Phishing attacks in 2025 increasingly moved beyond email, with attackers using social platforms, search ads, and browser-based techniques to bypass MFA and steal sessions. Push Security outlines key phishing trends and what security teams must know as identity-based attacks continue to evolve in 2026. [...]
Atlassian released security updates to address dozens of flaws, including multiple critical-severity vulnerabilities. Atlassian addressed dozens of vulnerabilities impacting its products, including multiple critical-severity issues. One of the most severe bugs is a maximum-severity XML External Entity (XXE) injection flaw, tracked as CVE-2025-66516 (CVSS score of 10/10), in Apache Tika. CVE-2025-66516 carries a maximum CVSS rating […]
A vulnerability was found in Apple macOS up to 14.8.1/15.7.1. It has been classified as problematic. Affected is an unknown function of the component Note Handler. This manipulation causes denial of service.
This vulnerability appears as CVE-2025-43410. It is feasible to perform the attack on the physical device. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Apple macOS up to 26.0. It has been rated as problematic. This issue affects some unknown processing of the component App. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2025-43463. An attack has to be approached locally. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Apple macOS up to 14.7.2/15.7.2. It has been declared as critical. The affected element is an unknown function of the component App. The manipulation results in improper access controls.
This vulnerability is reported as CVE-2025-43416. The attack requires a local approach. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in MISP up to 2.5.27. The impacted element is an unknown function of the file app/View/Elements/Workflows/executionPath.ctp. Executing manipulation can lead to cross site scripting.
This vulnerability is tracked as CVE-2025-67906. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in libcURL and classified as problematic. This affects the function GTime2str of the component ASN1 Parser. Such manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2024-7264. The attack can only be initiated within the local network. No exploit exists.
A vulnerability was found in Google Chrome. It has been declared as critical. This vulnerability affects unknown code of the component Downloads. Such manipulation leads to Remote Code Execution.
This vulnerability is listed as CVE-2024-8906. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Exim up to 4.99.0. This issue affects some unknown processing. Executing manipulation can lead to heap-based buffer overflow.
This vulnerability is handled as CVE-2025-67896. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Elastic Kibana up to 7.17.29/8.19.7/9.1.7/9.2.1. It has been declared as problematic. This affects an unknown function. Executing manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-37732. The attack may be launched remotely. There is no exploit available.
A vulnerability identified as critical has been detected in WBCE CMS 1.5.3. This affects an unknown part of the file admin/languages/install.php. Performing manipulation results in command injection.
This vulnerability is known as CVE-2023-29855. Access to the local network is required for this attack. No exploit is available.
A vulnerability was found in Teslamate 1.27.1. It has been declared as problematic. This impacts an unknown function. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2023-29857. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability classified as problematic was found in DTStack Taier 1.3.0. This impacts the function getCookie of the file /Taier/API/tenant/listTenant. Such manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-29860. Access to the local network is required for this attack to succeed. There is no exploit available.