
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO)
The Cannabis Information Sharing & Analysis Center



The Cannabis Information Sharing & Analysis Center

Wolters Kluwer (EURONEXT: WKL) is a global leader in professional information, software solutions, and services for the healthcare, tax and accounting, financial and corporate compliance, legal and regulatory, and corporate performance and ESG sectors. We help our customers make critical decisions every day by providing expert solutions that combine deep domain knowledge with specialized technology and services. Wolters Kluwer reported 2024 annual revenues of €5.9 billion. The group serves customers in over 180 countries, maintains operations in over 40 countries, and employs approximately 21,000 people worldwide. The company is headquartered in Alphen aan den Rijn, the Netherlands. Beware of Recruitment Fraud! 🔒 Scammers may pose as Wolters Kluwer, offering fake job opportunities and requesting personal info or payments. Protect yourself: - Apply only via our secure Workday hub on our Careers page. - Our recruiters never ask for banking info or payments. - We don't use public email accounts (e.g., Hotmail, Yahoo, Gmail). Report suspected fraud: [email protected]. If you've made a payment, contact local authorities. Read more here - https://careers.wolterskluwer.com/en/recruitment-fraud-alert
Security & Compliance Standards Overview












No incidents recorded for Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) in 2025.
Wolters Kluwer has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) cyber incidents detection timeline including parent company and subsidiaries
Wolters Kluwer cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).