Company Details
datorama
95
19,485
5112
salesforce.com
0
DAT_2752265
In-progress

Datorama, a Salesforce Company Company CyberSecurity Posture
salesforce.comAI-powered marketing intelligence. Make smarter decisions by connecting and acting on your marketing data and KPIs.
Company Details
datorama
95
19,485
5112
salesforce.com
0
DAT_2752265
In-progress
Between 650 and 699

DSC Global Score (TPRM)XXXX

Description: Salesforce confirmed unauthorized access to customer data via a **Gainsight-managed package**, a third-party SaaS connector integrated through OAuth. The breach exploited Gainsight’s compromised credentials, allowing attackers (claimed by **ShinyHunters**) to extract data from Salesforce instances without directly hacking Salesforce’s core infrastructure. The incident mirrors a prior **Salesloft supply-chain attack**, where attackers leveraged connected apps to pivot into victims’ Salesforce environments. While Salesforce denied platform vulnerabilities, the breach highlights risks of **token theft, over-permissive OAuth scopes, and third-party app sprawl**. The hackers threatened **double extortion**, hinting at stolen data from *hundreds of organizations*, though the exact scale and data types (e.g., customer PII, corporate records) remain unverified. Gainsight’s status page acknowledged a *Salesforce connection issue* but avoided labeling it a breach. The attack vector—**compromised vendor tokens accessing Salesforce APIs**—underscores systemic risks in SaaS supply chains, where long-lived tokens and broad permissions enable lateral movement. Customers were urged to **rotate OAuth tokens, audit app permissions, and monitor logs** for anomalous exports. The incident reinforces warnings from **CISA** about cloud-to-cloud compromises via third-party integrations, with potential fallout including **reputational damage, regulatory scrutiny, and customer churn** if sensitive data was exposed.


Datorama, a Salesforce Company has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.
Datorama, a Salesforce Company has 56.25% more incidents than the average of all companies with at least one recorded incident.
Datorama, a Salesforce Company reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
DSC cyber incidents detection timeline including parent company and subsidiaries

AI-powered marketing intelligence. Make smarter decisions by connecting and acting on your marketing data and KPIs.


ServiceNow (NYSE: NOW) makes the world work better for everyone. Our cloud-based platform and solutions help digitize and unify organizations so that they can find smarter, faster, better ways to make work flow. So employees and customers can be more connected, more innovative, and more agile. And w

We help organizations of all sizes digitally transform using software, hardware and services from the Siemens Xcelerator business platform. Our software and the comprehensive digital twin enable companies to optimize their design, engineering and manufacturing processes to turn today's ideas into th
SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

Meta's mission is to build the future of human connection and the technology that makes it possible. Our technologies help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further e

Nielsen shapes the world’s media and content as a global leader in audience insights, data and analytics. Through our understanding of people and their behaviors across all channels and platforms, we empower our clients with independent and actionable intelligence so they can connect and engage with
Shopify is a leading global commerce company, providing trusted tools to start, grow, market, and manage a retail business of any size. Shopify makes commerce better for everyone with a platform and services that are engineered for reliability, while delivering a better shopping experience for consu

Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol

Cisco is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities

The Bosch Group’s strategic objective is to create solutions for a connected life. Bosch improves quality of life worldwide with innovative products and services that are "Invented for life" and spark enthusiasm. Podcast: http://bit.ly/beyondbosch Imprint: https://www.bosch.us/corporate-informatio
.png)
US cybersecurity company Zscaler has announced that it is acquiring early stage Israeli cybersecurity startup Avalor for $350 million.
American cybersecurity giant Zscaler is in negotiations to purchase Israeli startup Avalor for approximately $250-350 million.
TEL AVIV, Israel--(BUSINESS WIRE)--Today, Avalor – the Data Fabric for Security™ – announced the completion of a $25M Series A investment...
Security has a data problem. That's according to Kfir Tishbi, who led the engineering team at Datorama, a marketing analytics company that...
Mick O'Brien will lead the local business for the global cybersecurity solution for online advertisers.
Team8 Capital will lead seed, series A, and series B rounds for startups working in the fields of data, artificial intelligence,...
Elad Donsky, Salesforce's vice president of engineering, spoke to Calcalist about the multinational cloud company's local expansion...
Salesforce will significantly expand its Israel-based operations in the coming years, a company executive said on Thursday, making Israel the company's second-...
From Datorama's exit to Gett's upcoming IPO: where are last year's star startups now?)

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Datorama, a Salesforce Company is http://www.datorama.com.
According to Rankiteo, Datorama, a Salesforce Company’s AI-generated cybersecurity score is 689, reflecting their Weak security posture.
According to Rankiteo, Datorama, a Salesforce Company currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Datorama, a Salesforce Company is not certified under SOC 2 Type 1.
According to Rankiteo, Datorama, a Salesforce Company does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Datorama, a Salesforce Company is not listed as GDPR compliant.
According to Rankiteo, Datorama, a Salesforce Company does not currently maintain PCI DSS compliance.
According to Rankiteo, Datorama, a Salesforce Company is not compliant with HIPAA regulations.
According to Rankiteo,Datorama, a Salesforce Company is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Datorama, a Salesforce Company operates primarily in the Software Development industry.
Datorama, a Salesforce Company employs approximately 95 people worldwide.
Datorama, a Salesforce Company presently has no subsidiaries across any sectors.
Datorama, a Salesforce Company’s official LinkedIn profile has approximately 19,485 followers.
Datorama, a Salesforce Company is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Datorama, a Salesforce Company has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/datorama.
Yes, Datorama, a Salesforce Company maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/datorama.
As of December 04, 2025, Rankiteo reports that Datorama, a Salesforce Company has experienced 1 cybersecurity incidents.
Datorama, a Salesforce Company has an estimated 27,188 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with coordination with gainsight, third party assistance with legal counsel, third party assistance with insurers, and containment measures with invalidate and rotate oauth tokens/client secrets, containment measures with enforce reconsent for affected apps, containment measures with turn off/uninstall unused integrations, containment measures with limit data export scope, and remediation measures with tighten connected app policies (ip restrictions, re-authentication, least privilege), remediation measures with analyze event monitoring (em) logs and api logs for anomalies, remediation measures with centralized token vaulting (recommended), remediation measures with conditional access policies (recommended), remediation measures with dlp controls in casb/sspm tools (recommended), and recovery measures with reauthorize integrations post-remediation, and communication strategy with customer advisories from salesforce/gainsight, communication strategy with public status page updates, and enhanced monitoring with ongoing monitoring of oauth token usage, enhanced monitoring with api log analysis..
Title: Unauthorized Access to Salesforce Customer Data via Gainsight Managed Package
Description: Salesforce investigated an incident where unauthorized access to some customers’ data occurred through a Gainsight 'managed package,' a third-party connector. The breach was attributed to the exploitation of OAuth tokens linked to Gainsight-published applications, rather than a vulnerability in Salesforce’s core platform. The hacking group ShinyHunters claimed responsibility, threatening to leak stolen data if negotiations failed. The incident highlights risks associated with third-party SaaS connectors and OAuth token misuse in cloud environments.
Type: Data Breach
Attack Vector: OAuth Token ExploitationThird-Party Connector (Gainsight Managed Package)Cloud-to-Cloud Compromise
Vulnerability Exploited: Overbroad OAuth Token PermissionsLong-Lived TokensToken Sprawl
Threat Actor: ShinyHuntersScattered Lapsus$ Hunters (historically linked)
Motivation: Data TheftExtortion (Double-Extortion Technique)Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised Gainsight Environment or Token StoreExploited OAuth Tokens for Gainsight Managed Package.

Data Compromised: Account data, Contact data, Opportunity data, Usage data, Potentially sensitive metadata
Systems Affected: Salesforce Instances (via Gainsight Connected Apps)Gainsight Managed Package
Operational Impact: Potential Disruption to Customer Success WorkflowsNeed for Token Rotation and App Reauthorization
Brand Reputation Impact: Potential Erosion of Trust in Salesforce/Gainsight SecurityNegative Publicity
Identity Theft Risk: ['Possible (if PII was exposed)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Account Data, Contact Data, Opportunity Data, Usage Data, Potentially Sensitive Metadata and .

Entity Name: Salesforce
Entity Type: SaaS Provider
Industry: Cloud Computing / CRM
Location: San Francisco, California, USA
Size: Large Enterprise
Customers Affected: Hundreds of organizations (claimed by ShinyHunters, unverified)

Entity Name: Gainsight
Entity Type: Customer Success Platform
Industry: Software
Location: San Francisco, California, USA
Size: Mid-to-Large Enterprise

Entity Name: Salesloft
Entity Type: Sales Engagement Platform
Industry: Software
Location: Atlanta, Georgia, USA
Size: Mid-to-Large Enterprise

Entity Name: Allianz Life
Entity Type: Financial Services
Industry: Insurance
Location: USA
Size: Large Enterprise

Entity Name: Bugcrowd
Entity Type: Cybersecurity
Industry: Technology
Location: USA
Size: Mid-to-Large Enterprise

Entity Name: Cloudflare
Entity Type: Web Infrastructure
Industry: Technology
Location: USA
Size: Large Enterprise

Entity Name: Google
Entity Type: Technology
Industry: Internet Services
Location: USA
Size: Large Enterprise

Entity Name: Kering
Entity Type: Luxury Goods
Industry: Retail
Location: France
Size: Large Enterprise

Entity Name: Proofpoint
Entity Type: Cybersecurity
Industry: Technology
Location: USA
Size: Large Enterprise

Entity Name: Qantas
Entity Type: Airline
Industry: Aviation
Location: Australia
Size: Large Enterprise

Entity Name: Stellantis (formerly Fiat Chrysler)
Entity Type: Automotive
Industry: Manufacturing
Location: Netherlands/USA
Size: Large Enterprise

Entity Name: TransUnion
Entity Type: Credit Reporting
Industry: Financial Services
Location: USA
Size: Large Enterprise

Entity Name: Workday
Entity Type: Enterprise Cloud Applications
Industry: Software
Location: USA
Size: Large Enterprise

Incident Response Plan Activated: True
Third Party Assistance: Coordination With Gainsight, Legal Counsel, Insurers.
Containment Measures: Invalidate and Rotate OAuth Tokens/Client SecretsEnforce Reconsent for Affected AppsTurn Off/Uninstall Unused IntegrationsLimit Data Export Scope
Remediation Measures: Tighten Connected App Policies (IP Restrictions, Re-Authentication, Least Privilege)Analyze Event Monitoring (EM) Logs and API Logs for AnomaliesCentralized Token Vaulting (Recommended)Conditional Access Policies (Recommended)DLP Controls in CASB/SSPM Tools (Recommended)
Recovery Measures: Reauthorize Integrations Post-Remediation
Communication Strategy: Customer Advisories from Salesforce/GainsightPublic Status Page Updates
Enhanced Monitoring: Ongoing Monitoring of OAuth Token UsageAPI Log Analysis
Third-Party Assistance: The company involves third-party assistance in incident response through Coordination with Gainsight, Legal Counsel, Insurers, .

Type of Data Compromised: Account data, Contact data, Opportunity data, Usage data, Potentially sensitive metadata
Sensitivity of Data: Moderate to High (depends on exposed fields)
Personally Identifiable Information: Potential (if PII was included in exposed data)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Tighten Connected App Policies (IP Restrictions, Re-Authentication, Least Privilege), Analyze Event Monitoring (EM) Logs and API Logs for Anomalies, Centralized Token Vaulting (Recommended), Conditional Access Policies (Recommended), DLP Controls in CASB/SSPM Tools (Recommended), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by invalidate and rotate oauth tokens/client secrets, enforce reconsent for affected apps, turn off/uninstall unused integrations, limit data export scope and .

Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Reauthorize Integrations Post-Remediation, .

Lessons Learned: Third-party SaaS connectors can serve as attack vectors even if the core platform is secure., OAuth token sprawl and overbroad permissions increase risk in multi-tenant cloud environments., Token theft and cloud-to-cloud compromise are significant threats, as warned by CISA., Strict scoping, short-lived tokens, and ongoing monitoring are critical countermeasures., Recertification of connected apps and centralized token management are essential for security.

Recommendations: Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.Audit and inventory all third-party connected apps, especially those with broad permissions., Enforce least-privilege access and short-lived tokens for OAuth integrations., Implement conditional access policies and DLP controls for SaaS connectors., Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Disable or limit unused integrations to reduce the attack surface., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed., Educate teams on risks associated with SaaS supply chain attacks and token hygiene.
Key Lessons Learned: The key lessons learned from past incidents are Third-party SaaS connectors can serve as attack vectors even if the core platform is secure.,OAuth token sprawl and overbroad permissions increase risk in multi-tenant cloud environments.,Token theft and cloud-to-cloud compromise are significant threats, as warned by CISA.,Strict scoping, short-lived tokens, and ongoing monitoring are critical countermeasures.,Recertification of connected apps and centralized token management are essential for security.

Source: Salesforce Customer Notice

Source: Gainsight Public Status Page

Source: DataBreaches.net (ShinyHunters Claim)

Source: CISA Warnings on Token Theft

Source: Verizon Data Breach Investigations Report

Source: IBM Cost of a Data Breach Study
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Salesforce Customer Notice, and Source: Gainsight Public Status Page, and Source: DataBreaches.net (ShinyHunters Claim), and Source: CISA Warnings on Token Theft, and Source: Verizon Data Breach Investigations Report, and Source: IBM Cost of a Data Breach Study.

Investigation Status: Ongoing (Salesforce and Gainsight investigating; extent of access and data exposure unclear)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Customer Advisories From Salesforce/Gainsight and Public Status Page Updates.

Stakeholder Advisories: Monitor Updates From Salesforce And Gainsight, Prepare For Potential Reauthorization Of Integrations.
Customer Advisories: Check inventory of Gainsight-related appsVerify app scopes and installed usersRotate OAuth tokens and client secrets
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Monitor Updates From Salesforce And Gainsight, Prepare For Potential Reauthorization Of Integrations, Check Inventory Of Gainsight-Related Apps, Verify App Scopes And Installed Users, Rotate Oauth Tokens And Client Secrets and .

Entry Point: Compromised Gainsight Environment Or Token Store, Exploited Oauth Tokens For Gainsight Managed Package,
High Value Targets: Salesforce Customer Data (Accounts, Contacts, Opportunities),
Data Sold on Dark Web: Salesforce Customer Data (Accounts, Contacts, Opportunities),

Root Causes: Overbroad Oauth Token Permissions For Third-Party Apps, Long-Lived Tokens Without Rotation, Insufficient Monitoring Of Connected App Activity, Token Sprawl In Multi-Tenant Cloud Environments,
Corrective Actions: Enforce Least-Privilege Access And Token Scoping, Implement Short-Lived Tokens And Regular Rotation, Enhance Logging And Monitoring For Connected Apps, Centralize Token Management With Vaulting Solutions, Conduct Recertification Of All Connected Apps, Limit Data Export Capabilities For Integrations,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Coordination With Gainsight, Legal Counsel, Insurers, , Ongoing Monitoring Of Oauth Token Usage, Api Log Analysis, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enforce Least-Privilege Access And Token Scoping, Implement Short-Lived Tokens And Regular Rotation, Enhance Logging And Monitoring For Connected Apps, Centralize Token Management With Vaulting Solutions, Conduct Recertification Of All Connected Apps, Limit Data Export Capabilities For Integrations, .
Last Attacking Group: The attacking group in the last incident was an ShinyHuntersScattered Lapsus$ Hunters (historically linked).
Most Significant Data Compromised: The most significant data compromised in an incident were Account Data, Contact Data, Opportunity Data, Usage Data, Potentially Sensitive Metadata and .
Most Significant System Affected: The most significant system affected in an incident was Salesforce Instances (via Gainsight Connected Apps)Gainsight Managed Package.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was coordination with gainsight, legal counsel, insurers, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Invalidate and Rotate OAuth Tokens/Client SecretsEnforce Reconsent for Affected AppsTurn Off/Uninstall Unused IntegrationsLimit Data Export Scope.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Potentially Sensitive Metadata, Contact Data, Usage Data, Account Data and Opportunity Data.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Recertification of connected apps and centralized token management are essential for security.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor Event Monitoring (EM) logs and API logs for abnormal activity., Educate teams on risks associated with SaaS supply chain attacks and token hygiene., Audit and inventory all third-party connected apps, especially those with broad permissions., Coordinate with vendors (e.g., Gainsight) for indicators of compromise and remediation steps., Implement conditional access policies and DLP controls for SaaS connectors., Enforce least-privilege access and short-lived tokens for OAuth integrations., Engage legal, insurance, and law enforcement stakeholders if sensitive data is exposed. and Disable or limit unused integrations to reduce the attack surface..
Most Recent Source: The most recent source of information about an incident are Salesforce Customer Notice, CISA Warnings on Token Theft, IBM Cost of a Data Breach Study, Verizon Data Breach Investigations Report, Gainsight Public Status Page and DataBreaches.net (ShinyHunters Claim).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Salesforce and Gainsight investigating; extent of access and data exposure unclear).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Monitor updates from Salesforce and Gainsight, Prepare for potential reauthorization of integrations, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Check inventory of Gainsight-related appsVerify app scopes and installed usersRotate OAuth tokens and client secrets.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.