VERISIGN IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

VERISIGN IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The Verisign iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.

E-mail an Expert

Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2013  2012  2011  2010  2009  2008 
VULNERABILITY REPORTS
08.12.09 Microsoft Internet Explorer HTML Layout Engine Uninitialized Memory Vulnerability
08.12.09 Microsoft Windows Indeo32 Codec Parsing Heap Corruption Vulnerability
08.12.09 Microsoft WordPad Word97 Converter Integer Overflow Vulnerability
03.12.09 Juniper Installer Service Stack Buffer Overflow Vulnerability
10.11.09 Microsoft Excel FEATHEADER Record Memory Corruption Vulnerability
10.11.09 Microsoft Word FIB Processing Stack Buffer Overflow Vulnerability
03.11.09 Sun Java Runtime Environment AWT ImageRep Heap Buffer Overflow Vulnerability
03.11.09 Sun Java Runtime Environment Color Management Buffer Overflow Vulnerability
03.11.09 Sun Java Runtime Environment Deployment Toolkit Command Execution Vulnerability
28.10.09 Mozilla Firefox GIF Color Map Parsing Buffer Overflow Vulnerability
13.10.09 Adobe Acrobat and Reader Firefox Plugin Use After Free Vulnerability
13.10.09 Adobe Acrobat and Reader U3D File Invalid Array Index Vulnerability
13.10.09 Microsoft Office Drawing Format Shape Properties Memory Corruption Vulnerability
13.10.09 Microsoft Windows GDI+ TIFF File Parsing Buffer Overflow Vulnerability
07.10.09 IBM AIX rpc.cmsd Stack Buffer Overflow Vulnerability
25.08.09 Autonomy KeyView Excel File SST Parsing Integer Overflow Vulnerability
11.08.09 Microsoft Office Web Components 2000 Buffer Overflow Vulnerability
11.08.09 Multiple Vendor Microsoft ATL/MFC ActiveX Type Confusion Vulnerability
07.08.09 Adobe Flash Player Invalid Loader Object Reference Vulnerability
06.08.09 Adobe Flash Player URL Parsing Heap Overflow Vulnerability
04.08.09 IBM AIX libC _LIB_INIT_DBG Arbitrary File Creation Vulnerability
04.08.09 Sun Java Runtime Environment (JRE) Pack200 Decompression Integer Overflow Vulnerability
28.07.09 Microsoft Internet Explorer HTML TIME 'ondatasetcomplete' Use After Free Vulnerability
28.07.09 Multiple Vendor Microsoft ATL/MFC ActiveX Information Disclosure Vulnerability
28.07.09 Multiple Vendor Microsoft ATL/MFC ActiveX Security Bypass Vulnerability
22.07.09 Akamai Download Manager Stack Buffer Overflow Vulnerability
14.07.09 Microsoft Embedded OpenType Font Engine (T2EMBED.DLL) Heap Buffer Overflow Vulnerability
14.07.09 Microsoft Office Publisher 2007 Arbitrary Pointer Dereference Vulnerability
07.07.09 Oracle Secure Backup Administration Server common.php Command Injection Vulnerability
26.06.09 HP Network Node Manager rping Stack Buffer Overflow Vulnerability
25.06.09 Motorola Timbuktu Pro PlughNTCommand Stack Based Buffer Overflow Vulnerability
25.06.09 Unisys Business Information Server Stack Buffer Overflow
11.06.09 Microsoft Active Directory Hexdecimal DN AttributeValue Invalid Free Vulnerability
09.06.09 Adobe Reader and Acrobat FlateDecode Integer Overflow Vulnerability
09.06.09 Microsoft Excel SST Record Integer Overflow Vulnerability
09.06.09 Microsoft Windows 2000 Print Spooler Remote Stack Buffer Overflow Vulnerability
08.06.09 Multiple Vendor WebKit Error Handling Use After Free Vulnerability
20.05.09 IBM AIX libc MALLOCDEBUG File Overwrite Vulnerability
15.05.09 Multiple Vendor Outside In Multiple Integer Overflow Vulnerabilities
15.05.09 Multiple Vendor Outside In Multiple Spreadsheet Buffer Overflow Vulnerabilities
15.05.09 Multiple Vendor Outside In Spreadsheet Buffer Overflow Vulnerability
15.05.09 Multiple Vendor Outside In Spreadsheet Integer Overflow Vulnerability
14.05.09 Apple Mac OS X xnu Kernel workqueue_additem/workqueue_removeitem Index Validation Vulnerability
12.05.09 Microsoft PowerPoint 4.2 Conversion Filter Heap Corruption Vulnerability
12.05.09 Microsoft PowerPoint 4.2 Conversion Filter Stack Buffer Overflow Vulnerability
12.05.09 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow
12.05.09 Microsoft PowerPoint Build List Memory Corruption Vulnerability
12.05.09 Microsoft PowerPoint Integer Overflow Vulnerability
12.05.09 Microsoft PowerPoint Notes Container Heap Corruption Vulnerability
12.05.09 Microsoft PowerPoint PPT 4.0 Importer Multiple Stack Buffer Overflow Vulnerabilities
12.05.09 Microsoft PowerPoint PPT95 Import Multiple Stack Buffer Overflow Vulnerabilities
12.05.09 Microsoft PowerPoint PPT95 Import Multiple Stack Buffer Overflow Vulnerabilities
29.04.09 Symantec System Center Alert Management System Console Arbitrary Program Execution Design Error Vulnerability
28.04.09 TIBCO SmartSockets Stack Buffer Overflow Vulnerability
15.04.09 IBM AIX muxatmd Buffer Overflow Vulnerability
14.04.09 Microsoft Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability
14.04.09 Microsoft WordPad Word97 Converter Stack Buffer Overflow Vulnerability
14.04.09 Oracle Database 11g Object Name SQL Injection Vulnerability
14.04.09 Oracle Database 11g WMSYS.LT.COPYFORUPDATE SQL Injection Vulnerability
08.04.09 Hewlett Packard ProCurve Manager TFTP Directory Traversal Vulnerability
26.03.09 Sun Java Runtime Environment (JRE) Pack200 Decompression Integer Overflow Vulnerability
26.03.09 Sun Java Runtine Environment (JRE) GIF Decoding Heap Corruption Vulnerability
26.03.09 Sun Java Runtine Environment (JRE) Type1 Font Parsing Integer Signedness Vulnerability
26.03.09 Sun Java Web Start (JWS ) PNG Decoding Integer Overflow Vulnerability
26.03.09 Sun Java Web Start (JWS) GIF Decoding Heap Corruption Vulnerability
24.03.09 Adobe Reader and Acrobat JBIG2 Encoded Stream Heap Overflow Vulnerability
17.03.09 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability
10.03.09 IBM Tivoli Storage Manager Express Heap Buffer Overflow Vulnerability
24.02.09 Adobe Flash Player Invalid Object Reference Vulnerability
10.02.09 IBM AIX at Information Disclosure Vulnerability
06.02.09 HP Network Node Manager Multiple Command Injection Vulnerabilities
06.02.09 HP Network Node Manager Multiple Information Disclosure Vulnerabilities
06.02.09 HP Network Node Manager ovlaunch CGI BSS Overflow Vulnerability
13.01.09 Oracle Database 10g R2 Summary Advisor Arbitrary File Rewrite Vulnerability
13.01.09 Oracle Secure Backup Administration Server login.php Command Injection Vulnerability
13.01.09 Oracle Secure Backup Administration Server login.php Command Injection Vulnerability
13.01.09 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'bitmaps' Heap Overflow Vulnerability
13.01.09 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'symWidths' Heap Overflow Vulnerability
13.01.09 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

Verisign iDefense Awarded Frost &amp; Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert