
A P Moller Maersk group
None



None

Care.com is a consumer tech company with heart. We’re on a mission to solve a human challenge we all face: finding great care for the ones we love. We’re moms and dads and pet parents. We have parents and grandparents so we understand that everyone, at some point in their lives, could use a helping hand. Our culture and our products reflect that. Here, entrepreneurs, self-starters, team players, and big thinkers unite behind a common cause. Here, we’re applying data analytics, AI and the latest technologies to solve universal problems and connect people in new ways. If you like having autonomy, if you thrive on collaboration and building new things, and if you’re all about using your talent for good, Care.com is the place for you.
Security & Compliance Standards Overview












No incidents recorded for A P Moller Maersk group in 2025.
No incidents recorded for Care.com in 2025.
A P Moller Maersk group cyber incidents detection timeline including parent company and subsidiaries
Care.com cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).