Company Details
23,908
33,387,235
5112
linkedin.com
34
LIN_3207977
Completed


LinkedIn Vendor Cyber Rating & Cyber Score
linkedin.comFounded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business model with revenue coming from Talent Solutions, Marketing Solutions, Sales Solutions and Premium Subscriptions products. Headquartered in Silicon Valley, LinkedIn has offices across the globe.
Company Details
23,908
33,387,235
5112
linkedin.com
34
LIN_3207977
Completed
Between 750 and 799

LinkedIn Global Score (TPRM)XXXX

Description: LinkedIn Faces Data Scraping Incident Exposing User Information A recent data scraping incident has exposed publicly available LinkedIn user profiles, raising concerns over privacy and unauthorized data collection. The breach, detected in early 2024, involved third-party actors extracting profile information including names, job titles, workplace details, and contact data from millions of accounts. The incident highlights the risks of large-scale data scraping, where automated tools harvest publicly accessible information without direct platform compromise. While LinkedIn’s systems were not breached, the extracted data could be used for phishing, social engineering, or targeted advertising. The company has acknowledged the activity but emphasized that no private or sensitive data (such as passwords or financial information) was accessed. This event follows similar scraping incidents in recent years, underscoring the challenges platforms face in balancing open access with user privacy. LinkedIn has implemented measures to detect and mitigate scraping attempts, though the long-term effectiveness of such protections remains under scrutiny. The exposed data’s potential misuse continues to pose risks for individuals and organizations.
Description: FIN6 Exploits Cloud Infrastructure in Sophisticated HR-Targeted Phishing Campaign The financially motivated cybercrime group FIN6 (also known as *Skeleton Spider*) is leveraging fake job applications and trusted cloud services to target human resources (HR) professionals in a highly evasive social engineering campaign. Researchers at DomainTools uncovered the operation, which combines professional networking platforms like LinkedIn and Indeed with malware-hosted cloud infrastructure to bypass traditional security defenses. ### How the Attack Works 1. Initial Contact – Attackers pose as job seekers on professional platforms, engaging recruiters to build rapport before sending phishing emails with malicious links. 2. Fake Resume Sites – Domains mimicking real applicant names (e.g., *bobbyweisman[.]com*, *ryanberardi[.]com*) are registered via GoDaddy’s anonymous services and hosted on AWS EC2 or S3, blending into legitimate cloud traffic. 3. Sophisticated Evasion – The sites employ traffic filtering to distinguish targets from security researchers, checking IP reputation, geolocation, OS, and browser fingerprints. Only residential Windows users bypass CAPTCHA walls to receive malicious ZIP files containing the More_eggs backdoor. 4. Malware Deployment – More_eggs, a modular JavaScript backdoor, operates in memory to evade detection, enabling credential theft, command execution, and follow-on attacks, including ransomware deployment. ### Why HR is a Prime Target HR teams frequently interact with external contacts and handle unsolicited communications, making them vulnerable to social engineering. The campaign exploits this trust, using realistic job lures to bypass email filters and endpoint security. FIN6’s shift from point-of-sale (POS) breaches to enterprise ransomware underscores its evolution toward higher-value targets. ### Cloud Abuse & Detection Challenges Attackers favor AWS and other cloud platforms due to: - Low-cost setup (free-tier abuse or compromised billing accounts). - Trusted IP ranges that evade enterprise network filters. - Scalability for hosting malicious infrastructure. The campaign highlights gaps in perimeter-based security, as traditional defenses struggle to detect threats embedded in legitimate cloud services. Security teams are advised to monitor for unusual traffic patterns and suspicious file types linked to cloud-hosted malware. ### AWS Response & Broader Implications An AWS spokesperson stated the company enforces terms prohibiting illegal use and acts swiftly on abuse reports. However, the incident raises questions about balancing cloud accessibility with security controls, particularly as threat actors increasingly exploit trusted infrastructure. FIN6’s operation demonstrates how low-complexity phishing, when paired with cloud evasion techniques, can outmaneuver even advanced detection tools reinforcing the need for holistic security strategies that address both technical and human vulnerabilities.
Description: Multiple Cross-Site Scripting (XSS) vulnerabilities in the VMware NSX network virtualization platform could allow malicious actors to inject and execute harmful code. The security bulletin published on June 4, 2025, details three distinct vulnerabilities affecting VMware NSX Manager UI, gateway firewall, and router port components, with CVSS base scores ranging from 5.9 to 7.5. The vulnerabilities include a stored XSS flaw in NSX Manager UI, a stored XSS in gateway firewall response pages, and a stored XSS in router port configurations. VMware has released patches addressing all three vulnerabilities across affected product lines, emphasizing the need for immediate updates to mitigate the risk of privilege escalation and persistent XSS attacks.
Description: Lynda.com now LinkedIn Learning, was informing its consumers of a security breach. The firm claims that an unauthorised third party gained access to a database that contained user data. The company began informing its clientele that hackers had gained access to learning data, including attempted courses and contact information. The company's owner, LinkedIn, verified the issue and disclosed that, as a precaution, the passwords of 55,000 users had been reset. It is possible that 9.5 million users were affected in total. LinkedIn disclosed further steps to safeguard user accounts on Lynda.com in reaction to the data leak.
Description: LinkedIn suffered a data breach incident in 2016 which exposed the email addresses and passwords of 117 million users. Hackers broke into the network, stole a database of password hashes, and posted some 6.5 million account credentials on a Russian password forum for the world to see. LinkedIn’s Chief Information Security Officer Cory Scott took the safety and security of members’ accounts seriously and offered protection tools such as email challenges and dual factor authentication.
Description: The California Office of the Attorney General disclosed a data breach affecting LinkedIn Corporation in June 2016, stemming from an earlier 2012 incident that was rediscovered. The breach exposed 117 million user accounts, compromising email addresses, hashed passwords, and LinkedIn member IDs. Although passwords were invalidated for accounts created before 2012 as a mitigating measure, the incident highlighted significant vulnerabilities in LinkedIn’s historical security practices. The exposed data, while hashed, posed risks of credential stuffing, phishing, and unauthorized account access if decryption attempts succeeded. The breach did not involve financial or highly sensitive personal data (e.g., Social Security numbers), but the scale of exposed credentials one of the largest at the time undermined user trust and required widespread password resets. LinkedIn faced reputational damage and regulatory scrutiny, though no direct financial fraud or identity theft was reported as a direct consequence of this specific breach.


LinkedIn has 16.67% fewer incidents than the average of same-industry companies with at least one recorded incident.
LinkedIn has 14.53% fewer incidents than the average of all companies with at least one recorded incident.
LinkedIn reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
LinkedIn cyber incidents detection timeline including parent company and subsidiaries

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business model with revenue coming from Talent Solutions, Marketing Solutions, Sales Solutions and Premium Subscriptions products. Headquartered in Silicon Valley, LinkedIn has offices across the globe.


We're a global online visual communications platform on a mission to empower the world to design. Featuring a simple drag-and-drop user interface and a vast range of templates ranging from presentations, documents, websites, social media graphics, posters, apparel to videos, plus a huge library of f

We’re the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create
Baidu is a leading AI company with strong Internet foundation, driven by our mission to “make the complicated world simpler through technology”. Founded in 2000 as a search engine platform, we were an early adopter of artificial intelligence in 2010. Since then, we have established a full AI stack,
Instacart, the leading grocery technology company in North America, works with grocers and retailers to transform how people shop. The company partners with more than 1,500 national, regional, and local retail banners to facilitate online shopping, delivery and pickup services from more than 85,000

Just Eat Takeaway.com is a leading global online delivery marketplace, connecting consumers and restaurants through our platform in 16 countries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a
Synopsys is the leader in engineering solutions from silicon to systems, enabling customers to rapidly innovate AI-powered products. We deliver industry-leading silicon design, IP, simulation and analysis solutions, and design services. We partner closely with our customers across a wide range of
SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th
.png)
Share this story: Tags: cybersecurity · linkedin · recruitment. Categories:: Marketing Ethics. A PXA Stealer campaign that works through...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of LinkedIn is https://careers.linkedin.com.
According to Rankiteo, LinkedIn’s AI-generated cybersecurity score is 797, reflecting their Fair security posture.
According to Rankiteo, LinkedIn currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, LinkedIn has been affected by a supply chain cyber incident involving LinkedIn, with the incident ID LINAWS1766995316.
According to Rankiteo, LinkedIn is not certified under SOC 2 Type 1.
According to Rankiteo, LinkedIn does not hold a SOC 2 Type 2 certification.
According to Rankiteo, LinkedIn is not listed as GDPR compliant.
According to Rankiteo, LinkedIn does not currently maintain PCI DSS compliance.
According to Rankiteo, LinkedIn is not compliant with HIPAA regulations.
According to Rankiteo,LinkedIn is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
LinkedIn operates primarily in the Software Development industry.
LinkedIn employs approximately 23,908 people worldwide.
LinkedIn presently has no subsidiaries across any sectors.
LinkedIn’s official LinkedIn profile has approximately 33,387,235 followers.
LinkedIn is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, LinkedIn does not have a profile on Crunchbase.
Yes, LinkedIn maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/linkedin.
As of April 02, 2026, Rankiteo reports that LinkedIn has experienced 6 cybersecurity incidents.
LinkedIn has an estimated 29,309 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Vulnerability and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with offered protection tools such as email challenges and dual factor authentication, and remediation measures with passwords reset for 55,000 users, and communication strategy with informing customers about the breach, and remediation measures with patching, and law enforcement notified with yes (california office of the attorney general), and containment measures with passwords for accounts created before the 2012 breach were invalidated, and containment measures with aws trust & safety abuse reporting process, disabling prohibited content, and remediation measures with layered defenses, enhanced monitoring for unusual traffic patterns/file types, additional verification procedures for resume submissions, and enhanced monitoring with recommended (vigilance for unusual traffic patterns or file types), and containment measures with implemented measures to detect and mitigate scraping attempts, and communication strategy with acknowledged the activity and emphasized no private or sensitive data was accessed..
Title: LinkedIn Data Breach
Description: LinkedIn suffered a data breach incident in 2016 which exposed the email addresses and passwords of 117 million users. Hackers broke into the network, stole a database of password hashes, and posted some 6.5 million account credentials on a Russian password forum for the world to see.
Date Detected: 2016
Date Publicly Disclosed: 2016
Type: Data Breach
Attack Vector: Network Intrusion
Threat Actor: Unknown Hackers
Motivation: Data Theft
Title: Lynda.com Security Breach
Description: An unauthorized third party gained access to a database containing user data at Lynda.com, now LinkedIn Learning.
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Unauthorized Third Party
Title: Multiple Cross-Site Scripting (XSS) Vulnerabilities in VMware NSX
Description: Multiple Cross-Site Scripting (XSS) vulnerabilities in the VMware NSX network virtualization platform could allow malicious actors to inject and execute harmful code.
Date Detected: 2025-06-04
Date Publicly Disclosed: 2025-06-04
Type: Vulnerability
Attack Vector: Stored XSS
Vulnerability Exploited: CVE-2025-22243: Stored XSS Vulnerability in NSX Manager UICVE-2025-22244: Stored XSS in Gateway Firewall Response PagesCVE-2025-22245: Stored XSS in Router Port Configurations
Motivation: Privilege EscalationCredential TheftLateral Movement
Title: LinkedIn Data Breach (2016)
Description: The California Office of the Attorney General reported a data breach involving LinkedIn Corporation on June 2, 2016. The breach date was May 17, 2016, and it involved member email addresses, hashed passwords, and LinkedIn member IDs, all from a 2012 incident. Approximately 117 million accounts were potentially affected as passwords for accounts created before the 2012 breach were invalidated.
Date Detected: 2016-05-17
Date Publicly Disclosed: 2016-06-02
Type: Data Breach
Title: LinkedIn Data Scraping Incident Exposing User Information
Description: A recent data scraping incident has exposed publicly available LinkedIn user profiles, raising concerns over privacy and unauthorized data collection. The breach involved third-party actors extracting profile information including names, job titles, workplace details, and contact data from millions of accounts.
Date Detected: 2024-01-01
Date Publicly Disclosed: 2024-01-01
Type: Data Scraping
Attack Vector: Automated scraping tools
Vulnerability Exploited: Publicly accessible profile information
Threat Actor: Third-party actors
Motivation: PhishingSocial engineeringTargeted advertising
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through LinkedIn and Indeed (professional networking platforms).

Data Compromised: Email addresses and passwords

Data Compromised: Learning data, Contact information

Systems Affected: VMware NSX Manager UIGateway FirewallRouter Port Configurations

Data Compromised: Email addresses, Hashed passwords, Linkedin member ids
Brand Reputation Impact: Potential reputational damage due to exposure of 117 million accounts
Identity Theft Risk: High (due to exposure of email-password combinations)

Data Compromised: Names, job titles, workplace details, contact data
Brand Reputation Impact: Raised concerns over privacy and unauthorized data collection
Identity Theft Risk: Potential misuse for phishing or social engineering
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email addresses and passwords, Learning Data, Contact Information, , Email Addresses, Hashed Passwords, Linkedin Member Ids, , Credentials, personally identifiable information (PII), sensitive employee data and Publicly available profile information.

Entity Name: LinkedIn
Entity Type: Company
Industry: Social Media
Location: Global
Customers Affected: 117 million users

Entity Name: Lynda.com (LinkedIn Learning)
Entity Type: Online Learning Platform
Industry: Education Technology
Customers Affected: Potentially 9.5 million users

Entity Name: VMware
Entity Type: Organization
Industry: Technology

Entity Name: LinkedIn Corporation
Entity Type: Corporation
Industry: Technology / Social Networking
Location: California, USA
Customers Affected: 117 million

Entity Name: LinkedIn
Entity Type: Social Media Platform
Industry: Technology
Size: Large
Customers Affected: Millions of accounts

Remediation Measures: Offered protection tools such as email challenges and dual factor authentication

Remediation Measures: Passwords reset for 55,000 users
Communication Strategy: Informing customers about the breach

Remediation Measures: Patching

Law Enforcement Notified: Yes (California Office of the Attorney General)
Containment Measures: Passwords for accounts created before the 2012 breach were invalidated

Containment Measures: Implemented measures to detect and mitigate scraping attempts
Communication Strategy: Acknowledged the activity and emphasized no private or sensitive data was accessed

Type of Data Compromised: Email addresses and passwords
Number of Records Exposed: 117 million
Data Encryption: Password hashes
Personally Identifiable Information: Email addresses

Type of Data Compromised: Learning data, Contact information
Number of Records Exposed: Potentially 9.5 million users

Type of Data Compromised: Email addresses, Hashed passwords, Linkedin member ids
Number of Records Exposed: 117 million
Sensitivity of Data: Moderate to High (hashed passwords and email addresses)
Data Exfiltration: Yes
Data Encryption: Hashed (passwords)
Personally Identifiable Information: Yes (email addresses linked to member IDs)

Type of Data Compromised: Publicly available profile information
Number of Records Exposed: Millions
Sensitivity of Data: Low (publicly accessible)
Data Exfiltration: Extracted by third-party actors
Personally Identifiable Information: NamesJob titlesWorkplace detailsContact data
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Offered protection tools such as email challenges and dual factor authentication, Passwords reset for 55,000 users, , Patching, , Layered defenses, enhanced monitoring for unusual traffic patterns/file types, additional verification procedures for resume submissions.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by passwords for accounts created before the 2012 breach were invalidated, aws trust & safety abuse reporting process, disabling prohibited content and implemented measures to detect and mitigate scraping attempts.

Regulatory Notifications: California Office of the Attorney General

Lessons Learned: Challenges platforms face in balancing open access with user privacy

Recommendations: Immediately upgrade to the patched versions of VMware NSX
Key Lessons Learned: The key lessons learned from past incidents are Traditional perimeter security is insufficient against social engineering tactics. Organizations must adopt holistic security strategies that account for human factors alongside technological defenses. HR personnel are increasingly targeted due to their regular interaction with external contacts.Challenges platforms face in balancing open access with user privacy.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Use layered defenses (e.g., behavioral WAF, network segmentation) to detect and block malicious activity., Implement comprehensive training programs for HR personnel on phishing and social engineering risks., Maintain vigilance for cloud-hosted phishing sites using trusted IP ranges., Report abuse of cloud services (e.g., AWS) to platform providers for takedown., Adopt additional verification procedures for resume submissions and external communications., Enhance monitoring for unusual traffic patterns or file types (e.g. and ZIP files from unexpected sources)..

Source: VMware Security Bulletin

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: VMware Security Bulletin, and Source: California Office of the Attorney General, and Source: DomainTools Research, and Source: AWS Spokesperson Statement.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Informing Customers About The Breach and Acknowledged the activity and emphasized no private or sensitive data was accessed.

Customer Advisories: Informing customers about the breach
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Informing Customers About The Breach and .

Root Causes: Inadequate Input Sanitization, Privileged Access Requirements,
Corrective Actions: Patching,

Root Causes: Legacy data from 2012 breach resurfaced; inadequate long-term protection of hashed credentials

Root Causes: Automated scraping of publicly accessible data
Corrective Actions: Measures to detect and mitigate scraping attempts
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Recommended (vigilance for unusual traffic patterns or file types).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patching, , Implement Stricter Verification For External Communications (E.G., Resume Submissions)., Enhance Monitoring For Cloud-Hosted Phishing Sites Using Trusted Ip Ranges., Train Hr Personnel On Social Engineering Risks And Phishing Tactics., Adopt Layered Security Defenses (E.G., Behavioral Waf, Network Segmentation)., Collaborate With Cloud Providers To Report And Disable Abusive Content., , Measures to detect and mitigate scraping attempts.
Last Attacking Group: The attacking group in the last incident were an Unknown Hackers, Unauthorized Third Party, FIN6 (Skeleton Spider) and Third-party actors.
Most Recent Incident Detected: The most recent incident detected was on 2016.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-01-01.
Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses and passwords, Learning Data, Contact Information, , email addresses, hashed passwords, LinkedIn member IDs, , Credentials, sensitive employee data, system access, Names, job titles, workplace details and contact data.
Most Significant System Affected: The most significant system affected in an incident was VMware NSX Manager UIGateway FirewallRouter Port Configurations and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Passwords for accounts created before the 2012 breach were invalidated, AWS Trust & Safety abuse reporting process, disabling prohibited content and Implemented measures to detect and mitigate scraping attempts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were email addresses, Email addresses and passwords, Names, job titles, workplace details, contact data, LinkedIn member IDs, Contact Information, hashed passwords, Credentials, sensitive employee data, system access and Learning Data.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 243.5M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Traditional perimeter security is insufficient against social engineering tactics. Organizations must adopt holistic security strategies that account for human factors alongside technological defenses. HR personnel are increasingly targeted due to their regular interaction with external contacts., Challenges platforms face in balancing open access with user privacy.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Use layered defenses (e.g., behavioral WAF, network segmentation) to detect and block malicious activity., Implement comprehensive training programs for HR personnel on phishing and social engineering risks., Maintain vigilance for cloud-hosted phishing sites using trusted IP ranges., Adopt additional verification procedures for resume submissions and external communications., Immediately upgrade to the patched versions of VMware NSX, Report abuse of cloud services (e.g., AWS) to platform providers for takedown., Enhance monitoring for unusual traffic patterns or file types (e.g. and ZIP files from unexpected sources)..
Most Recent Source: The most recent source of information about an incident are California Office of the Attorney General, DomainTools Research, AWS Spokesperson Statement and VMware Security Bulletin.
Most Recent Customer Advisory: The most recent customer advisory issued was an Informing customers about the breach.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an LinkedIn and Indeed (professional networking platforms).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Inadequate input sanitizationPrivileged access requirements, Legacy data from 2012 breach resurfaced; inadequate long-term protection of hashed credentials, Exploitation of trust in professional networking platforms (LinkedIn/Indeed).Abuse of trusted cloud infrastructure (AWS EC2/S3) to host malicious content.Sophisticated traffic filtering to evade detection (IP reputation, geolocation, OS fingerprinting).Use of CAPTCHA to bypass automated security scanners.Lack of verification procedures for external communications in HR workflows., Automated scraping of publicly accessible data.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Patching, Implement stricter verification for external communications (e.g., resume submissions).Enhance monitoring for cloud-hosted phishing sites using trusted IP ranges.Train HR personnel on social engineering risks and phishing tactics.Adopt layered security defenses (e.g., behavioral WAF, network segmentation).Collaborate with cloud providers to report and disable abusive content., Measures to detect and mitigate scraping attempts.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.