0Day) pdfforge PDF Architect PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27915</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1078/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of pdfforge PDF Architect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2025-14421.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1077: (0Day) pdfforge PDF Architect CBZ File Parsing Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27514</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1077/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of pdfforge PDF Architect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14420.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1076: (0Day) pdfforge PDF Architect PDF File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27902</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1076/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of pdfforge PDF Architect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14419.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1075: (0Day) pdfforge PDF Architect XLS File Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27502</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1075/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of pdfforge PDF Architect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-14418.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1074: (0Day) pdfforge PDF Architect Launch Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27501</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1074/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of pdfforge PDF Architect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14417.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1073: (0Day) pdfforge PDF Architect DOC File Insufficient UI Warning Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27503</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1073/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of pdfforge PDF Architect. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-14416.]]></description>
      <pubDate>Thu, 11 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1072: IceWarp14 X-File-Operation Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27394</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1072/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-14500.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1071: IceWarp gmaps Cross-Site Scripting Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-25441</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1071/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of IceWarp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-14499.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1070: TradingView Desktop Electron Uncontrolled Search Path Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27395</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1070/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of TradingView Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14498.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1069: (Pwn2Own) oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-23193</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1069/</link>
      <description><![CDATA[This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-7539.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1068: Fuji Electric Monitouch V-SFT V7 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27353</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1068/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54496.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1067: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27358</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1067/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54526.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1066: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27352</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1066/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54526.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1065: Fuji Electric Monitouch V-SFT V7 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27350</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1065/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54496.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1064: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27527</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1064/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54526.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1063: Fuji Electric Monitouch V-SFT V7 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27399</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1063/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54526.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1062: Fuji Electric Monitouch V-SFT V7 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27351</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1062/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-54496.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1061: Windscribe Uncontrolled Search Path Element Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27873</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1061/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-14400.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1060: Senstar Symphony FetchStoredLicense Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26908</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1060/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Senstar Symphony. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-12491.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1059: Vim for Windows Uncontrolled Search Path Element Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28569</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1059/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Vim for Windows. User interaction is required to exploit this vulnerability in that the target must  open a malicious file and perform one of a set of specific actions in the editor. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-66476.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1058: (0Day) Microsoft Windows TAR File UI Misrepresentation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27311</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1058/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disguise hard links on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1057: (0Day) Microsoft Visual Studio VsDevCmd Uncontrolled Search Path Element Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26574</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1057/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Visual Studio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1056: (0Day) Microsoft ASP.NET SOAP Execution Restriction Bypass Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27220</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1056/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft ASP.NET. Authentication may be required to exploit this vulnerability depending upon configuration. Additionally, specific configuration is required. The ZDI has assigned a CVSS rating of 5.0.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1055: (0Day) Microsoft Windows MP4 File Parsing Null Pointer Dereference Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27835</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1055/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1054: (0Day) Microsoft Windows dir Command Improper Character Neutralization Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26750</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1054/</link>
      <description><![CDATA[This vulnerability allows remote attackers to display misleading terminal output on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1053: (0Day) Microsoft SharePoint Calendar Overlay Hyperlink Injection Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27955</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1053/</link>
      <description><![CDATA[This vulnerability allows remote attackers to inject unexpected hyperlinks on affected installations of Microsoft SharePoint. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.5.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1052: Ivanti Endpoint Manager CAB File Parsing Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28116</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1052/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Endpoint Manager. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2025-13661.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1051: Ivanti Endpoint Manager HIIDriver Improper Verification of Cryptographic Signature Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26897</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1051/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Endpoint Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. Alternatively, no user interaction is required if the attacker has administrative credentials to the application. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13662.]]></description>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1050: Microsoft Azure Virtual Desktop Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26573</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1050/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Azure Virtual Desktop. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1049: Microsoft Windows win32kfull Out-Of-Bounds Write Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27759</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1049/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-62458.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1048: Microsoft Windows win32kfull Out-Of-Bounds Write Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27760</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1048/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-62458.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1047: Microsoft Windows win32kbase Out-Of-Bounds Access Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27761</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1047/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-62458.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1046: Microsoft Windows win32kfull Type Confusion Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27832</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1046/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-62458.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1045: Schneider Electric PowerChute Serial Shutdown Directory Traversal Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27376</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1045/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric PowerChute Serial Shutdown. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Additionally, the attacker must authenticate to the application. The ZDI has assigned a CVSS rating of 6.7. The following CVEs are assigned: CVE-2025-11565,  CVE-2025-11566,  CVE-2025-11567.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1044: NVIDIA Isaac-GR00T secure_server Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27954</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1044/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of NVIDIA Isaac-GR00T. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2025-33184.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1043: Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27425</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1043/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-64899.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1042: Siemens Simcenter Femap IGS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26755</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1042/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-40936.]]></description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1041: NVIDIA Isaac-GR00T TorchSerializer Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27950</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1041/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NVIDIA Isaac-GR00T. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-33183.]]></description>
      <pubDate>Thu, 04 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1040: (Pwn2Own) Synology DiskStation DS925+ samlAuth Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28409</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1040/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Synology DiskStation DS925+ devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2025-13392.]]></description>
      <pubDate>Wed, 03 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1039: (Pwn2Own) Synology BeeStation Plus auth_info Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28275</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1039/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Synology BeeStation Plus. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-12686.]]></description>
      <pubDate>Wed, 03 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1038: NVIDIA Megatron load_common Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27201</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1038/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of NVIDIA Megatron. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-23357.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1037: Emerson Movicon RTUSERS File Parsing Memory Corruption Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27649</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1037/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Emerson Movicon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-3871.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1036: Tencent TFace restore_checkpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27185</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1036/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent TFace. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13709.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1035: Tencent TFace eval Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27187</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1035/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent TFace. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13711.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1034: Tencent PatrickStar merge_checkpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27182</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1034/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent PatrickStar. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13706.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1033: Tencent NeuralNLP-NeuralClassifier _load_checkpoint Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27184</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1033/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent NeuralNLP-NeuralClassifier. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13708.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1032: Tencent MimicMotion create_pipeline Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27208</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1032/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent MimicMotion. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13716.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1031: Tencent MedicalNet generate_model Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27192</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1031/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent MedicalNet. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13714.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1030: Tencent HunyuanVideo load_vae Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27186</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1030/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent HunyuanVideo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13710.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1029: Tencent HunyuanDiT model_resume Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27183</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1029/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent HunyuanDiT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13707.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1028: Tencent HunyuanDiT merge Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27190</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1028/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent HunyuanDiT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13712.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1027: Tencent Hunyuan3D-1 load_pretrained Deserialization of Untrusted Data Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27191</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1027/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent Hunyuan3D-1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13713.]]></description>
      <pubDate>Mon, 01 Dec 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1026: Appleton UPSMON-PRO UPSMONProService Stack-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-24122</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1026/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Appleton UPSMON-PRO. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-3871.]]></description>
      <pubDate>Thu, 27 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1025: MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27000</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1025/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.0. The following CVEs are assigned: CVE-2025-13699.]]></description>
      <pubDate>Thu, 27 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1024: DreamFactory saveZipFile Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26589</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1024/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of DreamFactory. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-13700.]]></description>
      <pubDate>Wed, 26 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1023: VIPRE Advanced Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27147</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1023/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security for PC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-13703.]]></description>
      <pubDate>Wed, 26 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1022: Deciso OPNsense diag_backup.php filename Directory Traversal Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28133</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1022/</link>
      <description><![CDATA[This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Deciso OPNsense. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.8. The following CVEs are assigned: CVE-2025-13698.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1021: Siemens SINEC NMS getTotalAndFilterCounts SQL Injection Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26570</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1021/</link>
      <description><![CDATA[This vulnerability allows remote attackers to escalate privileges on affected installations of Siemens SINEC NMS. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-40755.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1020: Arista NG Firewall runTroubleshooting Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27310</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1020/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-6978.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1019: Arista NG Firewall replace_marker Exposed Dangerous Function Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27007</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1019/</link>
      <description><![CDATA[This vulnerability allows remote attackers to to bypass authentication on affected installations of Arista NG Firewall. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-6979.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1018: Arista NG Firewall load_capture_settings Exposed Dangerous Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27006</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1018/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-6980.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1017: ASUS MyASUS Incorrect Permission Assignment Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27794</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1017/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of ASUS MyASUS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-59373.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1016: Wibu-Systems WibuKey Runtime Untrusted Pointer Dereference Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27540</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1016/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Wibu-Systems WibuKey Runtime. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1015: Parallels Toolbox CleanDrive Link Following Local Privilege Escalation Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-26516</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1015/</link>
      <description><![CDATA[This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Toolbox. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. Additional user interaction is required in that an administrator must begin a cleanup of temporary files on the system. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2025-66288.]]></description>
      <pubDate>Tue, 25 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1014: Fortinet FortiWeb policy_scripting_post_handler Command Injection Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27383</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1014/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fortinet FortiWeb. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2025-58034.]]></description>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1013: NVIDIA AIStore AuthN Hard-coded Credentials Authentication Bypass Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27858</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1013/</link>
      <description><![CDATA[This vulnerability allows remote attackers to bypass authentication on affected installations of NVIDIA AIStore. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-33186.]]></description>
      <pubDate>Fri, 14 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1012: NVIDIA AIStore AuthN users Missing Authentication for Critical Function Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27857</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1012/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of NVIDIA AIStore. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2025-33185.]]></description>
      <pubDate>Fri, 14 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1011: Apple Safari JavaScriptCore Wasm Function Parsing Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-28039</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1011/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-43432.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1010: Apple Safari JavaScriptCore DFG CSE Phase Graph Node Substitution Use-After-Free Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27991</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1010/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2025-43457.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1009: Apple macOS USD readAccessorData Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27849</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1009/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the USD library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-43384.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1008: Apple macOS ICC Profile Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27894</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1008/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-43380.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1007: Apple Safari JavaScriptCore operationMapIteratorNext Type Confusion Information Disclosure Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27825</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1007/</link>
      <description><![CDATA[This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-43438.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1006: Apple macOS CoreText Font Glyph Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27796</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1006/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2025-43445.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1005: Apple macOS WindowServer Excessive Iteration Denial-of-Service Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27348</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1005/</link>
      <description><![CDATA[This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Apple macOS. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 4.3. The following CVEs are assigned: CVE-2025-43401.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1004: Apple macOS USD importMeshJointWeights Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27854</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1004/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the USD library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-43386.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
    <item>
      <title><![CDATA[ZDI-25-1003: Apple macOS USD importNodeAnimations Heap-based Buffer Overflow Remote Code Execution Vulnerability]]></title>
      <guid isPermaLink="false">ZDI-CAN-27853</guid>
      <link>http://www.zerodayinitiative.com/advisories/ZDI-25-1003/</link>
      <description><![CDATA[This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the USD library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-43383.]]></description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 -0600</pubDate>
    </item>
    
  </channel>
</rss>
