
ICE
ICE (NYSE: ICE) connects people to data, technology and expertise that create opportunity and inspire innovation. For terms of use, visit www.ice.com/privacy-security-center/terms-of-use



ICE (NYSE: ICE) connects people to data, technology and expertise that create opportunity and inspire innovation. For terms of use, visit www.ice.com/privacy-security-center/terms-of-use

We are here. So you can stay ahead. For nearly two hundred years we have acquired and shared knowledge, developed global networks and adapted to modern everyday life. To us, it is important to combine profitability with responsibility. DNB is Norway's largest financial services group and one of the largest in the Nordic region in terms of market capitalisation. The Group offers a full range of financial services, including loans, savings, advisory services, insurance and pension products for retail and corporate customers. DNB’s bank branches in Norway, in-store postal and banking outlets, Post office counters, Internet banking, mobile services and international offices ensure that we are present where our customers are. We are a major operator in a number of industries, for which we also have a Nordic or international strategy. DNB is one of the world’s leading shipping banks and has a strong position in the energy sector, and the fisheries and seafood industry. As an international financial institution we offer a wide range of services from our offices around the globe. At DNB you can find career opportunities in many fields, and with offices in 22 countries we are dependent on employees with different backgrounds and skills - all equally important for DNB's performance.
Security & Compliance Standards Overview












No incidents recorded for ICE in 2025.
No incidents recorded for DNB in 2025.
ICE cyber incidents detection timeline including parent company and subsidiaries
DNB cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).