[email protected] +44 (0)208 123 7708
Proteus-Cyber Nextgen Data Privacy

Proteus-Cyber
Data Privacy Software

  • Home
  • Solutions
      Proteus®NextGen Enterprise™
    • NextGen Privacy
      Data privacy management

      Key Capabilities

      • Automated survey templates
      • PIA/DPIA & TIA assessment
      • Comprehensive Data mapping
      • Automated risk assessment
      • Vendor risk management
      • Consent management
      • Privacy by design
      • Predefined privacy policy document templates
      • Breach notification
      • Automated control selection
      • Continuous control testing
      • Security training
      • Cookie scanning | Cookie consent
      • Multilingual
    • NextGen Data Discovery
      AI data analysis and classification

      Key Capabilities

      • AI data discovery
      • Data Analysis
      • Data Visualisation
      • Data Linking
    • NextGen Vendor Management
      3rd party risk management

      Key Capabilities

      • Automated pre-filled surveys
      • Transfer impact assessment
      • Automated vendor risk
      • Automatic Schrems II contracts
      • Predefined vendor document templates
      • Transfer Impact Assessment Data Mapping
      • Contract management
      • Legal basis for sharing data
    • NextGen Consent
      Cookie scanning and website privacy notice

      Key Capabilities

      • Cookie scanning
      • Website consent
      • Privacy policies
    • NextGen DSAR
      Subject / consumer request management

      Key Capabilities

      • Off the shelf web interface
      • Supports any privacy legislation
      • Pre-defined GDPR & CCPA templates
      • NextGen DSAR workflow management
      • NextGen consumer messaging interface
      • Automated consumer data collection
    • NextGen Privacy Automation
      Automatic control selection

      Key Capabilities

      • Automatic control selection
      • Encode your legal position
    • NextGen Proactive Protection
      Continuous testing of controls

      Key Capabilities

      • Test each and every control
    • NextGen Privacy Research
      Free to use data privacy research

      Key Capabilities

      • Privacy regulation research
      • Regulation comparison tool
      • Latest privacy news tracking
      • Latest Threat Intelligence
      • Breach modelling and ROI calculator
    • Proteus®NextGen Express™
    • Proteus®GDPReady™
      Simple dedicated GDPR solution

      Key Capabilities

      • Simple GDPR surveys
      • Off the shelf DSAR web interface
      • Pre-defined GDPR templates
      • GDPReady DSAR workflow management
      • Data subject messaging interface
      • Automated data subject info retrieval
    • Proteus®CCPAready™
      Simple dedicated CCPA solution

      Key Capabilities

      • Simple CCPA surveys
      • Off the shelf consumer requests
      • Pre-defined CCPA templates
      • Consumer request workflow management
      • CCPAReady consumer messaging interface
      • Automated consumer data retrieval
    • Proteus®NextGen Schrems II™
    • Proteus®Schrems II™
      Schrems ii decision | Schrems ii implications | Standard Contractual Clauses

      Key Capabilities

      • Automatic Schrems II contracts
  • Solutions
  • Free Resources
      Proteus®NextGen Data Privacy™
    • NextGen Privacy Research
      Free to use data privacy research

      Key Capabilities

      • Privacy regulation research
      • Regulation comparison tool
      • Latest privacy news tracking
      • Latest Threat Intelligence
      • Breach modelling and ROI calculator
    • Articles
      Current and historical articles

      Key Capabilities

      • Defusing the GDPR time bomb
      • GDPR - And they’re off...
      • GFT and Proteus-Cyber partner to deliver world class data protection management
      • The Cost of a Data Breach by Alex Igel Proteus Cyber.
      • Why Data Privacy & Cyber Security Are Business Issues Of The Highest Priority by Alex Igel Metrics Management
      • Proteus-Cyber Ltd- GDPR/LGDP Management Software
      • Proteus-Cyber Ltd- PIA/TIA Assessment
      • Six practical steps to Schrems II compliance
      • Proteus-Cyber Ltd- Threat Intelligence Tools for Data Privacy Protection
      • Proteus-Cyber Ltd- Privacy Impact Assessment GDPR
      • Proteus-Cyber Ltd- Threat Intelligence Tools - Update
    • Privacy standards
      Data privacy regulations

      Key Capabilities

      • EU GDPR
      • US CCPA
      • Brazil LGPD
      • Australian Privacy Act
      • Germany BDSG
      • Canada Pipeda
      • Thailand PDPA
      • Singapore PDPA
      • Swiss FADP
      • New York SHIELD
      • New York NYDFS
      • Andorra Adequacy
      • Argentina Adequacy
      • Canada Adequacy
      • Faeroese Adequacy
      • Guernsey Adequacy
      • Isle of Man Adequacy
      • Israel Adequacy
      • Japan Adequacy
      • Jersey Adequacy
      • New Zealand Adequacy
      • Switzerland Adequacy
      • Uruguay Adequacy
      • CPRA
      • ADPPA
  • Privacy News
  • Company
    • About Us
    • FAQ
    • Contact Us
  • Contact Us
  • Privacy regulation research
  • Regulation comparison tool
  • Privacy news
  • Breach/ROI calculator
  • Threat Intelligence
  • By date
  • Top 10 threat types
  • Latest threats
  •  

Threat Intelligence

RSS
  • Cross-site Scripting XSS
  • Bounds of a Memory Buffer
  • Improper Input Validation
  • Exposure to Unauthorized Actor
  • Improper SQL ('SQL Injection')
  • Out-of-bounds Read
  • Cross-Site Request Forgery (CSRF)
  • Path Traversal
  • Improper Access Control
  • Use After Free
  • Improper Authentication
  • Out-of-bounds Write
  • Integer Overflow or Wraparound
  • NULL Pointer Dereference
  • Special Elements (OS Command Injection)
  • Generation of Code ('Code Injection')
  • Improper Privilege Management
  • Uncontrolled Resource Consumption
  • Special Elements in Output (Injection)
  • Race Condition
  • Microsoft
  • Oracle
  • Apple
  • Google
  • Intel
  • Cisco
  • Redhat
  • Linux
  • Mozilla
  • Adobe
  • Apache
  • Hp
  • F5
  • Jenkins
  • Debian
  • Sap
  • Opensuse
  • Gnu
  • Foxitsoftware
  • Gitlab
  • Android
  • Iphone os
  • Linux kernel
  • Mac os x
  • Windows 10
  • Chrome
  • Windows 7
  • Windows server 2008
  • Windows server 2016
  • Windows server 2012
  • Windows 8.1
  • Windows rt 8.1
  • Tvos
  • Mysql
  • Windows server 2019
  • Firefox
  • Safari
  • Internet explorer
  • Jre
  • Watchos
Cross-site Scripting XSS Bounds of a Memory Buffer Improper Input Validation Exposure to Unauthorized Actor Improper SQL ('SQL Injection') Out-of-bounds Read Cross-Site Request Forgery (CSRF) Path Traversal Improper Access Control Use After Free Improper Authentication Out-of-bounds Write Integer Overflow or Wraparound NULL Pointer Dereference Special Elements (OS Command Injection) Generation of Code ('Code Injection') Improper Privilege Management Uncontrolled Resource Consumption Special Elements in Output (Injection) Race Condition
Microsoft Oracle Apple Google Intel Cisco Redhat Linux Mozilla Adobe Apache Hp F5 Jenkins Debian Sap Opensuse Gnu Foxitsoftware Gitlab
Android Iphone os Linux kernel Mac os x Windows 10 Chrome Windows 7 Windows server 2008 Windows server 2016 Windows server 2012 Windows 8.1 Windows rt 8.1 Tvos Mysql Windows server 2019 Firefox Safari Internet explorer Jre Watchos
CVE-2023-5297 29 Sep 2023
A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|run... Read more ➔
CVE-2023-5296 29 Sep 2023
A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of t... Read more ➔
CVE-2023-5294 29 Sep 2023
A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adm... Read more ➔
CVE-2023-44270 29 Sep 2023
An issue was discovered in PostCSS before 8.4.31. It affects linters using PostCSS to parse external Cascading Style Sheets (CSS). There may be \r dis... Read more ➔
CVE-2023-5293 29 Sep 2023
A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The ma... Read more ➔
CVE-2023-5287 29 Sep 2023
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in BEECMS 4.0. This a... Read more ➔
CVE-2022-35908 29 Sep 2023
Cambium Enterprise Wi-Fi System Software before 6.4.2 does not sanitize the ping host argument in device-agent. Read more ➔
CVE-2023-5286 29 Sep 2023
A vulnerability, which was classified as problematic, has been found in SourceCodester Expense Tracker App v1. Affected by this issue is some unknown... Read more ➔
CVE-2023-5285 29 Sep 2023
A vulnerability classified as critical was found in Tongda OA 2017. Affected by this vulnerability is an unknown functionality of the file general/hr/... Read more ➔
CVE-2023-5284 29 Sep 2023
A vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file uploa... Read more ➔
CVE-2023-5283 29 Sep 2023
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of... Read more ➔
CVE-2023-43655 29 Sep 2023
Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed a... Read more ➔
CVE-2023-5282 29 Sep 2023
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of... Read more ➔
CVE-2023-5281 29 Sep 2023
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been classified as critical. This affects an unknown part of the file... Read more ➔
CVE-2023-5280 29 Sep 2023
A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this issue is some unknown functionali... Read more ➔
CVE-2023-5279 29 Sep 2023
A vulnerability has been found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this vulnerability is an unknown... Read more ➔
CVE-2023-5278 29 Sep 2023
A vulnerability, which was classified as critical, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the fil... Read more ➔
CVE-2023-5277 29 Sep 2023
A vulnerability, which was classified as critical, has been found in SourceCodester Engineers Online Portal 1.0. This issue affects some unknown proce... Read more ➔
CVE-2023-5276 29 Sep 2023
A vulnerability classified as critical was found in SourceCodester Engineers Online Portal 1.0. This vulnerability affects unknown code of the file do... Read more ➔
CVE-2023-26218 29 Sep 2023
The Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that a... Read more ➔
CVE-2023-5273 29 Sep 2023
A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of t... Read more ➔
CVE-2023-5272 29 Sep 2023
A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file e... Read more ➔
CVE-2023-3024 29 Sep 2023
Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access. Read more ➔
CVE-2023-39410 29 Sep 2023
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of m... Read more ➔
CVE-2023-5271 29 Sep 2023
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown... Read more ➔
Proteus-Cyber Ltd.
20-22 Wenlock Road
London
N1 7GU
United Kingdom
P: +44 (0)208 123 7708
Registered in the UK
and Wales 07239733.
VAT registered
GB 991 1452 13
‘Proteus’ is a registered trademark.
All rights reserved.
Products
  • NextGen Privacy
  • NextGen Data Discovery
  • NextGen Vendor Management
  • NextGen Consent
  • NextGen DSAR
  • NextGen Privacy Automation
  • NextGen Proactive Protection
  • NextGen Privacy Research
Free resources
  • Privacy regulation research
  • Regulation comparison tool
  • Latest privacy news tracking
  • Latest Threat Intelligence
  • Breach modelling and ROI calculator
About us
  • Website terms and disclaimer
  • Privacy and cookies policy
  • Articles
Contact Us

[email protected] or
follow us on social media

© 2023 Proteus-Cyber Ltd.