A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution

A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileg...

Continue ReadingA Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution

Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablet...

Continue ReadingMultiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation

A Vulnerability in Atlassian Confluence Server and Data Center Could Allow for Data Destruction

A vulnerability has been discovered in Atlassian Confluence Server and Data Center which could allow for data destruction. Confluence is a collaboration tool that brings people, knowledge, and ideas together in a shared workspace. Successful exploitati...

Continue ReadingA Vulnerability in Atlassian Confluence Server and Data Center Could Allow for Data Destruction