VERISIGN IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

VERISIGN IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The Verisign iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.

E-mail an Expert

Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2013  2012  2011  2010  2009  2008 
VULNERABILITY REPORTS
13.12.11 Microsoft Excel LABELSST Record Memory Corruption Vulnerability
13.12.11 Microsoft Internet Explorer Time Element Behavior Use-After-Free Vulnerability
13.12.11 Microsoft OLE CPropertyStorage::ReadMultiple Variant Type Confusion Vulnerability
13.12.11 Microsoft Windows Kernel Invalid Trap-Frame Management Privilege Escalation Vulnerability
13.12.11 Microsoft Windows Media Player DVR-MS Memory Corruption Vulnerability
18.11.11 RealNetworks RealPlayer AAC Codec Memory Corruption Vulnerability
18.11.11 RealNetworks RealPlayer RealVideo Renderer Memory Corruption Vulnerability
18.11.11 RealNetworks RealPlayer RVRENDER Heap Buffer Overflow Vulnerability
16.11.11 Apple Safari font-face Use-After-Free Vulnerability
15.11.11 Multiple Vendor WebKit XML Use-After-Free Vulnerability
11.11.11 HP StorageWorks P4000 Virtual SAN Remote Command Execution Vulnerability
09.11.11 Adobe Shockwave .w32 FLST Heap Buffer Overflow Vulnerability
18.10.11 Novell ZenWorks Handheld Management ReadStatusRecordData Integer Overflow Vulnerability
18.10.11 Novell ZenWorks Handheld Management Unicode String Parsing Integer Overflow Vulnerability
14.10.11 Sybase M-Business Anywhere Insecure Permissions Vulnerability
12.10.11 Apple Mobile OfficeImport Framework Word Document Parsing Memory Corruption Vulnerability
12.10.11 Apple MobileSafari Attachment Viewing Cross Site Scripting Vulnerability
11.10.11 Microsoft Internet Explorer Object Handling Memory Corruption Vulnerability
26.09.11 Novell GroupWise iCal Date Invalid Array Indexing Vulnerability
26.09.11 Novell GroupWise iCal RRULE ByWeekNo Memory Corruption Vulnerability
26.09.11 Novell GroupWise iCal RRULE Time Conversion Invalid Array Indexing Vulnerability
26.09.11 Novell GroupWise iCal RRULE Weekday Recurrence Heap Overflow Vulnerability
26.09.11 Novell GroupWise iCal TZNAME Heap Overflow Vulnerability
13.09.11 Adobe Reader and Acrobat JPEG Processing Use After Free Vulnerability
13.09.11 Microsoft Excel Record Integer Signedness Vulnerability
13.09.11 Microsoft Excel Record Memory Corruption Vulnerability
13.09.11 Microsoft Excel Record Memory Corruption Vulnerability
16.08.11 RealNetworks RealPlayer Command Execution Vulnerability
16.08.11 RealNetworks RealPlayer SIPR Heap Buffer Overflow Vulnerability
09.08.11 Adobe Flash Player ActionScript Display Memory Corruption Vulnerability
09.08.11 Adobe Flash Player ActionScript Integer Overflow Vulnerability
09.08.11 Adobe Flash Player Integer Overflow
20.07.11 Apple Safari innerText Use-After-Free Vulnerability
20.07.11 Apple Safari RenderBox Memory Corruption Vulnerability
20.07.11 Multiple Vendor WebKit frameset style Heap Corruption Vulnerability
20.07.11 Multiple Vendor WebKit MathML Use-After-Free Vulnerability
20.07.11 Multiple Vendor WebKit SVG animVal Memory Corruption Vulnerability
20.07.11 Safari WebKit TIFF Use-After-Free Vulnerability
14.07.11 Citrix Access Gateway ActiveX Arbitrary Libary Loading Vulnerability
14.07.11 Citrix Access Gateway ActiveX Stack Buffer Overflow Vulnerability
23.06.11 Apple iOS OfficeImport Word Unitialized Memory Vulnerability
23.06.11 Apple QuickTime Memory Corruption Vulnerability
14.06.11 Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability
14.06.11 Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability
14.06.11 Adobe Shockwave Font Asset Heap Overflow Vulnerability
14.06.11 Adobe Shockwave Lingo Script Opcodes Integer Signedness Vulnerability
14.06.11 Microsoft Excel Memory Corruption Vulnerability
14.06.11 Microsoft Excel SCENARIO Record Memory Corruption Vulnerability
14.06.11 Microsoft Excel SerAuxTrend Record Stack Buffer Overflow Vulnerability
14.06.11 Microsoft Excel SLK File Font Parsing Stack Buffer Overflow Vulnerability
14.06.11 Microsoft Internet Explorer Time2 Element Behavior Use-After-Free Vulnerability
08.06.11 Oracle Java Runtime Environment FileDialog.show() Heap Buffer Oveflow Vulnerability
08.06.11 Oracle Java Soundbank Heap Buffer Overflow Vulnerability
08.06.11 Oracle Java Soundbank Stack Buffer Overflow
03.06.11 Tom Sawyer GET Extension Factory COM Object Instantiation Memory Corruption Vulnerability
01.06.11 Cisco AnyConnect VPN Client Arbitrary Program Execution Vulnerability
01.06.11 Cisco AnyConnect VPN Client Arbitrary Program Execution Vulnerability
25.05.11 Sybase EAServer Remote Directory Traversal Vulnerability
24.05.11 Adobe Flash Player ActionScript Integer Overflow Vulnerability
24.05.11 Autonomy Keyview PRZ File Parsing Stack Buffer Overflow Vulnerability
24.05.11 IBM Lotus Notes Applix Attachment Viewer Stack Buffer Overflow
24.05.11 IBM Lotus Notes LZH Attachment Viewer Stack Buffer Overflow
24.05.11 IBM Lotus Notes Office Document Attachment Viewer Stack Buffer Overflow
24.05.11 IBM Lotus Notes RTF Attachment Viewer Stack Buffer Overflow
12.05.11 Adobe Flash Player AVM Verifier Integer Overflow
12.05.11 Adobe Flash Player Heap Buffer Overflow
12.04.11 Microsoft Excel Memory Corruption Vulnerability
12.04.11 Microsoft Internet Explorer Use-After-Free Memory Corruption Vulnerability
31.03.11 RealNetworks Helix DNA Server RTSP Stack Buffer Overflow
21.03.11 Apple OfficeImport Framework Excel Memory Corruption Vulnerability
02.03.11 Apple CoreGraphics Library Heap Memory Corruption Vulnerability
01.03.11 Alcatel-Lucent OmniPCX Enterprise CS CGI Cookie Buffer Overflow Vulnerability
08.02.11 Adobe Flash Player ActionScript Integer Overflow Vulnerability
08.02.11 Adobe Flash Player ActionScript Memory Corruption Vulnerability
08.02.11 Adobe Reader and Acrobat JP2K Invalid Indexing Vulnerability
08.02.11 Adobe Shockwave Player Memory Corruption Vulnerability
08.02.11 Microsoft Windows Picture and Fax Viewer Library
10.01.11 HP Network Node Manager Command Injection Vulnerability
10.01.11 Sybase EAServer Remote Directory Traversal Vulnerability
10.01.11 Sybase EAServer Web Service Remote Installation Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

Verisign iDefense Awarded Frost &amp; Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert