ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Wayne Memorial Hospital is a nonprofit community hospital operated by the Wayne County Hospital Authority, whose only remuneration is the feeling that they have provided a service to the community. They are dedicated to providing the best possible care available at the lowest cost to the consumer. Our success comes from our efficient, well-organized facility, our state-of-the-art, advanced equipment, our professional and caring staff, and our committed, skilled physicians. We delight in offering every patient “Big City Technology with Small Hometown Care”. When you need services you can trust at a facility near home, Wayne Memorial Hospital is just what the doctor ordered. Our Mission: Wayne Memorial Hospital is committed to providing high quality healthcare to all patients.

Wayne Memorial Hospital A.I CyberSecurity Scoring

WMH

Company Details

Linkedin ID:

wayne-memorial-hospital-wmh

Employees number:

154

Number of followers:

439

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

wmhweb.com

IP Addresses:

1

Company ID:

WAY_1966168

Scan Status:

Completed

AI scoreWMH Risk Score (AI oriented)

Between 550 and 599

https://images.rankiteo.com/companyimages/wayne-memorial-hospital-wmh.jpeg
WMH Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWMH Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/wayne-memorial-hospital-wmh.jpeg
WMH Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

WMH Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Wayne Memorial HospitalRansomware10056/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Wayne Memorial Hospital in Jesup, Georgia, suffered a **ransomware attack** in **May-June 2024**, orchestrated by the **Monti ransomware gang**. The breach compromised **163,440 individuals'** highly sensitive data, including **Social Security numbers, financial account details (credit/debit cards, CVV codes), medical histories (diagnoses, treatments, prescriptions, lab results), health insurance numbers, state-issued IDs, and login credentials**. Initially, only **2,500 victims** were notified in August 2024, but the figure was later revised to over **160,000**. The attackers **encrypted hospital data** and threatened to leak stolen information by **July 8, 2024**, though the hospital neither confirmed the leak nor disclosed ransom payments. The breach exposed **patient and financial records**, posing severe risks of **identity theft, fraud, and medical data exploitation**. The hospital offered **12 months of credit monitoring** but faced criticism for the **delayed notification** (over a year post-breach). The attack disrupted operations, though the full extent of system downtime remains undisclosed. Monti, a successor to the Conti gang, is known for **double extortion (data theft + encryption)** and has previously targeted healthcare providers, including **Excelsior Orthopedics (394,752 victims)** and **ASL Italy (month-long disruption)**.

Wayne Memorial HospitalRansomware10057/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Wayne Memorial Hospital in Pennsylvania fell victim to a significant cyber attack by the Monti ransomware gang. This group, known for its criminal activities and ties to the now-defunct Conti ransomware gang, has claimed the theft of sensitive data and threatened its release. This attack has put the hospital's operations and patient privacy at great risk, affecting critical healthcare infrastructure. With medical care possibly being delayed and the hospital's reputation at stake, this incident highlights the ongoing threat cybersecurity incidents pose to the healthcare industry.

Wayne Memorial Hospital
Ransomware
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Wayne Memorial Hospital in Jesup, Georgia, suffered a **ransomware attack** in **May-June 2024**, orchestrated by the **Monti ransomware gang**. The breach compromised **163,440 individuals'** highly sensitive data, including **Social Security numbers, financial account details (credit/debit cards, CVV codes), medical histories (diagnoses, treatments, prescriptions, lab results), health insurance numbers, state-issued IDs, and login credentials**. Initially, only **2,500 victims** were notified in August 2024, but the figure was later revised to over **160,000**. The attackers **encrypted hospital data** and threatened to leak stolen information by **July 8, 2024**, though the hospital neither confirmed the leak nor disclosed ransom payments. The breach exposed **patient and financial records**, posing severe risks of **identity theft, fraud, and medical data exploitation**. The hospital offered **12 months of credit monitoring** but faced criticism for the **delayed notification** (over a year post-breach). The attack disrupted operations, though the full extent of system downtime remains undisclosed. Monti, a successor to the Conti gang, is known for **double extortion (data theft + encryption)** and has previously targeted healthcare providers, including **Excelsior Orthopedics (394,752 victims)** and **ASL Italy (month-long disruption)**.

Wayne Memorial Hospital
Ransomware
Severity: 100
Impact: 5
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Wayne Memorial Hospital in Pennsylvania fell victim to a significant cyber attack by the Monti ransomware gang. This group, known for its criminal activities and ties to the now-defunct Conti ransomware gang, has claimed the theft of sensitive data and threatened its release. This attack has put the hospital's operations and patient privacy at great risk, affecting critical healthcare infrastructure. With medical care possibly being delayed and the hospital's reputation at stake, this incident highlights the ongoing threat cybersecurity incidents pose to the healthcare industry.

Ailogo

WMH Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for WMH

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Wayne Memorial Hospital in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Wayne Memorial Hospital in 2025.

Incident Types WMH vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Wayne Memorial Hospital in 2025.

Incident History — WMH (X = Date, Y = Severity)

WMH cyber incidents detection timeline including parent company and subsidiaries

WMH Company Subsidiaries

SubsidiaryImage

Wayne Memorial Hospital is a nonprofit community hospital operated by the Wayne County Hospital Authority, whose only remuneration is the feeling that they have provided a service to the community. They are dedicated to providing the best possible care available at the lowest cost to the consumer. Our success comes from our efficient, well-organized facility, our state-of-the-art, advanced equipment, our professional and caring staff, and our committed, skilled physicians. We delight in offering every patient “Big City Technology with Small Hometown Care”. When you need services you can trust at a facility near home, Wayne Memorial Hospital is just what the doctor ordered. Our Mission: Wayne Memorial Hospital is committed to providing high quality healthcare to all patients.

Loading...
similarCompanies

WMH Similar Companies

DaVita Kidney Care

DaVita means “to give life,” reflecting our proud history as leaders in dialysis—an essential, life-sustaining treatment for those living with end stage kidney disease (ESKD). Today, our mission is to minimize the devastating impacts of kidney disease across the full spectrum of kidney health care.

HCA Healthcare

HCA Healthcare is dedicated to giving people a healthier tomorrow. As one of the nation’s leading providers of healthcare services, HCA Healthcare is comprised of 188 hospitals and 2,400+ sites of care in 20 states and the United Kingdom. In addition to hospitals, sites of care include surgery cen

Yeditepe University Hospital

Университет Едитепе был основан фондом ISTEK в 1996 году. 1. Стоматологическая клиника Университета Йедитепе, 1996 г. 2. Больница Козьятаги Университета Едитепе в 2005 г. 3. Поликлиника Багдат Каддеси Университета Едитепе, 2006 г. 4. Глазной центр Университета Йедитепе, 2007 г. 5. Центр генетическо

Corewell Health

People are at the heart of everything we do, and the inspiration for our legacy of outstanding outcomes, innovation, strong community partnerships, philanthropy and transparency. Corewell Health is a not-for-profit health system that provides health care and coverage with an exceptional team of 65,0

Abbott

Abbott is a global healthcare leader that helps people live more fully at all stages of life. Our portfolio of life-changing technologies spans the spectrum of healthcare, with leading businesses and products in diagnostics, medical devices, nutritional and branded generic medicines. Our 114,000 col

Memorial Sloan Kettering Cancer Center

The people of Memorial Sloan Kettering Cancer Center (MSK) are united by a singular mission: ending cancer for life. Our specialized care teams provide personalized, compassionate, expert care to patients of all ages. Informed by basic research done at our Sloan Kettering Institute, scientists acros

Children's Healthcare of Atlanta

For more than 100 years, Children’s Healthcare of Atlanta has depended on clinical and nonclinical employees to help make kids better today and healthier tomorrow. Consistently ranked as one of the leading pediatric healthcare systems in the country by U.S. News & World Report, Children’s is the onl

Cedars-Sinai

Since its beginning in 1902, Cedars-Sinai has evolved to meet the healthcare needs of one of the most diverse regions in the nation, continually setting new standards for quality and innovation in patient care, research, teaching and community service. Today, Cedars-Sinai is widely known for its na

Cleveland Clinic

Cleveland Clinic, located in Cleveland, Ohio, is a not-for-profit, multispecialty academic medical center that integrates clinical and hospital care with research and education. Founded in 1921 by four renowned physicians with a vision of providing outstanding patient care based upon the principl

newsone

WMH CyberSecurity News

September 22, 2025 12:42 PM
It’s Spirit Week at the Wayne County Schools

With this Friday being Homecoming each campus at Wayne County Schools are having various fun activities. Here's a look at the schedule for the High School...

September 11, 2025 07:00 AM
News - Georgia’s Wayne Memorial Hospital Reports Data Breach Affecting Over 160,000 People

Wayne Memorial Hospital, a healthcare provider based in Georgia, reported that a data security breach last year exposed the sensitive...

September 10, 2025 07:00 AM
Georgia Hospital Notifies 160K Individuals of Breach 1 Year After Incident

Wayne Memorial Hospital in Jesup, Georgia, experienced a data breach on May 30, 2024, but notified affected consumers on August 27, 2025,...

September 10, 2025 07:00 AM
Wayne Memorial Hospital Data Breach Investigation

If you were affected by the Wayne Memorial Hospital data breach, you may be entitled to compensation.

September 09, 2025 07:00 AM
Wayne Memorial Hospital Notifies 163,000 Patients About May 2024 Ransomware Attack

Wayne Memorial Hospital patients have recently been notified that some of their protected health information was stolen by a ransomware...

September 08, 2025 07:00 AM
Wayne Memorial Breach Affects 163,440 Patients

Data breach at Wayne Memorial Hospital affects 163440 people, exposing sensitive personal and health information.

August 19, 2025 07:00 AM
50K people in Middletown crippled after 'cybersecurity incident'

One of the larger cities in the Tri-State was crippled due to what it's calling a "Cyber-security incident."

October 04, 2024 07:00 AM
Wayne County Cyberattack Forces the Shut Down of Government Services

Wayne County, Michigan, is grappling with a significant cyberattack that has disrupted government services and taken county websites...

October 03, 2024 07:00 AM
Detroit-area government services impacted by cyberattack

Wayne County, Michigan is dealing with a cyberattack that has shut down all government websites and limited the operations of several offices.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

WMH CyberSecurity History Information

Official Website of Wayne Memorial Hospital

The official website of Wayne Memorial Hospital is https://wmhweb.com.

Wayne Memorial Hospital’s AI-Generated Cybersecurity Score

According to Rankiteo, Wayne Memorial Hospital’s AI-generated cybersecurity score is 578, reflecting their Very Poor security posture.

How many security badges does Wayne Memorial Hospital’ have ?

According to Rankiteo, Wayne Memorial Hospital currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Wayne Memorial Hospital have SOC 2 Type 1 certification ?

According to Rankiteo, Wayne Memorial Hospital is not certified under SOC 2 Type 1.

Does Wayne Memorial Hospital have SOC 2 Type 2 certification ?

According to Rankiteo, Wayne Memorial Hospital does not hold a SOC 2 Type 2 certification.

Does Wayne Memorial Hospital comply with GDPR ?

According to Rankiteo, Wayne Memorial Hospital is not listed as GDPR compliant.

Does Wayne Memorial Hospital have PCI DSS certification ?

According to Rankiteo, Wayne Memorial Hospital does not currently maintain PCI DSS compliance.

Does Wayne Memorial Hospital comply with HIPAA ?

According to Rankiteo, Wayne Memorial Hospital is not compliant with HIPAA regulations.

Does Wayne Memorial Hospital have ISO 27001 certification ?

According to Rankiteo,Wayne Memorial Hospital is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Wayne Memorial Hospital

Wayne Memorial Hospital operates primarily in the Hospitals and Health Care industry.

Number of Employees at Wayne Memorial Hospital

Wayne Memorial Hospital employs approximately 154 people worldwide.

Subsidiaries Owned by Wayne Memorial Hospital

Wayne Memorial Hospital presently has no subsidiaries across any sectors.

Wayne Memorial Hospital’s LinkedIn Followers

Wayne Memorial Hospital’s official LinkedIn profile has approximately 439 followers.

NAICS Classification of Wayne Memorial Hospital

Wayne Memorial Hospital is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Wayne Memorial Hospital’s Presence on Crunchbase

No, Wayne Memorial Hospital does not have a profile on Crunchbase.

Wayne Memorial Hospital’s Presence on LinkedIn

Yes, Wayne Memorial Hospital maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wayne-memorial-hospital-wmh.

Cybersecurity Incidents Involving Wayne Memorial Hospital

As of December 03, 2025, Rankiteo reports that Wayne Memorial Hospital has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Wayne Memorial Hospital has an estimated 30,306 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Wayne Memorial Hospital ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

How does Wayne Memorial Hospital detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (forensic investigation conducted), and third party assistance with cyberscout (for fraud assistance and credit monitoring), and communication strategy with public notification and victim letters with enrollment deadline for credit monitoring..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Wayne Memorial Hospital Ransomware Attack

Description: Wayne Memorial Hospital in Pennsylvania fell victim to a significant cyber attack by the Monti ransomware gang. This group, known for its criminal activities and ties to the now-defunct Conti ransomware gang, has claimed the theft of sensitive data and threatened its release. This attack has put the hospital's operations and patient privacy at great risk, affecting critical healthcare infrastructure. With medical care possibly being delayed and the hospital's reputation at stake, this incident highlights the ongoing threat cybersecurity incidents pose to the healthcare industry.

Type: Ransomware

Threat Actor: Monti ransomware gang

Motivation: Financial gain and data theft

Incident : Data Breach

Title: Wayne Memorial Hospital Data Breach and Ransomware Attack

Description: Wayne Memorial Hospital in Jesup, GA confirmed a May 2024 data breach that compromised personal and medical information of 163,440 individuals. The ransomware gang Monti claimed responsibility and threatened to leak stolen data by July 8, 2024. The hospital detected the ransomware event on June 3, 2024, with unauthorized access occurring between May 30, 2024, and June 3, 2024. The hospital is offering 12 months of free fraud assistance and credit monitoring to victims.

Date Detected: 2024-06-03

Date Publicly Disclosed: 2024-08-01

Type: Data Breach

Threat Actor: Monti

Motivation: Financial (Ransom)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware WAY448070624

Data Compromised: Sensitive data

Operational Impact: Medical care possibly delayedHospital's reputation at stake

Brand Reputation Impact: Hospital's reputation at stake

Incident : Data Breach WAY0092700090825

Data Compromised: Names, Social security numbers, User ids and passwords, Financial account numbers, Credit and debit card numbers (including expiration dates and cvv codes), Medical history, Diagnoses, Treatments, Prescriptions, Lab test results and images, Health insurance, medicare, and medicaid numbers, Healthcare provider numbers, State-issued id numbers (e.g., driver’s license), Dates of birth

Systems Affected: Limited number of WMH systems

Brand Reputation Impact: High (due to sensitive data exposure and delayed notification)

Identity Theft Risk: High

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive data, Personally Identifiable Information (Pii), Protected Health Information (Phi), Financial Information, Authentication Credentials and .

Which entities were affected by each incident ?

Incident : Ransomware WAY448070624

Entity Name: Wayne Memorial Hospital

Entity Type: Healthcare

Industry: Healthcare

Location: Pennsylvania

Incident : Data Breach WAY0092700090825

Entity Name: Wayne Memorial Hospital

Entity Type: Hospital

Industry: Healthcare

Location: Jesup, GA, USA

Size: 84 beds, 500 employees

Customers Affected: 163,440

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach WAY0092700090825

Incident Response Plan Activated: Yes (forensic investigation conducted)

Third Party Assistance: CyberScout (for fraud assistance and credit monitoring)

Communication Strategy: Public notification and victim letters with enrollment deadline for credit monitoring

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes (forensic investigation conducted).

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through CyberScout (for fraud assistance and credit monitoring).

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware WAY448070624

Type of Data Compromised: Sensitive data

Incident : Data Breach WAY0092700090825

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Financial information, Authentication credentials

Number of Records Exposed: 163,440

Sensitivity of Data: High

Data Exfiltration: Yes (claimed by Monti, but not confirmed by hospital)

Data Encryption: Yes (ransomware encrypted some data)

Personally Identifiable Information: Yes

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware WAY448070624

Ransomware Strain: Monti

Data Exfiltration: True

Incident : Data Breach WAY0092700090825

Ransomware Strain: Monti

Data Encryption: Yes

Data Exfiltration: Claimed by Monti

References

Where can I find more information about each incident ?

Incident : Data Breach WAY0092700090825

Source: Comparitech

Incident : Data Breach WAY0092700090825

Source: Wayne Memorial Hospital Notice to Victims

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Comparitech, and Source: Wayne Memorial Hospital Notice to Victims.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach WAY0092700090825

Investigation Status: Ongoing (forensic investigation completed, but details not fully disclosed)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public notification and victim letters with enrollment deadline for credit monitoring.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach WAY0092700090825

Customer Advisories: 12 months of free fraud assistance and credit monitoring through CyberScout (enrollment deadline: 90 days from notice receipt)

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was 12 months of free fraud assistance and credit monitoring through CyberScout (enrollment deadline: 90 days from notice receipt).

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as CyberScout (for fraud assistance and credit monitoring).

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Monti ransomware gang and Monti.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-06-03.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-08-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Sensitive data, , Names, Social Security numbers, User IDs and passwords, Financial account numbers, Credit and debit card numbers (including expiration dates and CVV codes), Medical history, Diagnoses, Treatments, Prescriptions, Lab test results and images, Health insurance, Medicare, and Medicaid numbers, Healthcare provider numbers, State-issued ID numbers (e.g., driver’s license), Dates of birth and .

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was CyberScout (for fraud assistance and credit monitoring).

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, Lab test results and images, Treatments, Prescriptions, User IDs and passwords, Dates of birth, Financial account numbers, Sensitive data, Names, Diagnoses, Healthcare provider numbers, State-issued ID numbers (e.g., driver’s license), Health insurance, Medicare, and Medicaid numbers, Credit and debit card numbers (including expiration dates and CVV codes) and Medical history.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 163.4K.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Comparitech and Wayne Memorial Hospital Notice to Victims.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (forensic investigation completed, but details not fully disclosed).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an 12 months of free fraud assistance and credit monitoring through CyberScout (enrollment deadline: 90 days from notice receipt).

cve

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=wayne-memorial-hospital-wmh' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge