archive-hn.com » HN » G » GOOGLE.HN

Total: 614

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Socios aprobados: Google Maps for Work
    en función de sus necesidades específicas Le interesa ser socio de Google Maps for Work Solicítelo aqui Socio Premium de Google Maps for Work Socio de Google Maps for Work Buscar Maps y Earth Página principal Soluciones Las API de Google Maps Clientes Industrias Socios Recursos Productos relacionados Google Apps for Government Cloud Platform Chrome for Work Hola mundo Productos básicos para empresas Google for Work Otros productos para empresas

    Original URL path: https://www.google.hn/work/mapsearth/partners/ (2016-02-08)
    Open archived version from archive

  • Map Developer & API Resources – Google Maps APIs
    Videos Explorar Google Maps Hola mundo Consejos y sugerencias Blog de Google Maps Videos Audi incorpora innovación con Google Earth MyTaxi usa Google Maps para impulsar su aplicación Uso de Google Earth Pro para analizar datos Innovación geológica con Rockware Conéctese y comparta Síganos en Google Búsquenos en Blogger Búsquenos en YouTube Buscar Maps y Earth Página principal Soluciones Las API de Google Maps Clientes Industrias Socios Recursos Productos relacionados

    Original URL path: https://www.google.hn/work/mapsearth/resources/ (2016-02-08)
    Open archived version from archive

  • Google for Work: Soluciones empresariales para trabajar del modo en el que se vive
    pasó a Google Reproducir el video Pequeñas empresas emergentes grandes cambios Khan Academy utiliza Google Cloud Platform para que su equipo pueda dedicarse a cambiar la educación y no a manejar la infraestructura de TI Khan Academy se pasó a Google Ver el video Lo mejor de Google ahora en el trabajo El trabajo no consiste solamente en calcular ganancias entregar papeles o encontrar el equilibrio entre la oferta y la demanda También se trata de personas que se reúnen para soñar lograr resultados esforzarse y crear Las personas deberían poder conectarse fácilmente para compartir ideas desarrollarlas en conjunto y llevar a cabo el trabajo desde cualquier lugar La tecnología debería facilitar y agilizar el trabajo no complicarlo En lugar de ser un obstáculo debería dar lugar a las ideas y vía libre a la inspiración para que puedan surgir en cualquier momento Cuando usamos herramientas que simplifican la vida damos lo mejor en nuestro trabajo Trabajar es mucho más sencillo con Google Empresas 5 millones Más de cinco millones de empresas se pasaron a Google Chromebook 1 millón En el segundo trimestre de 2014 se vendieron más de un millón de Chromebooks en instituciones educativas Fortune 500 64 El 64 de las empresas que figuran en la lista de Fortune 500 se pasó a Google Ver referencias Referencias El 64 de las empresas que figuran en la lista de Fortune 500 se pasó a Google Fuente Según la clasificación del Informe de Fortune 500 correspondiente a 2013 En el segundo trimestre de 2014 se vendieron más de un millón de dispositivos Chromebook a instituciones educativas Fuente Según la clasificación del Blog oficial de Google for Work Conéctese y comparta Google Enterprise Blog oficial de Google Enterprise Blog oficial de Google Enterprise Buscar Google for Work Página principal Soluciones Clientes

    Original URL path: https://www.google.hn/work/ (2016-02-08)
    Open archived version from archive

  • Cross-Site Scripting – Application Security – Google
    document createElement script s src xss doc appspot com static evil js document body appendChild s Spooky huh In this example an evil JavaScript file was retrieved and embedded via XSS Your server won t always see the XSS payload In the previous two examples user input was sent to the server and the server responded back to the user by displaying a page that included the user input However a stored or reflected XSS vulnerability can also occur without direct involvement of the server if user supplied data is used in an unsafe JavaScript operation That is the XSS can occur entirely in the client side JavaScript and HTML more specifically in the Document Object Model or DOM without data being sent back and forth between the client and the server We call this subclass of bugs DOM based XSS or DOM XSS for short A common cause of DOM XSS bugs is setting the innerHTML value of a DOM element with user supplied data Take a look at the following application It uses a URL fragment to determine which tab to show Demo application 3 URL Click to view application source code The application works as expected when you click on the tabs However it is also possible to open a URL such as https xss doc appspot com demo 3 img src x onerror alert DOM XSS You can copy and paste the above URL into the URL bar in the demo application above and click the Go button You should see a pop up alert The XSS is triggered because the client side script uses part of the window location to set the innerHTML of one of the elements inside the page When you go to the above URL the location hash variable is set to img src x onerror alert DOM XSS If you look at line 33 of the source code for index html you will see that the substring of location hash the string after the character is passed as the argument to the chooseTab function in line 8 chooseTab constructs an img element for embedding an image using the following html img src static demos GEECS name jpg The location hash substring argument is used to set the value of name this results in following img element img src static demos GEECS img src x onerror alert DOM XSS jpg The above is valid HTML however the browser will fail to load the image and will instead execute the onerror code This img element is ultimately added to the document via innerHTML on line 12 Preventing XSS Nothing is foolproof We provide some suggestions on how you can minimize the chance that your website will contain XSS vulnerabilities But keep in mind that both security and technology evolves very rapidly so no guarantees what works today may not fully work tomorrow hackers can be pretty clever What can I do to prevent XSS A common technique for preventing XSS vulnerabilities is escaping The purpose of character and string escaping is to make sure that every part of a string is interpreted as a string primitive not as a control character or code For example lt is the HTML encoding for the character If you include script alert testing script in the HTML of a page the script will execute But if you include lt script gt alert testing lt script gt in the HTML of a page it will print out the text script alert testing script but it will not actually execute the script By escaping the script tags we prevented the script from executing Technically what we did here is encoding not escaping but escaping conveys the basic concept and we ll see later that in the case of JavaScript escaping actually is the correct term The following can help minimize the chances that your website will contain XSS vulnerabilities Using a template system with context aware auto escaping Manually escaping user input if it s not possible to use a template system with context aware auto escaping Understanding common browser behaviors that lead to XSS Learning the best practices for your technology The rest of this section describes these measures in detail Use a template system with context aware auto escaping The simplest and best means to protect your application and your users from XSS bugs is to use a web template system or web application development framework that auto escapes output and is context aware Auto escaping refers to the ability of a template system or web development framework to automatically escape user input in order to prevent any scripts embedded in the input from executing If you wanted to prevent XSS without auto escaping you would have to manually escape input this means writing your own custom code or call an escape function everywhere your application includes user controlled data In most cases manually escaping input is not recommended we ll discuss manual escaping in the next section Context aware refers to the ability to apply different forms of escaping based on the appropriate context Because CSS HTML URLs and JavaScript all use different syntax different forms of escaping are required for each context The following example HTML template uses variables in all of these different contexts body span style color USER COLOR Hello USERNAME view your a href USER ACCOUNT URL Account a span script var id USER ID alert Your user ID is id script body As you can see trying to manually escape input for various contexts can be very difficult You can read more about context aware auto escaping here Go Templates Google Web Toolkit GWT with SafeHtml Closure Templates and CTemplate all provide context aware auto escaping so that variables are correctly escaped for the page context in which they appear If you are using templates to generate HTML within JavaScript a good idea Closure Templates and Angular provide built in escaping capabilities A note on manually escaping input Writing your own

    Original URL path: https://www.google.hn/intl/es-419/about/appsecurity/learning/xss/ (2016-02-08)
    Open archived version from archive

  • Reward Programs – Application Security – Google
    with the the security community Part of this relationship involves providing cash rewards for quality security research that identifies security vulnerabilities in products that we provide or proactive security improvements to select open source products Google currently offers the following

    Original URL path: https://www.google.hn/intl/es-419/about/appsecurity/programs-home/ (2016-02-08)
    Open archived version from archive

  • The "0x0A List" – Application Security – Google
    program back in November 2010 The complete list of all security reporters is available here Congratulations to the current group What factors influence the ranking Volume The more valid bug reports you ve sent in the more points you get Points are deducted for spurious reports Severity For those bugs how severe are they Better bugs earn more points Recency The most recent bug reports receive maximum value Bug reports

    Original URL path: https://www.google.hn/intl/es-419/about/appsecurity/hall-of-fame/ (2016-02-08)
    Open archived version from archive

  • Vulnerabilities – Application Security – Google
    2831 CVE 2011 3233 CVE 2011 3235 CVE 2011 3236 CVE 2011 3237 Memory Corruption Apple advisory Lars Bull Linux 12 14 2013 CVE 2013 6376 Denial of Service Link Ivan Fratric Nginx 11 19 2013 CVE 2013 4547 Security Bypass Product advisory Ivan Fratric Microsoft Internet Explorer 10 8 2013 CVE 2013 3882 Memory Corruption Microsoft bulletin Mateusz Jurczyk Ivan Fratric and Ben Hawkes Microsoft Sharepoint Server and Microsoft Excel 10 8 2013 CVE 2013 3889 Memory Corruption Microsoft bulletin Mateusz Jurczyk Ivan Fratric and Ben Hawkes Microsoft Excel 10 8 2013 CVE 2013 3890 Memory Corruption Microsoft bulletin Mateusz Jurczyk Ivan Fratric and Ben Hawkes Microsoft Word 10 8 2013 CVE 2013 3892 Memory Corruption Microsoft bulletin Felix Gröbert ESET 10 2 2013 ESET Update 8866 Memory Corruption ESET updates Felix Gröbert Apple CoreGraphics 9 12 2013 CVE 2013 1025 Memory Corruption Apple advisory Felix Gröbert Apple ImageIO 9 12 2013 CVE 2013 1026 Memory Corruption Apple advisory Mateusz Jurczyk Ivan Fratric and Ben Hawkes Microsoft SharePoint Server Microsoft Word Microsoft Office Services and Web Apps 9 10 2013 CVE 2013 3847 CVE 2013 3848 CVE 2013 3849 CVE 2013 3857 CVE 2013 3858 Memory Corruption Microsoft bulletin Mateusz Jurczyk Ivan Fratric and Ben Hawkes Microsoft Office 9 10 2013 CVE 2013 3847 CVE 2013 3848 CVE 2013 3849 CVE 2013 3850 CVE 2013 3851 CVE 2013 3852 CVE 2013 3853 CVE 2013 3854 CVE 2013 3855 CVE 2013 3856 CVE 2013 3857 CVE 2013 3858 Memory Corruption Microsoft bulletin Mateusz Jurczyk and Gynvael Coldwind Acrobat Reader and Acrobat 9 10 2013 CVE 2013 3351 CVE 2013 3352 CVE 2013 3353 CVE 2013 3354 CVE 2013 3355 CVE 2013 3356 Memory Corruption Adobe bulletin Mateusz Jurczyk and Ben Hawkes Adobe Flash Player 9 10 2013 CVE 2013 3361 CVE 2013 3362 CVE 2013 3363 CVE 2013 5324 Memory Corruption Adobe bulletin Ivan Fratric and Ben Hawkes Microsoft Internet Explorer 9 10 2013 CVE 2013 3204 Memory Corruption Microsoft bulletin Mateusz Jurczyk and Gynvael Coldwind Microsoft Windows 9 10 2013 CVE 2013 1341 CVE 2013 1342 CVE 2013 1343 CVE 2013 3864 CVE 2013 3865 Memory Corruption Microsoft bulletin Mateusz Jurczyk Microsoft Windows 9 10 2013 CVE 2013 1344 Memory Corruption Microsoft bulletin Fermin J Serna Microsoft Internet Explorer 8 13 2013 CVE 2013 3186 Sandbox Escape Microsoft bulletin Ivan Fratric and Ben Hawkes Microsoft Internet Explorer 8 13 2013 CVE 2013 3190 and CVE 2013 3191 Memory Corruption Microsoft bulletin Mateusz Jurczyk Microsoft Windows 8 13 2013 CVE 2013 3196 CVE 2013 3197 CVE 2013 3198 Memory Corruption Microsoft bulletin Ivan Fratric Microsoft Internet Explorer 7 27 2013 MSFT IE11 bug bounty Memory Corruption Microsoft bulletin Fermin J Serna Microsoft Internet Explorer 7 26 2013 MSFT IE11 bug bounty Memory Corruption Microsoft bulletin Mateusz Jurczyk Microsoft Windows 7 9 2013 CVE 2013 3172 Memory Corruption Microsoft bulletin Mateusz Jurczyk Gynvael Coldwind and Fermin Serna Adobe Flash Player 7 9 2013 CVE 2013 3344 CVE 2013 3345 Memory Corruption Adobe bulletin Ivan Fratric and Ben Hawkes Microsoft Internet Explorer 7 9 2013 CVE 2013 3115 CVE 2013 3161 CVE 2013 3162 Memory Corruption Microsoft bulletin Abhishek Arya Mozilla Firefox 6 25 2013 CVE 2013 1684 CVE 2013 1685 CVE 2013 1686 Memory Corruption Mozilla advisory Mateusz Jurczyk and Ben Hawkes Adobe Flash 6 11 2013 CVE 2013 3343 Memory Corruption Adobe bulletin Ivan Fratric and Ben Hawkes Microsoft Internet Explorer 6 11 2013 CVE 2013 3113 CVE 2013 3114 CVE 2013 3116 and CVE 2013 3117 Memory Corruption Microsoft bulletin Andrew Lyons and Neel Mehta Microsoft Office 6 11 2013 CVE 2013 1331 Buffer Overflow Microsoft bulletin Mateusz j00ru Jurczyk Microsoft Windows 6 11 2013 CVE 2013 3136 Information Disclosure Microsoft bulletin Fermin J Serna Abhishek Arya Apple Safari 6 4 2013 CVE 2013 1000 CVE 2013 0993 CVE 2013 0995 CVE 2013 0996 CVE 2013 1003 CVE 2013 1007 CVE 2013 1011 CVE 2013 1023 Memory Corruption Apple advisory Felix Gröbert Ivan Fratric PHP 5 20 2013 CVE 2013 2110 Memory Corruption PHP advisory Abhishek Arya Apple Safari 5 16 2013 CVE 2013 0948 CVE 2013 0949 many Memory Corruption Apple advisory Mateusz Jurczyk and Ben Hawkes Adobe Flash 5 14 2013 CVE 2013 2728 CVE 2013 3324 CVE 2013 3325 CVE 2013 3326 CVE 2013 3327 CVE 2013 3328 CVE 2013 3329 CVE 2013 3330 CVE 2013 3331 CVE 2013 3332 Memory Corruption Adobe bulletin Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 5 14 2013 CVE 2013 3333 CVE 2013 3334 CVE 2013 3335 Memory Corruption Adobe bulletin Tavis Ormandy Adobe Reader and Acrobat 5 14 2013 CVE 2013 2718 CVE 2013 3337 Memory Corruption Adobe bulletin Mateusz Jurczyk and Gynvael Coldwind Adobe Reader and Acrobat 5 14 2013 CVE 2013 2719 CVE 2013 2720 CVE 2013 2721 CVE 2013 2722 CVE 2013 2723 CVE 2013 2724 CVE 2013 2725 CVE 2013 2726 CVE 2013 2731 CVE 2013 2732 CVE 2013 2733 CVE 2013 2734 CVE 2013 2735 CVE 2013 2736 CVE 2013 3338 CVE 2013 3339 CVE 2013 3340 CVE 2013 3341 Memory Corruption Adobe bulletin Ivan Fratric Microsoft Internet Explorer 5 14 2013 CVE 2013 1307 Use After Free Microsoft bulletin Mateusz j00ru Jurczyk and Gynvael Coldwind Microsoft Windows 5 14 2013 CVE 2013 1332 Double Fetch Vulnerability Microsoft bulletin Abhishek Arya Mozilla Firefox 5 14 2013 CVE 2013 1676 CVE 2013 1677 CVE 2013 1678 CVE 2013 1679 CVE 2013 1680 CVE 2013 1681 Memory Corruption Mozilla advisory Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 4 9 2013 CVE 2013 1378 CVE 2013 1379 CVE 2013 1380 Memory Corruption Adobe bulletin Ivan Fratric and Ben Hawkes Microsoft Internet Explorer 4 9 2013 CVE 2013 1303 and CVE 2013 1304 Use After Free Microsoft bulletin Andrew Lyons Drew Hintz Microsoft Office 4 9 2013 CVE 2013 1289 XSS leading to privilege escalation Microsoft bulletin Mateusz j00ru Jurczyk and Gynvael Coldwind Microsoft Windows 4 9 2013 CVE 2013 1283 CVE 2013 1292 and CVE 2013 1293 Race Condition Vulnerabilities and NULL Pointer Dereference Vulnerability Microsoft bulletin Mateusz j00ru Jurczyk and Gynvael Coldwind Microsoft Windows 4 9 2013 CVE 2013 1284 and CVE 2013 1294 Race Condition Microsoft bulletin Abhishek Arya Apple Safari 3 14 2013 CVE 2013 0948 CVE 2013 0949 many Memory Corruption Apple advisory Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 3 12 2013 CVE 2013 1371 CVE 2013 1375 Memory Corruption Adobe bulletin Felix Groebert BitDefender Antivirus 3 11 2013 many bugs reported and fixed in signature 9264365 version 7 46034 Memory Corruption Felix Groebert ClamAV Antivirus 3 11 2013 CVE 2013 2020 CVE 2013 2021 Memory Corruption ClamAV release note Abhishek Arya Mozilla Firefox 2 19 2013 CVE 2013 0777 CVE 2013 0778 CVE 2013 0779 CVE 2013 0780 CVE 2013 0781 CVE 2013 0782 Memory Corruption Mozilla advisory Niels Heinen Apache 2 18 2013 CVE 2012 3499 CVE 2012 4558 Multiple XSS vulnerabilities Apache advisory Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 2 12 2013 CVE 2013 0642 CVE 2013 0644 CVE 2013 0645 CVE 2013 0647 CVE 2013 0649 CVE 2013 1365 CVE 2013 1366 CVE 2013 1367 CVE 2013 1368 CVE 2013 1369 CVE 2013 1370 CVE 2013 1372 CVE 2013 1373 CVE 2013 1374 Memory Corruption Adobe bulletin Mateusz j00ru Jurczyk and Gynvael Coldwind Microsoft Windows 2 12 2013 CVE 2013 1278 and CVE 2013 1279 Race Condition Microsoft bulletin Mateusz j00ru Jurczyk and Gynvael Coldwind Microsoft Windows 2 12 2013 Multiple vulenrabilities 30 Race Condition Microsoft bulletin Felix Groebert Mateusz Jurczyk Gynvael Coldwind ClamAV Antivirus 2 5 2013 multiple bugs reported Memory Corruption ClamAV release note Gynvael Coldwind Felix Groebert Mateusz Jurczyk ESET NOD32 1 29 2013 5 bugs reported announced on ESET updates 7945 7950 7977 and 8007 Memory Corruption ESET updates Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 1 8 2013 CVE 2013 0630 Memory Corruption Adobe bulletin Mateusz Jurczyk and Gynvael Coldwind Adobe Reader and Acrobat 1 8 2013 CVE 2013 0601 CVE 2013 0602 CVE 2013 0605 CVE 2013 0606 CVE 2013 0607 CVE 2013 0608 CVE 2013 0609 CVE 2013 0610 CVE 2013 0611 CVE 2013 0612 CVE 2013 0613 CVE 2013 0614 CVE 2013 0615 CVE 2013 0616 CVE 2013 0617 CVE 2013 0618 CVE 2013 0619 CVE 2013 0620 CVE 2013 0621 Memory Corruption Adobe bulletin Abhishek Arya Mozilla Firefox 1 8 2013 CVE 2013 0760 CVE 2013 0762 many Memory Corruption Mozilla advisory Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 12 11 2012 CVE 2012 5676 Memory Corruption Adobe bulletin Tavis Ormandy Adobe Flash 12 11 2012 CVE 2012 5678 Memory Corruption Adobe bulletin Fermin J Serna Microsoft Internet Explorer 12 11 2012 CVE 2012 4787 Use After Free Microsoft bulletin Abhishek Arya Mozilla Firefox 11 20 2012 CVE 2012 4214 CVE 2012 4215 many Memory Corruption Mozilla advisory Felix Groebert System Center 2012 Endpoint Protection for Mac 11 19 2012 1 reported bug and fixed in signature update 7853 Memory Corruption Mateusz j00ru Jurczyk Microsoft Windows 11 13 2012 CVE 2012 2553 Use After Free Microsoft bulletin Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 11 6 2012 CVE 2012 5274 CVE 2012 5275 CVE 2012 5276 CVE 2012 5277 CVE 2012 5279 CVE 2012 5280 Memory Corruption Adobe bulletin Eduardo Vela Nava Adobe Flash 11 6 2012 CVE 2012 5278 Security Bypass Adobe bulletin Mateusz Jurczyk FreeType2 10 24 2012 CVE 2012 5668 CVE 2012 5669 CVE 2012 5670 Memory Corruption Abhishek Arya Mozilla Firefox 10 9 2012 CVE 2012 3995 CVE 2012 4179 many Memory Corruption Mozilla advisory Drew Hintz and Andrew Lyons Microsoft Office Communications Platforms Server software and Office Web Apps 10 9 2012 CVE 2012 2520 HTML Sanitization Vulnerability Microsoft bulletin Mateusz Jurczyk Gynvael Coldwind and Fermin J Serna Adobe Flash 10 8 2012 Multiple vulenrabilities 28 Memory Corruption Adobe bulletin Niels Heinen opencryptoki 9 27 2012 CVE 2012 4454 CVE 2012 4455 Local privilege escalation CVE Thai Duong Chrome Firefox 9 21 2012 CVE 2012 4929 TLS Compression Information Leak CVE Abhishek Arya Mozilla Firefox 8 28 2012 CVE 2012 1972 CVE 2012 1973 many Memory Corruption Mozilla advisory Cris Neckar Microsoft Internet Explorer 8 15 2012 CVE 2012 2523 Memory Corruption Microsoft bulletin Billy Rios Tridium Niagara 8 15 2012 CVE 2012 3024 Authentication Bypass US CERT Billy Rios Tridium Niagara 8 15 2012 CVE 2012 3025 Plaintext Credential Storage US CERT Billy Rios Tridium Niagara 8 15 2012 CVE 2012 4027 Privilege Escalation US CERT Billy Rios Tridium Niagara 8 15 2012 CVE 2012 4028 Weak Credential Storage US CERT Mateusz Jurczyk Gynvael Coldwind Adobe Reader 8 14 2012 CVE 2012 4149 CVE 2012 4160 Memory Corruption Adobe bulletin Mateusz j00ru Jurczyk Adobe Reader and Acrobat 8 14 2012 CVE 2012 2051 Memory Corruption Adobe bulletin Mateusz Jurczyk and Gynvael Coldwind Adobe Reader and Acrobat 8 14 2012 CVE 2012 4149 CVE 2012 4150 CVE 2012 4151 CVE 2012 4152 CVE 2012 4153 CVE 2012 4154 CVE 2012 4155 CVE 2012 4156 CVE 2012 4157 CVE 2012 4158 CVE 2012 4159 CVE 2012 4160 Memory Corruption Adobe bulletin Cris Neckar Microsoft Internet Explorer 8 14 2012 CVE 2012 2523 Integer Overflow Remote Code Execution Microsoft bulletin Mateusz j00ru Jurczyk Microsoft Windows 8 14 2012 CVE 2012 2527 Use After Free Microsoft bulletin Andrew Lyons Drew Hintz Tencent QQ Webmail 8 7 2012 TPSA12 05 Persistent XSS Tencent bulletin Mateusz Jurczyk Gynvael Coldwind Google Chrome 8 6 2012 CVE 2012 2851 CVE 2012 2855 CVE 2012 2856 CVE 2012 2862 CVE 2012 2863 many more Memory Corruption Blog Abhishek Arya Adam Barth Cris Neckar David Levin Julien Chaffraix Stephen Chenney Thomas Sepez Apple Safari 6 WebKit 7 25 2012 many Memory Corruption Apple advisory Abhishek Arya Mozilla Firefox 7 17 2012 CVE 2012 1951 CVE 2012 1954 CVE 2012 1953 CVE 2012 1952 Memory Corruption Mozilla advisory Mateusz Jurczyk libexif 7 12 2012 CVE 2012 2812 CVE 2012 2813 CVE 2012 2814 Memory Corruption Information Leak Bugtraq Google Security Team Microsoft XML Core Services 7 10 2012 CVE 2012 1889 Memory Corruption Microsoft bulletin Niels Heinen Apache 6 13 2012 CVE 2012 2687 XSS Apache bug tracker Google Inc Microsoft Internet Explorer 6 12 2012 CVE 2012 1875 Remote Code Execution Microsoft bulletin Mateusz j00ru Jurczyk Microsoft Windows 6 12 2012 CVE 2012 1867 Integer Overflow Microsoft bulletin Billy Rios Microsoft Windows 6 12 2012 CVE 2007 2219 Remote Code Execution MS bulletin Tavis Ormandy Adobe Flash 6 8 2012 CVE 2012 2039 NULL Pointer Dereference Vulnerability Adobe bulletin Abhishek Arya Mozilla Firefox 6 5 2012 CVE 2012 1947 CVE 2012 1940 CVE 2012 1941 Memory Corruption Mozilla advisory Kees Cook nVidia graphics drivers 5 17 2012 CVE 2012 0951 CVE 2012 0952 CVE 2012 0953 Privilege Escalation Bug tracker Andrew Lyons Drew Hintz Microsoft Hotmail 5 1 2012 CVE 2012 2520 Persistent XSS MS bulletin Tavis Ormandy OpenSSL 4 19 2012 CVE 2012 2110 ASN 1 parsing bug in OpenSSL Billy Rios Siemens WinCC 4 18 2012 CVE 2011 4508 Authentication Bypass US CERT Billy Rios Siemens WinCC 4 18 2012 CVE 2011 4509 Weak Credentials US CERT Billy Rios Siemens WinCC 4 18 2012 CVE 2011 4510 XSS US CERT Billy Rios Siemens WinCC 4 18 2012 CVE 2011 4511 XSS US CERT Billy Rios Siemens WinCC 4 18 2012 CVE 2011 4513 Client side attacks via specially crafted files US CERT Ken Mixter Daniel Kurtz Xorg 4 18 2012 CVE 2012 2118 Format string flaw when logging input device names Blog Niels Heinen Apache debian 4 15 2012 CVE 2012 0216 Code execution on specific setups Debian advisory Mateusz Jurczyk Gynvael Coldwind FFmpeg libav 4 14 2012 CVE 2011 3930 up to CVE 2011 3952 many more Memory Corruption Link Drew Hintz and Andrew Lyons Microsoft SharePoint Server Groove Server SharePoint Foundation and Office Web Apps 4 9 2012 CVE 2013 1289 HTML Sanitization Vulnerability Microsoft bulletin Billy Rios Invensys Information Portal 4 2 2012 CVE 2012 0225 XSS US CERT Billy Rios Invensys Information Portal 4 2 2012 CVE 2012 0226 SQLi US CERT Billy Rios Invensys Information Portal 4 2 2012 CVE 2012 0228 Privilege Escalation US CERT Fermin J Serna Adobe Flash 3 28 2012 CVE 2012 0724 CVE 2012 0725 Memory Corruption Adobe bulletin Mateusz Jurczyk FreeType2 3 8 2012 CVE 2012 1126 up to CVE 2012 1144 Memory Corruption Link Abhishek Arya Adam Klein Cris Neckar Dave Levin Lei Zhang Jeremy Apthorp Julien Chaffraix Lei Zhang Apple Safari 5 1 4 iTunes 10 6 WebKit 3 7 2012 many Memory Corruption Apple advisory Tavis Ormandy Adobe Flash 3 5 2012 CVE 2012 0768 Memory Corruption Adobe bulletin Kees Cook glibc 3 5 2012 CVE 2012 0864 FORTIFY SOURCE bypass via format string nargs integer overflow NOTE fix vuln only did not find Link Mateusz Jurczyk OpenType Sanitizer 3 2 2012 CVE 2011 3062 Off by one Chrome bug tracker Fermin Serna Adobe Flash 2 23 2012 CVE 2012 0769 Information leak Link Google Security Team Adobe Flash 2 16 2012 CVE 2012 0767 Universal XSS Adobe bulletin Mateusz Jurczyk Gynvael Coldwind FFmpeg 2 16 2012 CVE 2011 3019 CVE 2011 3929 CVE 2011 3934 CVE 2011 3935 to CVE 2011 3937 CVE 2011 3940 CVE 2011 3941 CVE 2011 3944 to CVE 2011 3947 CVE 2011 3949 to CVE 2011 3952 CVE 2012 0853 CVE 2012 0947 CVE 2012 2774 to CVE 2012 2777 CVE 2012 2779 CVE 2012 2782 to CVE 2012 2804 CVE 2013 0861 to CVE 2013 0869 CVE 2013 0872 to CVE 2013 0878 CVE 2013 2276 CVE 2013 2277 CVE 2013 2495 CVE 2013 2496 many more Memory Corruption Eduardo Vela Adobe Flash 2 15 2012 CVE 2012 0755 Flash Origin Spoofing Adobe bulletin Billy Rios Invensys HMI Reports 2 8 2012 CVE 2011 4038 XSS US CERT Billy Rios Invensys HMI Reports 2 8 2012 CVE 2011 4039 Memory Corruption US CERT Ben Hawkes Mozilla Firefox 1 31 2012 CVE 2012 0443 Memory Corruption Mozilla advisory Meder Kydyraliev Struts2 XWork 1 22 2012 CVE 2011 3923 Remote Code Execution Link Tavis Ormandy Adobe Reader and Acrobat 1 10 2012 CVE 2011 4370 Memory Corruption Adobe bulletin Billy Rios Adobe Reader and Acrobat 1 10 2012 CVE 2011 4371 Memory Corruption Adobe bulletin Neel Mehta Microsoft Windows 1 10 2012 CVE 2012 0004 Remote Code Execution Microsoft bulletin Ben Laurie OpenSSL 1 4 2012 CVE 2011 4109 Double Free OpenSSL security advisory Mateusz Jurczyk Microsoft Windows 12 13 2011 CVE 2011 2018 Exception Handler Vulnerability MS bulletin Michal Zalewski Firefox Chrome Safari Opera Internet Explorer 12 6 2011 CVE 2011 4692 CVE 2011 4691 CVE 2011 4690 CVE 2011 4689 CVE 2011 4688 Cache timing attack Link Billy Rios Apple Safari 11 17 2011 CVE 2010 0045 Remote Code Execution Apple advisory Billy Rios Apple Safari 11 16 2011 CVE 2010 1778 File Theft Apple advisory Eduardo Vela Netflix 11 11 2011 Script Inclusion and XSS Ben Hawkes Adobe Flash 11 10 2011 CVE 2011 2456 Memory Corruption Adobe bulletin Tavis Ormandy Adobe Flash 11 10 2011 CVE 2011 2450 CVE 2011 2451 CVE 2011 2452 CVE 2011 2453 CVE 2011 2454 CVE 2011 2457 CVE 2011 2460 Memory Corruption Adobe bulletin Felix Groebert Apple FileVault 10 14 2011 CVE 2011 3212 Information Leak Billy Rios Apple Safari AppleTV 10 12 2011 CVE 2011 0216 Heap Overflow Apple advisory Abhishek Arya Adam Barth Cris Neckar Dimitri Glazkov Dominic Cooney John Knottenbelt Kent Tamura Philip Rogers Raman Tenneti Sadrul Habib Chowdhury SkyLined iTunes 10 5 WebKit 10 11 2011 many Memory Corruption Apple advisory Abhishek Arya Adam Barth Cris Neckar Dimitri Glazkov Dominic Cooney Kent Tamura Philip Rogers Raman Tenneti Sadrul Habib Chowdhury SkyLined Apple Safari 5 1 1 10 11 2011 many Memory Corruption Apple advisory Ben Hawkes Mozilla Firefox 9 27 2011 CVE 2011 3003 Memory Corruption

    Original URL path: https://www.google.hn/intl/es-419/about/appsecurity/research/ (2016-02-08)
    Open archived version from archive

  • Espacio social – Acerca de – Google Maps
    medios sociales conviértete en un experto en Maps entérate de las últimas novedades y mucho más item title item source G item cta Cargar más Síguenos en Blog Ayuda Acerca de Descubre Maps Street View My Maps Privacidad y seguridad Contribuir Mapas de interiores Conviértete en un Trekker Programa de socios de Street View Espacio social Información general Explorar Ver todas las Caminatas Cambiar idioma Bahasa Indonesia Bahasa Melayu Català

    Original URL path: https://www.google.hn/maps/about/play/ (2016-02-08)
    Open archived version from archive