
Bimo
Excellent
Blvd. Chefchaouni, Rue E Rte. 110, Ain Sebaa, Casablanca, 20250, Morocco ()212 0522 34 53 00, 212 0522 35 45 80 fax,
Excellent
Blvd. Chefchaouni, Rue E Rte. 110, Ain Sebaa, Casablanca, 20250, Morocco ()212 0522 34 53 00, 212 0522 35 45 80 fax,
Excellent
From our roots at the counter of a local Atlanta pharmacy, to our current portfolio of more than 200 beverages, The Coca-Cola Company is one of the most globally-recognized brands in the world. Today, our lineup features beloved beverage brands, including โ Coca-Cola, Sprite, Fanta, smartwater, Dasani, Topo Chico, BODYARMOR, Powerade, Costa, Georgia, Goldpeak, Minute Maid, Simply, fairlife and more. โ The Coca-Cola Company is committed to bringing about real change โ to our industry, to our local economies, and to the world around us. Through constant evolution, we continue to reimagine the way we refresh the world and make a difference.โ We're innovating our portfolio with products that give people more varieties that meet our consumers where they are. โ We're working with global partners to transform our business, and grow it in more sustainable ways. โ And we're providing jobs and opportunities to the local economies where our people live and work, employing 700,000 people throughout our global system alongside bottling partners.โ If you're a changemaker looking to make a change, come join us in our mission to refresh the world and make a difference.โ Learn more at: www.coca-colacompany.com/careers
Security & Compliance Standards Overview
No incidents recorded for Bimo in 2025.
No incidents recorded for The Coca-Cola Company in 2025.
Bimo cyber incidents detection timeline including parent company and subsidiaries
The Coca-Cola Company cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation MediaWiki Cargo extension allows SQL Injection.This issue affects MediaWiki Cargo extension: 1.39, 1.43, 1.44.
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki QuizGame extension allows Stored XSS.This issue affects MediaWiki QuizGame extension: 1.39, 1.43, 1.44.
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki PollNY extension allows Stored XSS.This issue affects MediaWiki PollNY extension: 1.39, 1.43, 1.44.
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki WebAuthn extension allows Stored XSS.This issue affects MediaWiki WebAuthn extension: 1.39, 1.43, 1.44.
pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data.