
Eliivate
Excellent
Introducing the all new lifestyle brand โ Eliivate. // Our goal is to create products that push you to new limits. The time is now. All products are hand-made & packaged in Virginia.
Excellent
Introducing the all new lifestyle brand โ Eliivate. // Our goal is to create products that push you to new limits. The time is now. All products are hand-made & packaged in Virginia.
Strong
We are the LEGO Group, the company behind the worldโs most loved LEGOยฎ bricks. Our brand name derived from the two Danish words Leg Godt, which mean โPlay Wellโ. Weโve been sparking imaginations and inspiring the builders of tomorrow since 1932. This is our mission and what motivates our colleagues around the world every day. Today, we remain proudly family-owned with headquarters in Billund, Denmark. We have regional hubs in Boston, USA; London, UK; Shanghai, China; and Singapore, as well as 7 manufacturing facilities around the world. These places are home to 28,000+ colleagues in everything from design and engineering to digital technology and marketing. Together we learn, imagine and build โ creating play experiences that are sold in over 130 countries worldwide. A purposeful and responsible global brand where creativity helps to inspire builders all around the world. Just imagine being part of that!
Security & Compliance Standards Overview
No incidents recorded for Eliivate in 2025.
No incidents recorded for the LEGO Group in 2025.
Eliivate cyber incidents detection timeline including parent company and subsidiaries
the LEGO Group cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
PyVista provides 3D plotting and mesh analysis through an interface for the Visualization Toolkit (VTK). Version 0.46.3 of the PyVista Project is vulnerable to remote code execution via dependency confusion. Two pieces of code use`--extra-index-url`. But when `--extra-index-url` is used, pip always checks for the PyPI index first, and then the external index. One package listed in the code is not published in PyPI. If an attacker publishes a package with higher version in PyPI, the malicious code from the attacker controlled package may be pulled, leading to remote code execution and a supply chain attack. As of time of publication, a patched version is unavailable.
KUNO CMS is a fully deployable full-stack blog application. In versions prior to 1.3.15, an SSRF (Server-Side Request Forgery) vulnerability exists in the Media module of the Kuno CMS administrative panel. A logged-in administrator can upload a specially crafted SVG file containing an external image reference, causing the server to initiate an outgoing connection to an arbitrary external URL. This can lead to information disclosure or internal network probing. Version 1.3.15 contains a fix for the issue.
The Profile widget in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92, and older unsupported versions uses a userโs name in the โContent-Dispositionโ header, which allows remote authenticated users to change the file extension when a vCard file is downloaded.
The YoSmart YoLink API through 2025-10-02 uses an endpoint URL that is derived from a device's MAC address along with an MD5 hash of non-secret information, such as a key that begins with cf50.
The YoSmart YoLink application through 2025-10-02 has session tokens with unexpectedly long lifetimes.