Company Details
london-north-eastern-railway
1,113
38,968
482
lner.co.uk
0
LON_2479577
In-progress

London North Eastern Railway Company CyberSecurity Posture
lner.co.ukLondon North Eastern Railway is one of the UK’s leading long-distance train operators. Our services link London King’s Cross directly with many destinations in the East Midlands, Yorkshire, North East England and Scotland operating on a 936 mile route. We operate 155 services a day and help more than 19 million passengers reach their destinations every year. For further details on our train times and fares, please visit www.lner.co.uk
Company Details
london-north-eastern-railway
1,113
38,968
482
lner.co.uk
0
LON_2479577
In-progress
Between 550 and 599

LNER Global Score (TPRM)XXXX

Description: LNER (London North Eastern Railway) experienced a data breach due to unauthorized access to files managed by its third-party supplier, Merkle (a subsidiary of Dentsu). The breach compromised **customer contact details and some journey history**, though no bank, payment card, or password data was exposed. LNER warned customers about potential unsolicited communications and paused some customer communications as a precaution. Meanwhile, Dentsu confirmed that the breach also affected its **current and former employees**, exposing sensitive data such as **bank/payroll details, salaries, National Insurance numbers, and personal contact information**. Dentsu engaged cybersecurity firms and law enforcement, offering affected employees credit and dark-web monitoring services. The incident remains under investigation, with notifications sent to impacted parties in compliance with legal requirements. The breach highlights vulnerabilities in third-party vendor security and the broader risks of supply-chain cyberattacks.
Description: LNER, a major UK train operator running services from London to Edinburgh, suffered a cybersecurity breach via a third-party supplier. Hackers gained unauthorized access to its customer communication database, stealing the names and email addresses of thousands of passengers. While no payment card details, passwords, or account information were compromised, the breach exposed customers to potential phishing and scam messages. The company’s core operations, including train services and ticketing, remained unaffected. LNER reported the incident to authorities (ICO, NCSC, British Transport Police, and the Department for Transport) and is working with the supplier to implement enhanced security measures. Customers were advised to stay vigilant against suspicious communications and maintain strong password practices. The breach follows a series of high-profile cyberattacks in the UK, including those on Jaguar Land Rover, Marks & Spencer, and Harrods.
Description: LNER, a UK government-owned rail operator, confirmed that an unauthorized third party accessed customer data via one of its suppliers. The breach exposed customer contact details and partial journey history, though no financial (bank/payment card) or password information was compromised. The stolen data could be weaponized for targeted phishing or follow-on identity-based attacks, as warned by LNER and cybersecurity experts. While the immediate impact is limited to non-critical personal information, the incident highlights risks tied to third-party vendor vulnerabilities. LNER advised customers to remain vigilant against unsolicited communications but did not mandate password resets, emphasizing general password hygiene as a precaution. Security analysts stressed the need for organizations to map data flows to third parties and deploy identity threat detection to mitigate risks from such exposures.


London North Eastern Railway has 400.0% more incidents than the average of same-industry companies with at least one recorded incident.
London North Eastern Railway has 368.75% more incidents than the average of all companies with at least one recorded incident.
London North Eastern Railway reported 3 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 3 data breaches, compared to industry peers with at least 1 incident.
LNER cyber incidents detection timeline including parent company and subsidiaries

London North Eastern Railway is one of the UK’s leading long-distance train operators. Our services link London King’s Cross directly with many destinations in the East Midlands, Yorkshire, North East England and Scotland operating on a 936 mile route. We operate 155 services a day and help more than 19 million passengers reach their destinations every year. For further details on our train times and fares, please visit www.lner.co.uk


Hitachi Rail is committed to driving a sustainable mobility transition and helping every passenger, customer and community enjoy more connected, seamless and sustainable transport. Hitachi Rail is a trusted partner to operators around the world with expertise across every part of the rail ecosystems
One of America's most recognized companies, Union Pacific Railroad connects 23 states in the western two-thirds of the country by rail, providing a critical link in the global supply chain. The railroad's diversified business mix includes Agricultural Products, Automotive, Chemicals, Coal, Industria
CN is a North American transportation and logistics leader focused on supply chain innovation and collaboration. We offer integrated shipping solutions, including rail, intermodal, trucking, freight forwarding, warehousing and distribution. We are an engaged corporate citizen, committed to the saf

We’re at the heart of revitalising Britain’s railway, getting people and goods where they need to be and supporting the economy. Investment and modernisation are essential. So we’re building the railway of the future, running a safe, reliable and efficient railway, and serving customers and communi
CSX is a company on the move. As the nation’s best run railroad, we’re redefining freight rail with a progressive vision and real results – setting new industry performance standards and building a force of highly skilled professionals who are energized to help us move the economy safely, efficientl
Moving America Where it wants to go. We are not just a railroad; we are a company that moves people. With 21,000 route miles in 46 states, the District of Columbia and three Canadian provinces, Amtrak operates more than 300 trains each day – at speeds up to 150 mph – to more than 500 destinations.
.png)
Kensington and Chelsea Council has confirmed it is working with the National Cyber Security Centre, part of GCHQ, to protect the local...
Army Green to Gold is a program where active-duty enlisted soldiers can earn their degree and become a commissioned officer.
UK News: Two individuals were apprehended on Saturday following a stabbing incident aboard a train in Cambridgeshire, resulting in multiple...
Dentsu has become the first major advertising network to be struck by the latest wave of cyber attacks following what the group has called a...
The cyber attack that breached customer data at London North Eastern Railway (LNER) should send a shiver down the spines of everyone in the...
The importance of freight rail to the U.S. economy and its position as a backbone of the nation's infrastructure cannot be overstated.
The cyber attack that has compromised customer data at London North Eastern Railway (LNER) has set alarm bells ringing across the UK rail...
A train company that provides over 26 million journeys a year has warned customers of a data breach. London North Eastern Railway (LNER) travels between...
London North Eastern Railway (LNER) has confirmed that customer names and email addresses were accessed illegally during a September cyber...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of London North Eastern Railway is http://www.lner.co.uk.
According to Rankiteo, London North Eastern Railway’s AI-generated cybersecurity score is 563, reflecting their Very Poor security posture.
According to Rankiteo, London North Eastern Railway currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, London North Eastern Railway is not certified under SOC 2 Type 1.
According to Rankiteo, London North Eastern Railway does not hold a SOC 2 Type 2 certification.
According to Rankiteo, London North Eastern Railway is not listed as GDPR compliant.
According to Rankiteo, London North Eastern Railway does not currently maintain PCI DSS compliance.
According to Rankiteo, London North Eastern Railway is not compliant with HIPAA regulations.
According to Rankiteo,London North Eastern Railway is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
London North Eastern Railway operates primarily in the Rail Transportation industry.
London North Eastern Railway employs approximately 1,113 people worldwide.
London North Eastern Railway presently has no subsidiaries across any sectors.
London North Eastern Railway’s official LinkedIn profile has approximately 38,968 followers.
London North Eastern Railway is classified under the NAICS code 482, which corresponds to Rail Transportation.
No, London North Eastern Railway does not have a profile on Crunchbase.
Yes, London North Eastern Railway maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/london-north-eastern-railway.
As of December 04, 2025, Rankiteo reports that London North Eastern Railway has experienced 3 cybersecurity incidents.
London North Eastern Railway has an estimated 223 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with customer advisory on phishing risks, and communication strategy with public disclosure, communication strategy with customer warning about unsolicited communications, and and third party assistance with independent security experts (engaged by supplier), and and remediation measures with enhanced security controls (implemented by supplier), and communication strategy with customer email notification, communication strategy with dedicated mailbox for queries, communication strategy with media statements, and and and third party assistance with cybersecurity firm (unnamed), third party assistance with experian identity plus (for employee monitoring), and and containment measures with systems taken offline, containment measures with incident response protocols initiated, and recovery measures with systems brought back online (merkle), and communication strategy with press release by lner (september 2023), communication strategy with direct notifications to affected dentsu employees (october 2023), communication strategy with media alerts to lner customers, communication strategy with public statements reassuring no financial/password data was exposed, and enhanced monitoring with credit/dark-web monitoring for dentsu employees (experian)..
Title: Unauthorized Access to LNER Customer Details via Third-Party Supplier
Description: LNER, the operator of one of the UK’s busiest rail lines, disclosed that an unauthorized third party accessed customer details via a supplier. The compromised data includes customer contact details and some information about previous journeys, but no bank, payment card, or password information was affected. The incident poses a risk of follow-on phishing attacks targeting customers.
Type: data breach
Attack Vector: third-party supplier compromise
Threat Actor: unauthorized third party
Title: LNER Customer Data Breach via Third-Party Supplier
Description: Thousands of LNER train passengers had their data stolen in a major cybersecurity breach after hackers gained unauthorized access to a third-party supplier’s customer communication database. The compromised data included names and email addresses, but no payment card details, passwords, or account information were exposed. LNER warned customers of potential phishing or scam messages and reported the incident to regulatory authorities, including the ICO, NCSC, British Transport Police, and the Department for Transport.
Date Detected: 2025-09-08
Date Publicly Disclosed: 2025-09-08
Type: Data Breach
Attack Vector: Supply Chain AttackUnauthorized Network Access
Title: Dentsu (Merkle) Data Breach Compromising LNER’s Customer Data
Description: Dentsu’s security incident within Merkle’s network led to unauthorized access to files containing customer contact details and journey information for LNER (London North Eastern Railway). The breach also exposed bank, payroll, salary, National Insurance numbers, and personal contact details of Dentsu’s current/former employees and some clients. No bank, payment card, or password information was compromised for LNER customers. Dentsu engaged third-party cyber incident response firms, notified law enforcement, and offered affected employees credit/dark-web monitoring via Experian Identity Plus.
Date Publicly Disclosed: 2023-09
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through third-party supplier systems and Third-Party Supplier’s Networks.

Data Compromised: Customer contact details, Previous journey information
Brand Reputation Impact: potential risk due to follow-on phishing attacks
Identity Theft Risk: high (phishing attacks using compromised details)
Payment Information Risk: none (no bank/payment card data exposed)

Data Compromised: Names, Email addresses
Systems Affected: Customer Communication Database (Third-Party Supplier)
Operational Impact: None (Core services, including train operations and ticketing, remained unaffected)
Brand Reputation Impact: Potential (Customers warned of phishing risks)
Identity Theft Risk: Low (No sensitive financial or account data exposed)
Payment Information Risk: None

Data Compromised: Customer contact details (lner), Previous journey information (lner), Bank/payroll details (dentsu employees), Salary information (dentsu employees), National insurance numbers (dentsu employees), Personal contact details (dentsu employees/clients)
Systems Affected: Merkle’s network (Dentsu subsidiary)
Downtime: Some systems taken offline as a precaution (Merkle)
Operational Impact: Temporary pause of some LNER customer communicationsOngoing investigation and notifications
Brand Reputation Impact: Potential reputational damage to Dentsu, LNER, and Merkle due to third-party breach and exposure of sensitive employee/client data
Identity Theft Risk: High (for Dentsu employees due to exposed PII and financial details)
Payment Information Risk: None (explicitly confirmed by LNER for their customers)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Contact Details, Previous Journey Information, , Personal Information, , Personally Identifiable Information (Pii), Financial Data (Dentsu Employees Only), Customer Contact Details, Journey History (Lner) and .

Entity Name: London North Eastern Railway (LNER)
Entity Type: government-owned rail operator
Industry: transportation (rail)
Location: United Kingdom

Entity Name: London North Eastern Railway (LNER)
Entity Type: Train Operator
Industry: Transportation
Location: United Kingdom
Customers Affected: Thousands

Entity Name: Unnamed Third-Party Supplier
Entity Type: Service Provider
Industry: IT/Customer Communications

Entity Name: Dentsu (Merkle)
Entity Type: Advertising/Media Network
Industry: Marketing & Advertising
Location: Global (Japanese-owned)
Customers Affected: Current/former employees and some clients

Entity Name: London North Eastern Railway (LNER)
Entity Type: Railway Operator
Industry: Transportation
Location: United Kingdom
Customers Affected: Undisclosed number (contact details and journey info exposed)

Remediation Measures: customer advisory on phishing risks
Communication Strategy: public disclosurecustomer warning about unsolicited communications

Incident Response Plan Activated: True
Third Party Assistance: Independent Security Experts (Engaged By Supplier).
Remediation Measures: Enhanced Security Controls (Implemented by Supplier)
Communication Strategy: Customer Email NotificationDedicated Mailbox for QueriesMedia Statements

Incident Response Plan Activated: True
Third Party Assistance: Cybersecurity Firm (Unnamed), Experian Identity Plus (For Employee Monitoring).
Containment Measures: Systems taken offlineIncident response protocols initiated
Recovery Measures: Systems brought back online (Merkle)
Communication Strategy: Press release by LNER (September 2023)Direct notifications to affected Dentsu employees (October 2023)Media alerts to LNER customersPublic statements reassuring no financial/password data was exposed
Enhanced Monitoring: Credit/dark-web monitoring for Dentsu employees (Experian)
Third-Party Assistance: The company involves third-party assistance in incident response through Independent Security Experts (Engaged by Supplier), , Cybersecurity firm (unnamed), Experian Identity Plus (for employee monitoring), .

Type of Data Compromised: Customer contact details, Previous journey information
Sensitivity of Data: moderate (potential for phishing but no financial/password data)
Data Exfiltration: yes
Personally Identifiable Information: yes (contact details)

Type of Data Compromised: Personal information
Number of Records Exposed: Thousands
Sensitivity of Data: Low (Names and email addresses only)
Personally Identifiable Information: NamesEmail Addresses

Type of Data Compromised: Personally identifiable information (pii), Financial data (dentsu employees only), Customer contact details, Journey history (lner)
Sensitivity of Data: High (includes National Insurance numbers, bank/payroll details, and salary info for Dentsu employees)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: customer advisory on phishing risks, , Enhanced Security Controls (Implemented by Supplier), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by systems taken offline, incident response protocols initiated and .

Data Exfiltration: True

Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Systems brought back online (Merkle), .

Regulations Violated: UK GDPR (Potential),
Regulatory Notifications: Information Commissioner’s Office (ICO)National Cyber Security Centre (NCSC)British Transport Police (BTP)Department for Transport

Regulatory Notifications: Notifications sent in accordance with applicable law (unspecified)

Lessons Learned: Third-party suppliers pose significant risks to data security., Regular tabletop exercises and data discovery are critical to understanding data flows and protection measures., End users should harden identities with threat detection systems to mitigate risks from stolen information.

Recommendations: Businesses should conduct regular audits of third-party suppliers handling sensitive data., Implement identity threat detection and response systems for end users., Customers should remain vigilant against phishing attempts and practice good password hygiene.Businesses should conduct regular audits of third-party suppliers handling sensitive data., Implement identity threat detection and response systems for end users., Customers should remain vigilant against phishing attempts and practice good password hygiene.Businesses should conduct regular audits of third-party suppliers handling sensitive data., Implement identity threat detection and response systems for end users., Customers should remain vigilant against phishing attempts and practice good password hygiene.

Recommendations: Customers advised to remain vigilant against phishing/scams, Regular password changes recommended, LNER will never request passwords via emailCustomers advised to remain vigilant against phishing/scams, Regular password changes recommended, LNER will never request passwords via emailCustomers advised to remain vigilant against phishing/scams, Regular password changes recommended, LNER will never request passwords via email
Key Lessons Learned: The key lessons learned from past incidents are Third-party suppliers pose significant risks to data security.,Regular tabletop exercises and data discovery are critical to understanding data flows and protection measures.,End users should harden identities with threat detection systems to mitigate risks from stolen information.

Source: Infosecurity Magazine

Source: LNER Public Disclosure

Source: Huntress Security Analysis (Michael Tigges)

Source: UK Security Minister Dan Jarvis Speech

Source: Daily Mail

Source: Campaign (Marketing/Advertising News)

Source: Dentsu Employee Email Notification
Date Accessed: 2023-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Infosecurity Magazine, and Source: LNER Public Disclosure, and Source: Huntress Security Analysis (Michael Tigges), and Source: UK Security Minister Dan Jarvis Speech, and Source: Daily Mail, and Source: Campaign (Marketing/Advertising News), and Source: LNER Press ReleaseDate Accessed: 2023-09, and Source: Dentsu Employee Email NotificationDate Accessed: 2023-10.

Investigation Status: ongoing (no resolution details provided)

Investigation Status: Ongoing (Supplier engaged independent security experts)

Investigation Status: Ongoing (as of October 2023)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure, Customer Warning About Unsolicited Communications, Customer Email Notification, Dedicated Mailbox For Queries, Media Statements, Press Release By Lner (September 2023), Direct Notifications To Affected Dentsu Employees (October 2023), Media Alerts To Lner Customers and Public Statements Reassuring No Financial/Password Data Was Exposed.

Stakeholder Advisories: Warning About Phishing Risks, No Password Reset Required But Advised To Maintain Secure Passwords.
Customer Advisories: Be cautious of unsolicited communications asking for personal information.Do not respond to suspicious messages.Regularly change passwords as a best practice.

Stakeholder Advisories: Email To Customers, Media Statements.
Customer Advisories: Warning about phishing/scamsDedicated mailbox for queries ([email protected] for media, unspecified for LNER)Password security recommendations

Stakeholder Advisories: Lner Customers Advised To Be Cautious Of Unsolicited Communications, Dentsu Employees Offered Credit/Dark-Web Monitoring.
Customer Advisories: LNER warned customers about phishing risksConfirmed no financial/password data was exposed
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Warning About Phishing Risks, No Password Reset Required But Advised To Maintain Secure Passwords, Be Cautious Of Unsolicited Communications Asking For Personal Information., Do Not Respond To Suspicious Messages., Regularly Change Passwords As A Best Practice., , Email To Customers, Media Statements, Warning About Phishing/Scams, Dedicated Mailbox For Queries ([email protected] For Media, Unspecified For Lner), Password Security Recommendations, , Lner Customers Advised To Be Cautious Of Unsolicited Communications, Dentsu Employees Offered Credit/Dark-Web Monitoring, Lner Warned Customers About Phishing Risks, Confirmed No Financial/Password Data Was Exposed and .

Entry Point: third-party supplier systems
High Value Targets: Customer Contact Details, Journey Information,
Data Sold on Dark Web: Customer Contact Details, Journey Information,

Entry Point: Third-Party Supplier’s Networks
High Value Targets: Customer Communication Database,
Data Sold on Dark Web: Customer Communication Database,

High Value Targets: Employee Financial Data (Dentsu), Client/Customer Data (Lner),
Data Sold on Dark Web: Employee Financial Data (Dentsu), Client/Customer Data (Lner),

Root Causes: Third-Party Supplier Security Vulnerability,

Corrective Actions: Enhanced Security Controls By Supplier,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Independent Security Experts (Engaged By Supplier), , , Cybersecurity Firm (Unnamed), Experian Identity Plus (For Employee Monitoring), , Credit/Dark-Web Monitoring For Dentsu Employees (Experian), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security Controls By Supplier, .
Last Attacking Group: The attacking group in the last incident was an unauthorized third party.
Most Recent Incident Detected: The most recent incident detected was on 2025-09-08.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-09.
Most Significant Data Compromised: The most significant data compromised in an incident were customer contact details, previous journey information, , Names, Email Addresses, , Customer contact details (LNER), Previous journey information (LNER), Bank/payroll details (Dentsu employees), Salary information (Dentsu employees), National Insurance numbers (Dentsu employees), Personal contact details (Dentsu employees/clients) and .
Most Significant System Affected: The most significant system affected in an incident was Customer Communication Database (Third-Party Supplier) and Merkle’s network (Dentsu subsidiary).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was independent security experts (engaged by supplier), , cybersecurity firm (unnamed), experian identity plus (for employee monitoring), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Systems taken offlineIncident response protocols initiated.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal contact details (Dentsu employees/clients), customer contact details, Email Addresses, Customer contact details (LNER), Salary information (Dentsu employees), Names, Previous journey information (LNER), previous journey information, Bank/payroll details (Dentsu employees) and National Insurance numbers (Dentsu employees).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was End users should harden identities with threat detection systems to mitigate risks from stolen information.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Regular password changes recommended, Implement identity threat detection and response systems for end users., Customers advised to remain vigilant against phishing/scams, Customers should remain vigilant against phishing attempts and practice good password hygiene., Businesses should conduct regular audits of third-party suppliers handling sensitive data. and LNER will never request passwords via email.
Most Recent Source: The most recent source of information about an incident are Daily Mail, Huntress Security Analysis (Michael Tigges), UK Security Minister Dan Jarvis Speech, Campaign (Marketing/Advertising News), LNER Press Release, Dentsu Employee Email Notification, LNER Public Disclosure and Infosecurity Magazine.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (no resolution details provided).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was warning about phishing risks, no password reset required but advised to maintain secure passwords, Email to Customers, Media Statements, LNER customers advised to be cautious of unsolicited communications, Dentsu employees offered credit/dark-web monitoring, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Be cautious of unsolicited communications asking for personal information.Do not respond to suspicious messages.Regularly change passwords as a best practice., Warning about phishing/scamsDedicated mailbox for queries ([email protected] for media, unspecified for LNER)Password security recommendations and LNER warned customers about phishing risksConfirmed no financial/password data was exposed.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an third-party supplier systems and Third-Party Supplier’s Networks.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.