VERISIGN IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

VERISIGN IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The Verisign iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.

E-mail an Expert

Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2013  2012  2011  2010  2009  2008  2007  2006  2005  2004  2003  2002 
VULNERABILITY REPORTS
12.11.12 Microsoft Windows DirectPlay Invalid Free Memory Corruption Vulnerability
11.13.12 Microsoft Excel SerAuxErrBar Record Heap Overflow Vulnerability
11.13.12 Microsoft Internet Explorer 9 CFormElement Use-after-Free Vulnerability
11.13.12 Microsoft Internet Explorer 9 CTreePos Use-after-Free Vulnerability
11.13.12 Microsoft Office Excel SST Invalid Length Use-after-Free Vulnerability
11.13.12 Microsoft Office MsoPvAllocCore DoS Vulnerability
11.13.12 Microsoft Windows Briefcase Folder Integer Overflow Vulnerability
11.13.12 Microsoft Windows Briefcase Folder Integer Underflow Vulnerability
11.08.12 Apple QuickTime '_qtactivex_' Use-after-Free Vulnerability
11.08.12 Apple QuickTime ActiveX Control Use-after-Free Vulnerability
10.16.12 Oracle Java Runtime Environment t2k.dll TrueType Font Parsing Memory Corruption Vulnerability
10.16.12 Oracle Java Web Start 'javaw.exe' JNLP Quote Escaping Command Injection Vulnerability
10.16.12 Oracle Java Web Start 'javaws.exe' JNLP Quoting Command Injection Vulnerability
10.09.12 Microsoft Windows x64 NtQueryValueKey Information Disclosure Vulnerability
09.21.12 Microsoft Internet Explorer onmove Use-after-Free Vulnerability
08.21.12 Adobe Flash Player Flash Video File Parsing Integer Overflow Vulnerability
08.14.12 Adobe Flash Player TrueType Font Parsing Integer Overflow Vulnerability
08.14.12 Adobe Reader and Acrobat XSLT utf8ToUtf16() Heap Overflow Vulnerability
07.25.12 Apple Safari RenderBox inlineBox Type Confusion Vulnerability
07.25.12 Multiple Vendor WebKit "m_shadowRoot" Use-after-Free Vulnerability
07.25.12 Multiple Vendor WebKit column-span RenderButton.m_inner Use-after-Free Vulnerability
07.10.12 Microsoft Internet Explorer 9 Container Cache Uninitialized Memory Vulnerability
07.10.12 Microsoft Internet Explorer CAttrArray Invalid Indexing Vulnerability
06.27.12 Cisco WebEx Player WRF File Audio Size Heap Overflow Vulnerability
06.27.12 Cisco WebEx Player WRF File Heap Overflow Vulnerability
06.27.12 Cisco WebEx Player WRF File Memory Corruption Vulnerability
06.27.12 Cisco WebEx Player WRF JPEG DHT Chunk Stack Buffer Overflow Vulnerability
06.12.12 Microsoft Internet Explorer Use-after-Free Vulnerability
06.08.12 Adobe Flash Player ActionScript DisplayObject Layout Memory Corruption Vulnerability
05.08.12 Microsoft Excel MergeCells Record Heap Overflow Vulnerability
05.08.12 Microsoft Excel SERIES Heap Overflow Vulnerability
05.08.12 Microsoft Excel SXLI Record Memory Corruption Vulnerability
05.08.12 Microsoft Office GDI+ Heap Overflow Vulnerability
05.08.12 Microsoft Office Visio Viewer ActiveX Memory Corruption Vulnerability
05.08.12 Microsoft Office Visio Viewer ActiveX Use After Free Vulnerability
05.08.12 Microsoft Windows And Office GDI+ Memory Corruption Vulnerability
05.01.12 Citrix Provisioning Services SoapServer Heap Buffer Overflow
04.30.12 Multiple Vendor WebKit Use After Free Vulnerability
04.24.12 Mozilla Firefox cairo_dwrite_font_face Memory Corruption Vulnerability
04.10.12 Microsoft .NET Framework GraphicsPathIterator Memory Corruption Vulnerability
04.10.12 Microsoft Internet Explorer Use After Free Vulnerability
04.04.12 Cisco WebEx Player WRF File Integer Overflow Vulnerability
03.14.12 Novell ZENworks Configuration Management PreBoot Service Opcode 0x21 Arbitrary File Download Vulnerability
03.14.12 Novell ZENworks Configuration Management PreBoot Service Opcode 0x4c Stack Buffer Overflow Vulnerability
03.14.12 Novell ZENworks Configuration Management PreBoot Service Opcode 0x6c Stack Buffer Overflow Vulnerability
03.07.12 Multiple Vendor WebKit SVG Element Use After Free Vulnerability
03.06.12 IBM DB2 UidKey::getHashCode Integer Signedness Vulnerability
02.14.12 Oracle Java Runtime Environment Memory Corruption Vulnerability
01.18.12 Adobe Reader and Acrobat ICC Processing Integer Overflow Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

Verisign iDefense Awarded Frost &amp; Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert