Vulnerabilities > Google
|2007-12-20||CVE-2007-6452|| Cross-Site Scripting vulnerability in Google web Toolkit 1.4.60 |
Unspecified vulnerability in the benchmark reporting system in Google Web Toolkit (GWT) before 1.4.61 has unknown impact and attack vectors, possibly related to cross-site scripting (XSS).
| 4.3 |
|2007-12-04||CVE-2007-6212|| Path Traversal vulnerability in Google KML 1.1 |
Directory traversal vulnerability in region.php in KML share 1.1 allows remote attackers to read arbitrary files via a ..
| 5.0 |
|2007-10-06||CVE-2007-5255|| Cross-Site Scripting vulnerability in Google Mini Search Appliance 3.4.14 |
Cross-site scripting (XSS) vulnerability in Google Mini Search Appliance 3.4.14 allows remote attackers to inject arbitrary web script or HTML via the ie parameter to the /search URI.
| 4.3 |
|2007-09-12||CVE-2007-4847|| Remote Security vulnerability in Picasa |
Google Picasa allows remote attackers to read image files stored by Picasa via unspecified vectors involving a picasa:// URI.
| 5.0 |
|2007-09-11||CVE-2007-4824|| Remote Security vulnerability in Picasa |
Multiple cross-application scripting (XAS) vulnerabilities in Google Picasa have unspecified attack vectors and impact.
| 6.8 |
|2007-09-11||CVE-2007-4823|| Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Google Picasa |
Multiple buffer overflows in Google Picasa have unspecified attack vectors and impact.
| 7.5 |
|2007-06-11||CVE-2007-3150|| Remote Security vulnerability in Desktop |
| 9.3 |
|2007-04-30||CVE-2007-2378|| Denial-Of-Service vulnerability in Web Toolkit |
| 5.0 |
|2007-03-07||CVE-2006-7157|| Buffer Errors vulnerability in Google Earth 4.0.2091 |
Buffer overflow in Google Earth v4.0.2091 (beta) allows remote user-assisted attackers to cause a denial of service (crash) via a KML or KMZ file with a long href element.
| 7.1 |
|2007-02-23||CVE-2007-1085|| Unspecified vulnerability in Google Desktop |
Cross-site scripting (XSS) vulnerability in Google Desktop allows remote attackers to bypass protection schemes and inject arbitrary web script or HTML, and possibly gain full access to the system, by using an XSS vulnerability in google.com to extract the signature for the internal web server, then calling the "under" parameter in Advanced Search with the proper signature.
| 7.6 |