<![CDATA[ZDI: Published Advisories]]> http://www.zerodayinitiative.com/advisories/published/ Sat Jun 24 02:33:07 2017 +0000 zdi@hp.com (Author) Tippingpoint, all rights reserved ZDI Bird Feeder en http://blogs.law.harvard.edu/tech/rss <![CDATA[ZDI-17-444: Cisco WebEx Network Recording Player ARF File Memory Corruption Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/513ncEmKmBA/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/513ncEmKmBA" height="1" width="1" alt=""/> Fri, 23 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-444/ <![CDATA[ZDI-17-443: Cisco WebEx Network Recording Player ARF File Memory Corruption Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/vg8Gz9pjchg/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/vg8Gz9pjchg" height="1" width="1" alt=""/> Fri, 23 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-443/ <![CDATA[ZDI-17-442: Cisco WebEx Network Recording Player ARF File CImageList Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/cQrfmkFscnI/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco WebEx Network Recording Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/cQrfmkFscnI" height="1" width="1" alt=""/> Fri, 23 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-442/ <![CDATA[ZDI-17-441: Apple Safari Node Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/gFEzqIqfmik/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/gFEzqIqfmik" height="1" width="1" alt=""/> Thu, 22 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-441/ <![CDATA[ZDI-17-440: (0Day) Lepide LepideAuditor Suite Malicious Server Command Injection Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/hFL7no-Jv1E/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Lepide LepideAuditor Suite. Authentication is not required to exploit this vulnerability.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/hFL7no-Jv1E" height="1" width="1" alt=""/> Wed, 21 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-440/ <![CDATA[ZDI-17-439: (0Day) UCanCode E-XD++ Visualization Enterprise Suite UCCDRAW AddTabShapeEmptyPage Untrusted Pointer Dereference Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/3j_DPzswPeo/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of UCanCode E-XD++ Visualization Enterprise Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/3j_DPzswPeo" height="1" width="1" alt=""/> Wed, 21 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-439/ <![CDATA[ZDI-17-438: (0Day) UCanCode E-XD++ Visualization Enterprise Suite UCCDRAW AddStringUserProperty Untrusted Pointer Dereference Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/53yk9bX_W6c/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of UCanCode E-XD++ Visualization Enterprise Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/53yk9bX_W6c" height="1" width="1" alt=""/> Wed, 21 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-438/ <![CDATA[ZDI-17-437: (0Day) UCanCode E-XD++ Visualization Enterprise Suite UCCDRAW AddIntUserProperty Untrusted Pointer Dereference Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/owQhebXZuPM/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of UCanCode E-XD++ Visualization Enterprise Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/owQhebXZuPM" height="1" width="1" alt=""/> Wed, 21 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-437/ <![CDATA[ZDI-17-436: (0Day) UCanCode E-XD++ Visualization Enterprise Suite UCCDRAW AddFloatUserProperty Untrusted Pointer Dereference Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/AB7RfgXxkMg/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of UCanCode E-XD++ Visualization Enterprise Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/AB7RfgXxkMg" height="1" width="1" alt=""/> Wed, 21 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-436/ <![CDATA[ZDI-17-435: (0Day) UCanCode E-XD++ Visualization Enterprise Suite TKGIS RemoveShape Untrusted Pointer Dereference Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/1dXXT63QidY/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of UCanCode E-XD++ Visualization Enterprise Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/1dXXT63QidY" height="1" width="1" alt=""/> Wed, 21 Jun 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-435/