
Verizon Business
You’re more than a business, agency or organization leader. We’re more than the usual network that provides reliable coverage. Together, we can empower you and your people.



You’re more than a business, agency or organization leader. We’re more than the usual network that provides reliable coverage. Together, we can empower you and your people.

LexisNexis Legal & Professional is a leading global provider of legal, regulatory and business information and analytics that help customers increase productivity, improve decision-making and outcomes, and advance the rule of law around the world. We help lawyers win cases, manage their work more efficiently, serve their clients better and grow their practices. We assist corporations in better understanding their markets, monitoring their brands and competition, and in mitigating business risk. We collaborate with universities to educate students, and we support nation-building with governments and courts by making laws accessible and strengthening legal infrastructures. We partner with leading global associations and customers to collect evidence against war criminals and provide tools to combat human trafficking. LexisNexis Legal & Professional, which serves customers in more than 130 countries with 10,000 employees worldwide, is part of RELX Group, a global provider of information and analytics for professional and business customers across industries.
Security & Compliance Standards Overview












No incidents recorded for Verizon Business in 2025.
No incidents recorded for LexisNexis in 2025.
Verizon Business cyber incidents detection timeline including parent company and subsidiaries
LexisNexis cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).