
Drover
Strong
Drover is the UK's leading car subscription company and has been acquired by Cazoo in January 2021.
Strong
Drover is the UK's leading car subscription company and has been acquired by Cazoo in January 2021.
Strong
Fundada em 1999, MercadoLivre é uma companhia de tecnologia líder em comércio eletrônico na América Latina. Por meio de suas principais plataformas MercadoLivre.com e MercadoPago.com, oferece soluções de comércio eletrônico para que pessoas e empresas possam comprar, vender, pagar e anunciar produtos por meio da Internet. MercadoLivre atende milhões de usuários e criou um mercado com ampla variedade de bens e serviços de uma forma fácil, segura e eficiente. O site é um dos 50 sites com mais Page Views do mundo, oitavo site de e-commerce mais acessado do planeta e é a plataforma de varejo líder em visitantes únicos em cada país onde opera na América Latina, de acordo com métricas fornecidas pela comScore Networks. Uma das empresas vencedoras do prêmio Top of Mind DataFolha Internet 2012, categoria e-commerce e Marca Mais Buscada no Brasil em 2012 e a marca mais buscada na categoria de compras em 2013, segundo o Google Zeitgeist, ranking divulgado pela companhia sobre as palavras mais buscadas a cada ano em seu site. Está listada na Nasdaq (MELI), tendo iniciado a oferta pública em 2007. Áreas de Negócios: MercadoLivre.com maior marketplace da América Latina. Líder em audiência de e-commerce no Brasil. MercadoPago é a maior plataforma de pagamentos pela Internet de origem latinoamericana. MercadoLivre Publicidade comercializa e gerencia campanhas de links patrocinados e banners para vendedores no MercadoLivre.com. MercadoShops é uma solução completa e acessível para ajudar os micro e pequenos empreendedores a ingressarem no comércio eletrônico. MercadoLivre Classificados é a área exclusiva para que pessoas e empresas possam anunciar online veículos, imóveis e serviços dentro da plataforma MercadoLivre. MercadoEnvios é a tecnologia de gestão de envios do MercadoLivre.
Security & Compliance Standards Overview
No incidents recorded for Drover in 2025.
No incidents recorded for Mercado Livre Brasil in 2025.
Drover cyber incidents detection timeline including parent company and subsidiaries
Mercado Livre Brasil cyber incidents detection timeline including parent company and subsidiaries
An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.
A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.