
Agricultural Bank of China
wholly state-owned



wholly state-owned

Сбер — крупнейший банк в России, поставщик надёжных технологических решений и один из ведущих финансовых институтов страны. Мы не боимся меняться и открывать новые горизонты, но в то же время остаёмся верными принципам, сформированным за нашу 180-летнюю историю. Такой подход позволяет нам создавать и развивать десятки технологичных направлений. Нашими сервисами пользуются миллионы людей, а над их созданием и совершенствованием работают десятки тысяч сотрудников. Sber is the largest bank in Russia, supplier of reliable technological solutions and one of the leading national financial institutions. We are not afraid to change and open up new horizons, but at the same time we remain true to the principles that have been formed over our 180-year history. This approach allows us to create and develop dozens of technological areas. Our services are used by millions of people, and thousands of employees are working on their creation and improvement.
Security & Compliance Standards Overview












No incidents recorded for Agricultural Bank of China in 2025.
No incidents recorded for Sberbank in 2025.
Agricultural Bank of China cyber incidents detection timeline including parent company and subsidiaries
Sberbank cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).