
Coca-Cola FEMSA
The public bottler with the largest volume of sales within the Coca-Cola System, committed with the generation of economic value and social and environmental well-being.



The public bottler with the largest volume of sales within the Coca-Cola System, committed with the generation of economic value and social and environmental well-being.

HMSHost is recognized by the industry as the leader in travel dining with awards such as Restaurateur with the Highest Regard for Customer Service and Best Brand Restaurateur for Shake Shack by Airport Experience News. USA Today 10Best Readers’ Choice Travel Awards gave first place honors to both of HMSHost’s Whisky River locations at Charlotte Douglas International Airport and Raleigh-Durham International Airport. ACI-NA, the trade association representing commercial service airports in the United States and Canada, recognized HMSHost with the 2020 Inclusion Champion Award, for leadership and achievement in the ongoing inclusion of business and workforce diversity, outreach, and advocacy. The company also creates original award-winning events and campaigns including Airport Restaurant Month, Channel Your Inner Chef live culinary contest, 1,000 Acts of Kindness, and Eat Well. Travel Further. For careers, text HMSHost to 97211 or visit us at careers.hmshost.com
Security & Compliance Standards Overview












No incidents recorded for Coca-Cola FEMSA in 2025.
No incidents recorded for HMSHost in 2025.
Coca-Cola FEMSA cyber incidents detection timeline including parent company and subsidiaries
HMSHost cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.