VERISIGN IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

VERISIGN IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The Verisign iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.

E-mail an Expert

Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2013  2012  2011  2010  2009  2008  2007  2006  2005  2004  2003  2002 
VULNERABILITY REPORTS
12.14.10 Microsoft Internet Explorer CSS Style Table Layout Uninitialized Memory Vulnerability
12.14.10 Microsoft Internet Explorer HTML Object Memory Corruption Vulnerability
12.10.10 RealNetworks RealPlayer Memory Corruption Vulnerability
12.10.10 RealNetworks RealPlayer RealAudio Codec Memory Corruption Vulnerability
12.07.10 Apple QuickTime PICT Memory Corruption Vulnerability
11.11.10 Apple Mobile OfficeImport Framework Excel Parsing Memory Corruption Vulnerability
11.09.10 Microsoft Word RTF File Parsing Stack Buffer Overflow Vulnerability
09.14.10 Microsoft WordPad Word97 Converter Memory Corruption Vulnerability
08.24.10 Adobe Shockwave Player Memory Corruption Vulnerability
08.10.10 Microsoft Office RTF Parsing Engine Memory Corruption Vulnerability
08.10.10 Microsoft Word RTF File Parsing Heap Buffer Overflow Vulnerability
08.03.10 Citrix ICA Client ActiveX Memory Corruption Vulnerabillity
06.21.10 Apache ActiveMQ Directory Traversal Vulnerability
06.21.10 Multiple Vendor LibTIFF 3.9.2 Stack Buffer Overflow Vulnerability
06.16.10 Samba 3.3.12 Memory Corruption Vulnerability
06.10.10 Adobe Flash Player Out of Bounds Memory Indexing Vulnerability
06.10.10 Adobe Flash Player Use-After-Free Vulnerability
06.07.10 Multiple Vendor WebKit HTML Caption Use After Free Vulnerability
05.11.10 Abobe Shockwave Player Heap Memory Indexing Vulnerability
04.15.10 Multiple Vendor AgentX++ Integer Overflow Vulnerability
04.15.10 Multiple Vendor AgentX++ Stack Buffer Overflow Vulnerability
04.09.10 VMware VMnc Codec Heap Overflow Vulnerability
03.30.10 Microsoft Internet Explorer 'onreadystatechange' Use After Free Vulnerability
03.30.10 Oracle Java Runtime Environment Image FIle Buffer Overflow Vulnerability
03.11.10 Multiple Vendor WebKit HTML Element Use After Free Vulnerability
03.09.10 Microsoft Excel FNGROUPNAME Record Uninitialized Memory Vulnerability
03.09.10 Microsoft Excel MDXSET Record Heap Overflow Vulnerability
03.09.10 Microsoft Excel MDXTUPLE Record Heap Overflow Vulnerability
03.09.10 Microsoft Excel Sheet Object Type Confusion Vulnerability
03.04.10 Autonomy KeyView OLE Document Integer Overflow Vulnerability
03.01.10 IBM Lotus Domino Web Access ActiveX Stack Buffer Overflow Vulnerability
02.23.10 Multiple Vendor NOS Microsystems getPlus Downloader Input Validation Vulnerability
02.09.10 Microsoft PowerPoint LinkedSlideAtom Heap Overflow Vulnerability
02.09.10 Microsoft PowerPoint OEPlaceholderAtom Invalid Array Indexing Vulnerability
02.09.10 Microsoft PowerPoint OEPlaceholderAtom Use-After-Free Vulnerability
02.01.10 Real Networks RealPlayer Compressed GIF Handling Integer Overflow
02.01.10 RealNetworks RealPlayer 11 HTTP Chunked Encoding Integer Overflow Vulnerability
02.01.10 RealNetworks RealPlayer CMediumBlockAllocator Integer Overflow Vulnerability
01.13.10 Adobe Reader and Acrobat JpxDecode Memory Corruption Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

Verisign iDefense Awarded Frost &amp; Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about Verisign’s iDefense Security Intelligence Services and how to improve your security strategy.

E-mail an Expert