FreeYourID IDEFENSE® VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

FreeYourID IDEFENSE<sup>&reg;</sup> VENDOR-COORDINATED PUBLIC VULNERABILITY REPORTS

The FreeYourID iDefense Vulnerability Team conducts around-the-clock research and notification of vulnerabilities and exploits that target any of the more than 20,000 closely monitored applications, hardware and operating systems.


Explore our list of vendor-coordinated publicly disclosed vulnerabilities:

2012  2011  2010  2009  2008  2007  2006  2005  2004  2003  2002 
VULNERABILITY REPORTS
07.25.12 Apple Safari RenderBox inlineBox Type Confusion Vulnerability
07.25.12 Multiple Vendor WebKit "m_shadowRoot" Use-after-Free Vulnerability
07.25.12 Multiple Vendor WebKit column-span RenderButton.m_inner Use-after-Free Vulnerability
07.10.12 Microsoft Internet Explorer 9 Container Cache Uninitialized Memory Vulnerability
07.10.12 Microsoft Internet Explorer CAttrArray Invalid Indexing Vulnerability
06.27.12 Cisco WebEx Player WRF File Audio Size Heap Overflow Vulnerability
06.27.12 Cisco WebEx Player WRF File Heap Overflow Vulnerability
06.27.12 Cisco WebEx Player WRF File Memory Corruption Vulnerability
06.27.12 Cisco WebEx Player WRF JPEG DHT Chunk Stack Buffer Overflow Vulnerability
06.12.12 Microsoft Internet Explorer Use-after-Free Vulnerability
06.08.12 Adobe Flash Player ActionScript DisplayObject Layout Memory Corruption Vulnerability
05.08.12 Microsoft Excel MergeCells Record Heap Overflow Vulnerability
05.08.12 Microsoft Excel SERIES Heap Overflow Vulnerability
05.08.12 Microsoft Excel SXLI Record Memory Corruption Vulnerability
05.08.12 Microsoft Office GDI+ Heap Overflow Vulnerability
05.08.12 Microsoft Office Visio Viewer ActiveX Memory Corruption Vulnerability
05.08.12 Microsoft Office Visio Viewer ActiveX Use After Free Vulnerability
05.08.12 Microsoft Windows And Office GDI+ Memory Corruption Vulnerability
05.01.12 Citrix Provisioning Services SoapServer Heap Buffer Overflow
04.30.12 Multiple Vendor WebKit Use After Free Vulnerability
04.10.12 Microsoft .NET Framework GraphicsPathIterator Memory Corruption Vulnerability
04.10.12 Microsoft Internet Explorer Use After Free Vulnerability
04.04.12 Cisco WebEx Player WRF File Integer Overflow Vulnerability
03.14.12 Novell ZENworks Configuration Management PreBoot Service Opcode 0x21 Arbitrary File Download Vulnerability
03.14.12 Novell ZENworks Configuration Management PreBoot Service Opcode 0x4c Stack Buffer Overflow Vulnerability
03.14.12 Novell ZENworks Configuration Management PreBoot Service Opcode 0x6c Stack Buffer Overflow Vulnerability
03.07.12 Multiple Vendor WebKit SVG Element Use After Free Vulnerability
03.06.12 IBM DB2 UidKey::getHashCode Integer Signedness Vulnerability
02.14.12 Oracle Java Runtime Environment Memory Corruption Vulnerability
01.18.12 Adobe Reader and Acrobat ICC Processing Integer Overflow Vulnerability

Defense Vulnerability Contributor Program
The iDefense Vulnerability Contributor Program (VCP) compensates individuals who provide iDefense with advance notification of unpublished vulnerabilities and exploit code. The VCP focuses on vulnerability research submissions, presented to iDefense by the general public, defining new vulnerabilities and exploits uncovered in prominent enterprise-level software and infrastructure components.

FreeYourID iDefense Awarded Frost & Sullivan 2012 Vulnerability Research Product Differentiation Excellence

Contact Us

Learn more about FreeYourID’s iDefense Security Intelligence Services and how to improve your security strategy.