VERISIGN IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

VERISIGN IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The Verisign iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.

E-mail an Expert

Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2013  2012  2011  2010  2009  2008  2007  2006  2005  2004  2003  2002 
VULNERABILITY REPORTS
12.08.09 Microsoft Internet Explorer HTML Layout Engine Uninitialized Memory Vulnerability
12.08.09 Microsoft Windows Indeo32 Codec Parsing Heap Corruption Vulnerability
12.08.09 Microsoft WordPad Word97 Converter Integer Overflow Vulnerability
12.03.09 Juniper Installer Service Stack Buffer Overflow Vulnerability
11.10.09 Microsoft Excel FEATHEADER Record Memory Corruption Vulnerability
11.10.09 Microsoft Word FIB Processing Stack Buffer Overflow Vulnerability
11.03.09 Sun Java Runtime Environment AWT ImageRep Heap Buffer Overflow Vulnerability
11.03.09 Sun Java Runtime Environment Color Management Buffer Overflow Vulnerability
11.03.09 Sun Java Runtime Environment Deployment Toolkit Command Execution Vulnerability
10.28.09 Mozilla Firefox GIF Color Map Parsing Buffer Overflow Vulnerability
10.13.09 Adobe Acrobat and Reader Firefox Plugin Use After Free Vulnerability
10.13.09 Adobe Acrobat and Reader U3D File Invalid Array Index Vulnerability
10.13.09 Microsoft Office Drawing Format Shape Properties Memory Corruption Vulnerability
10.13.09 Microsoft Windows GDI+ TIFF File Parsing Buffer Overflow Vulnerability
10.07.09 IBM AIX rpc.cmsd Stack Buffer Overflow Vulnerability
08.25.09 Autonomy KeyView Excel File SST Parsing Integer Overflow Vulnerability
08.11.09 Microsoft Office Web Components 2000 Buffer Overflow Vulnerability
08.11.09 Multiple Vendor Microsoft ATL/MFC ActiveX Type Confusion Vulnerability
08.07.09 Adobe Flash Player Invalid Loader Object Reference Vulnerability
08.06.09 Adobe Flash Player URL Parsing Heap Overflow Vulnerability
08.04.09 IBM AIX libC _LIB_INIT_DBG Arbitrary File Creation Vulnerability
08.04.09 Sun Java Runtime Environment (JRE) Pack200 Decompression Integer Overflow Vulnerability
07.28.09 Microsoft Internet Explorer HTML TIME 'ondatasetcomplete' Use After Free Vulnerability
07.28.09 Multiple Vendor Microsoft ATL/MFC ActiveX Information Disclosure Vulnerability
07.28.09 Multiple Vendor Microsoft ATL/MFC ActiveX Security Bypass Vulnerability
07.22.09 Akamai Download Manager Stack Buffer Overflow Vulnerability
07.14.09 Microsoft Embedded OpenType Font Engine (T2EMBED.DLL) Heap Buffer Overflow Vulnerability
07.14.09 Microsoft Office Publisher 2007 Arbitrary Pointer Dereference Vulnerability
07.07.09 Oracle Secure Backup Administration Server common.php Command Injection Vulnerability
06.26.09 HP Network Node Manager rping Stack Buffer Overflow Vulnerability
06.25.09 Motorola Timbuktu Pro PlughNTCommand Stack Based Buffer Overflow Vulnerability
06.25.09 Unisys Business Information Server Stack Buffer Overflow
06.11.09 Microsoft Active Directory Hexdecimal DN AttributeValue Invalid Free Vulnerability
06.09.09 Adobe Reader and Acrobat FlateDecode Integer Overflow Vulnerability
06.09.09 Microsoft Excel SST Record Integer Overflow Vulnerability
06.09.09 Microsoft Windows 2000 Print Spooler Remote Stack Buffer Overflow Vulnerability
06.08.09 Multiple Vendor WebKit Error Handling Use After Free Vulnerability
05.20.09 IBM AIX libc MALLOCDEBUG File Overwrite Vulnerability
05.15.09 Multiple Vendor Outside In Multiple Integer Overflow Vulnerabilities
05.15.09 Multiple Vendor Outside In Multiple Spreadsheet Buffer Overflow Vulnerabilities
05.15.09 Multiple Vendor Outside In Spreadsheet Buffer Overflow Vulnerability
05.15.09 Multiple Vendor Outside In Spreadsheet Integer Overflow Vulnerability
05.14.09 Apple Mac OS X xnu Kernel workqueue_additem/workqueue_removeitem Index Validation Vulnerability
05.12.09 Microsoft PowerPoint 4.2 Conversion Filter Heap Corruption Vulnerability
05.12.09 Microsoft PowerPoint 4.2 Conversion Filter Stack Buffer Overflow Vulnerability
05.12.09 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow
05.12.09 Microsoft PowerPoint Build List Memory Corruption Vulnerability
05.12.09 Microsoft PowerPoint Integer Overflow Vulnerability
05.12.09 Microsoft PowerPoint Notes Container Heap Corruption Vulnerability
05.12.09 Microsoft PowerPoint PPT 4.0 Importer Multiple Stack Buffer Overflow Vulnerabilities
05.12.09 Microsoft PowerPoint PPT95 Import Multiple Stack Buffer Overflow Vulnerabilities
05.12.09 Microsoft PowerPoint PPT95 Import Multiple Stack Buffer Overflow Vulnerabilities
04.29.09 Symantec System Center Alert Management System Console Arbitrary Program Execution Design Error Vulnerability
04.28.09 TIBCO SmartSockets Stack Buffer Overflow Vulnerability
04.15.09 IBM AIX muxatmd Buffer Overflow Vulnerability
04.14.09 Microsoft Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability
04.14.09 Microsoft WordPad Word97 Converter Stack Buffer Overflow Vulnerability
04.14.09 Oracle Database 11g Object Name SQL Injection Vulnerability
04.14.09 Oracle Database 11g WMSYS.LT.COPYFORUPDATE SQL Injection Vulnerability
04.08.09 Hewlett Packard ProCurve Manager TFTP Directory Traversal Vulnerability
03.26.09 Sun Java Runtime Environment (JRE) Pack200 Decompression Integer Overflow Vulnerability
03.26.09 Sun Java Runtine Environment (JRE) GIF Decoding Heap Corruption Vulnerability
03.26.09 Sun Java Runtine Environment (JRE) Type1 Font Parsing Integer Signedness Vulnerability
03.26.09 Sun Java Web Start (JWS ) PNG Decoding Integer Overflow Vulnerability
03.26.09 Sun Java Web Start (JWS) GIF Decoding Heap Corruption Vulnerability
03.24.09 Adobe Reader and Acrobat JBIG2 Encoded Stream Heap Overflow Vulnerability
03.17.09 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability
03.10.09 IBM Tivoli Storage Manager Express Heap Buffer Overflow Vulnerability
02.24.09 Adobe Flash Player Invalid Object Reference Vulnerability
02.10.09 IBM AIX at Information Disclosure Vulnerability
02.06.09 HP Network Node Manager Multiple Command Injection Vulnerabilities
02.06.09 HP Network Node Manager Multiple Information Disclosure Vulnerabilities
02.06.09 HP Network Node Manager ovlaunch CGI BSS Overflow Vulnerability
01.13.09 Oracle Database 10g R2 Summary Advisor Arbitrary File Rewrite Vulnerability
01.13.09 Oracle Secure Backup Administration Server login.php Command Injection Vulnerability
01.13.09 Oracle Secure Backup Administration Server login.php Command Injection Vulnerability
01.13.09 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'bitmaps' Heap Overflow Vulnerability
01.13.09 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'symWidths' Heap Overflow Vulnerability
01.13.09 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

Verisign iDefense Awarded Frost &amp; Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert