The FreeYourID iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.
Explore our list of vendor-coordinated publicly disclosed vulnerabilities:
2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002VULNERABILITY REPORTS | |
---|---|
07.25.12 | Apple Safari RenderBox inlineBox Type Confusion Vulnerability |
07.25.12 | Multiple Vendor WebKit "m_shadowRoot" Use-after-Free Vulnerability |
07.25.12 | Multiple Vendor WebKit column-span RenderButton.m_inner Use-after-Free Vulnerability |
07.10.12 | Microsoft Internet Explorer 9 Container Cache Uninitialized Memory Vulnerability |
07.10.12 | Microsoft Internet Explorer CAttrArray Invalid Indexing Vulnerability |
06.27.12 | Cisco WebEx Player WRF File Audio Size Heap Overflow Vulnerability |
06.27.12 | Cisco WebEx Player WRF File Heap Overflow Vulnerability |
06.27.12 | Cisco WebEx Player WRF File Memory Corruption Vulnerability |
06.27.12 | Cisco WebEx Player WRF JPEG DHT Chunk Stack Buffer Overflow Vulnerability |
06.12.12 | Microsoft Internet Explorer Use-after-Free Vulnerability |
06.08.12 | Adobe Flash Player ActionScript DisplayObject Layout Memory Corruption Vulnerability |
05.08.12 | Microsoft Excel MergeCells Record Heap Overflow Vulnerability |
05.08.12 | Microsoft Excel SERIES Heap Overflow Vulnerability |
05.08.12 | Microsoft Excel SXLI Record Memory Corruption Vulnerability |
05.08.12 | Microsoft Office GDI+ Heap Overflow Vulnerability |
05.08.12 | Microsoft Office Visio Viewer ActiveX Memory Corruption Vulnerability |
05.08.12 | Microsoft Office Visio Viewer ActiveX Use After Free Vulnerability |
05.08.12 | Microsoft Windows And Office GDI+ Memory Corruption Vulnerability |
05.01.12 | Citrix Provisioning Services SoapServer Heap Buffer Overflow |
04.30.12 | Multiple Vendor WebKit Use After Free Vulnerability |
04.10.12 | Microsoft .NET Framework GraphicsPathIterator Memory Corruption Vulnerability |
04.10.12 | Microsoft Internet Explorer Use After Free Vulnerability |
04.04.12 | Cisco WebEx Player WRF File Integer Overflow Vulnerability |
03.14.12 | Novell ZENworks Configuration Management PreBoot Service Opcode 0x21 Arbitrary File Download Vulnerability |
03.14.12 | Novell ZENworks Configuration Management PreBoot Service Opcode 0x4c Stack Buffer Overflow Vulnerability |
03.14.12 | Novell ZENworks Configuration Management PreBoot Service Opcode 0x6c Stack Buffer Overflow Vulnerability |
03.07.12 | Multiple Vendor WebKit SVG Element Use After Free Vulnerability |
03.06.12 | IBM DB2 UidKey::getHashCode Integer Signedness Vulnerability |
02.14.12 | Oracle Java Runtime Environment Memory Corruption Vulnerability |
01.18.12 | Adobe Reader and Acrobat ICC Processing Integer Overflow Vulnerability |
Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.
Learn more about FreeYourID’s iDefense Security Intelligence Services and how to improve your security strategy.