Omnissa Workspace One UEM
Omnissa Workspace ONE Server-Side Request Forgery — Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with
Every confirmed data breach we've indexed across 4673+ incidents from healthcare, finance, technology, government, retail, and education. Sourced from Verizon DBIR, public disclosure feeds, and major security news outlets. Updated automatically.
Omnissa Workspace ONE Server-Side Request Forgery — Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability — SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on t
2.8M PC Optimum loyalty member records stolen including purchase history and contact data
Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach
Internal Slack messages and API usage metadata accessed — no customer prompts exposed
380K employee and defense contract records exposed via zero-day in Trend Micro product
290K employee records and mining operations data accessed via compromised contractor VPN
550K employee and defense program records from aviation division compromised
560K customer records accessed via compromised third-party payroll services provider
Storm-0558 successor group accessed email and calendar data from 25 enterprise tenants
1.6M customer pharmacy and loyalty records exposed via FTP server misconfiguration
Apple Multiple Products Integer Overflow or Wraparound Vulnerability — Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted we
Apple iOS and iPadOS Use-After-Free Vulnerability — Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.
Apple Multiple products Use-After-Free Vulnerability — Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory cor
1.1M flybuys loyalty member records stolen via compromised marketing platform
Hikvision Multiple Products Improper Authentication Vulnerability — Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and
A global operation has resulted in the takedown of popular cybercrime forum LeakBase
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability — Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to
1.8M dialysis patient records compromised in ransomware attack on kidney care provider
280K semiconductor client records compromised
280K patient records stolen in network intrusion
1.3M guest reservation records exposed via compromised property management vendor
2.7M member records exposed via compromised claims analytics vendor
Broadcom VMware Aria Operations Command Injection Vulnerability — Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated at