VERISIGN IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

VERISIGN IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The Verisign iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.

E-mail an Expert

Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2013  2012  2011  2010  2009  2008 
VULNERABILITY REPORTS
14.12.10 Microsoft Internet Explorer CSS Style Table Layout Uninitialized Memory Vulnerability
14.12.10 Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability
10.12.10 RealNetworks RealPlayer Memory Corruption Vulnerability
10.12.10 RealNetworks RealPlayer RealAudio Codec Memory Corruption Vulnerability
07.12.10 Apple QuickTime PICT Memory Corruption Vulnerability
11.11.10 Apple Mobile OfficeImport Framework Excel Parsing Memory Corruption Vulnerability
09.11.10 Microsoft Word RTF File Parsing Stack Buffer Overflow Vulnerability
14.09.10 Microsoft WordPad Word97 Converter Memory Corruption Vulnerability
24.08.10 Adobe Shockwave Player Memory Corruption Vulnerability
10.08.10 Microsoft Office RTF Parsing Engine Memory Corruption Vulnerability
10.08.10 Microsoft Word RTF File Parsing Heap Buffer Overflow Vulnerability
03.08.10 Citrix ICA Client ActiveX Memory Corruption Vulnerabillity
21.06.10 Apache ActiveMQ Directory Traversal Vulnerability
21.06.10 Multiple Vendor LibTIFF 3.9.2 Stack Buffer Overflow Vulnerability
16.06.10 Samba 3.3.12 Memory Corruption Vulnerability
10.06.10 Adobe Flash Player Out of Bounds Memory Indexing Vulnerability
10.06.10 Adobe Flash Player Use-After-Free Vulnerability
07.06.10 Multiple Vendor WebKit HTML Caption Use After Free Vulnerability
11.05.10 Abobe Shockwave Player Heap Memory Indexing Vulnerability
15.04.10 Multiple Vendor AgentX++ Integer Overflow Vulnerability
15.04.10 Multiple Vendor AgentX++ Stack Buffer Overflow Vulnerability
09.04.10 VMware VMnc Codec Heap Overflow Vulnerability
30.03.10 Microsoft Internet Explorer 'onreadystatechange' Use After Free Vulnerability
30.03.10 Oracle Java Runtime Environment Image FIle Buffer Overflow Vulnerability
11.03.10 Multiple Vendor WebKit HTML Element Use After Free Vulnerability
09.03.10 Microsoft Excel FNGROUPNAME Record Uninitialized Memory Vulnerability
09.03.10 Microsoft Excel MDXSET Record Heap Overflow Vulnerability
09.03.10 Microsoft Excel MDXTUPLE Record Heap Overflow Vulnerability
09.03.10 Microsoft Excel Sheet Object Type Confusion Vulnerability
04.03.10 Autonomy KeyView OLE Document Integer Overflow Vulnerability
01.03.10 IBM Lotus Domino Web Access ActiveX Stack Buffer Overflow Vulnerability
23.02.10 Multiple Vendor NOS Microsystems getPlus Downloader Input Validation Vulnerability
09.02.10 Microsoft PowerPoint LinkedSlideAtom Heap Overflow Vulnerability
09.02.10 Microsoft PowerPoint OEPlaceholderAtom Invalid Array Indexing Vulnerability
09.02.10 Microsoft PowerPoint OEPlaceholderAtom Use-After-Free Vulnerability
01.02.10 Real Networks RealPlayer Compressed GIF Handling Integer Overflow
01.02.10 RealNetworks RealPlayer 11 HTTP Chunked Encoding Integer Overflow Vulnerability
01.02.10 RealNetworks RealPlayer CMediumBlockAllocator Integer Overflow Vulnerability
13.01.10 Adobe Reader and Acrobat JpxDecode Memory Corruption Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

Verisign iDefense Awarded Frost &amp; Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert