Security Blog

The latest news and insights from Google on security and safety on the Internet

Going beyond vulnerability rewards

9 de outubro de 2013
Share on Twitter Share on Facebook
Google

10 comentários :

Dagian Insider disse...

This is *awesome*.

9 de outubro de 2013 às 20:51
Dagian Insider disse...

This is *awesome*.

9 de outubro de 2013 às 20:51
Brad disse...

Could Google consider extending the program to widely used name server implementations such as nsd and Unbound and IMAP/POP3 implementation Dovecot?

9 de outubro de 2013 às 22:27
Tyler Neely disse...

I can make many times the maximum reward provided here by weaponizing what I find in the popular projects mentioned, and providing disinformation and bug obfuscation to appear to fix it and take your money as well. Given the fact that a massive portion of bug finders feed directly into the arsenals of nation states and other malicious actors, it would REALLY be doing the world a favor if you paid enough to cause someone who knows about the bugs in this software to come forward about it. Because right now the electronic arms buyers are outbidding you by a dramatic margin.

9 de outubro de 2013 às 22:42
Andrey Karpov disse...

What is a vulnerability? We regularly find new bugs. What errors are the vulnerabilities? :)

Errors detected in Open Source projects by the PVS-Studio developers through static analysis: http://www.viva64.com/en/examples/

10 de outubro de 2013 às 09:36
Unknown disse...

Awesome. I had a similar idea the other day, but that would have involved sponsor companies putting money into a pool. Good job Google.

10 de outubro de 2013 às 12:13
Unknown disse...

Woot! Google taking initiative once again! These sort of fixes are long past due.

11 de outubro de 2013 às 10:22
Unknown disse...

thanks for the wonderful blog .
Good job Google.
Adobe Acrobat X Software Download

5 de novembro de 2013 às 10:31
Unknown disse...

This is seriously cool and decidedly non-evil! Maybe at later stage you can consider to contribute to bug bounties (e.g. at https://www.bountysource.com/) as well?

22 de novembro de 2013 às 04:09
adrian is disse...

hi how about i find a vulnerability . but i dont have a patch(explanation only). is this still valid?

28 de setembro de 2014 às 22:37

Postar um comentário

  

Marcadores


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2024
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2023
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2022
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2021
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2020
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2019
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2018
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2017
    • dez.
    • nov.
    • out.
    • set.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2016
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2015
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2014
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2013
    • dez.
    • nov.
    • out.
    • ago.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2012
    • dez.
    • set.
    • ago.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
    • jan.
  •     2011
    • dez.
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • jun.
    • mai.
    • abr.
    • mar.
    • fev.
  •     2010
    • nov.
    • out.
    • set.
    • ago.
    • jul.
    • mai.
    • abr.
    • mar.
  •     2009
    • nov.
    • out.
    • ago.
    • jul.
    • jun.
    • mar.
  •     2008
    • dez.
    • nov.
    • out.
    • ago.
    • jul.
    • mai.
    • fev.
  •     2007
    • nov.
    • out.
    • set.
    • jul.
    • jun.
    • mai.

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms