<![CDATA[ZDI: Published Advisories]]> http://www.zerodayinitiative.com/advisories/published/ Sun Aug 28 13:56:51 2016 +0000 zdi@hp.com (Author) Tippingpoint, all rights reserved ZDI Bird Feeder en http://blogs.law.harvard.edu/tech/rss <![CDATA[ZDI-16-493: Adobe Reader DC Font stream Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/zqnMqxvZZYk/ This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/zqnMqxvZZYk" height="1" width="1" alt=""/> Wed, 24 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-493/ <![CDATA[ZDI-16-492: Adobe Reader DC Font stream Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/iK7psFjXXR0/ This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/iK7psFjXXR0" height="1" width="1" alt=""/> Wed, 24 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-492/ <![CDATA[ZDI-16-491: Adobe Reader DC FlateDecode Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/eyP8zN4FvKM/ This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/eyP8zN4FvKM" height="1" width="1" alt=""/> Wed, 24 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-491/ <![CDATA[ZDI-16-490: Adobe Reader DC FlateDecode Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/5Nw1g0BBLFA/ This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/5Nw1g0BBLFA" height="1" width="1" alt=""/> Wed, 24 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-490/ <![CDATA[ZDI-16-489: Adobe Reader DC FlateDecode Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/kvQweWCqAzo/ This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/kvQweWCqAzo" height="1" width="1" alt=""/> Wed, 24 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-489/ <![CDATA[ZDI-16-488: Adobe Reader DC FlateDecode Parsing Out-Of-Bounds Read Information Disclosure Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/E3aSXofSRJQ/ This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/E3aSXofSRJQ" height="1" width="1" alt=""/> Wed, 24 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-488/ <![CDATA[ZDI-16-487: AVG Internet Security avgtdix.sys Kernel Driver Untrusted Pointer Dereference Privilege Escalation Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/5kFje6zWM1I/ This vulnerability allows local attackers to escalate privileges on vulnerable installations of AVG Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/5kFje6zWM1I" height="1" width="1" alt=""/> Fri, 19 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-487/ <![CDATA[ZDI-16-486: Apple Safari Array.splice Out-Of-Bounds Access Remote Code Execuction Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/pyzUr4Ass3M/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/pyzUr4Ass3M" height="1" width="1" alt=""/> Thu, 18 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-486/ <![CDATA[ZDI-16-485: Apple Safari Array.slice Out-Of-Bounds Access Remote Code Execuction Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/-lsjDlYKuOU/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/-lsjDlYKuOU" height="1" width="1" alt=""/> Thu, 18 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-485/ <![CDATA[ZDI-16-484: AVG Internet Security avgtdix.sys Kernel Memory Corruption Privilege Escalation Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/FQZ3Fh4ccmk/ This vulnerability allows local attackers to escalate privileges on vulnerable installations of AVG Internet Security. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/FQZ3Fh4ccmk" height="1" width="1" alt=""/> Thu, 18 Aug 2016 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-16-484/