n8n n8n
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability — n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for
SaaS platforms, cloud providers, developer tooling, and app-layer infrastructure are concentrated attack surfaces. One tech vendor breach can expose thousands of downstream customers. Below is every tech-sector breach LeakTrace has indexed.
n8n Improper Control of Dynamically-Managed Code Resources Vulnerability — n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for
Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks
Contractor laptop with cached Gotham deployment configs and access tokens compromised
Omnissa Workspace ONE Server-Side Request Forgery — Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with
Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability — Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticat
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability — SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on t
380K employee and defense contract records exposed via zero-day in Trend Micro product
Internal Slack messages and API usage metadata accessed — no customer prompts exposed
Storm-0558 successor group accessed email and calendar data from 25 enterprise tenants
Hikvision Multiple Products Improper Authentication Vulnerability — Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and
Apple Multiple Products Integer Overflow or Wraparound Vulnerability — Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted we
280K semiconductor client records compromised
Rockwell Multiple Products Insufficient Protected Credentials Vulnerability — Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to
Apple Multiple products Use-After-Free Vulnerability — Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory cor
Apple iOS and iPadOS Use-After-Free Vulnerability — Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.
712,904 records exposed — Email addresses, Usernames
Broadcom VMware Aria Operations Command Injection Vulnerability — Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated at
Qualcomm Multiple Chipsets Memory Corruption Vulnerability — Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation.
495,556 records exposed — Display names, Email addresses, Profile photos
22,874 records exposed — Email addresses, Partial dates of birth, Usernames
1,060,191 records exposed — AI prompts, Email addresses, Forum posts, Names
2.1M workspace messages and uploaded files exfiltrated from compromised enterprise workspace
Employee and partner data exposed in warehouse management system breach