
GameStop
GameStop offers games, entertainment products and technology through its e-commerce properties and stores.



GameStop offers games, entertainment products and technology through its e-commerce properties and stores.

Founded in 1992, China Resources Enterprise, Limited is the Hong Kong flagship subsidiary of China Resources (Holdings) Company Limited in the comprehensive consumer goods and retail services businesses. The Company focuses on three businesses: beer, food and beverage. For the beer division, China Resources Beer (Holdings) Company Limited is listed on the Hong Kong Stock Exchange under the stock code 291.HK. It is the parent company of China Resources Snow Breweries Limited, the largest beer manufacturer, seller and distributor in China. Since 2008, "雪花 Snow" has become the world 's best-selling single beer brand by volume. Regarding the Group’s food business, China Resources Ng Fung Limited is an outstanding integrated food products enterprise, which combines research and development, production, processing, wholesale, retail, logistics and international trading. The division is primarily engaged in the businesses of rice, meat, frozen food, imported food and modern agriculture, as well as the operation of China Resources Hope Town development projects across Mainland China and Hong Kong. It is also affectionately known as “Hong Kong’s Food Basket”. The beverage division – China Resources C'estbon Kirin Beverage (Holdings) Company Limited –is one of the leading beverage companies in China. Its main business is the manufacturing and sales of purified drinking water product under the brand “怡寶C'estbon”. “怡寶C'estbon” purified water has been recognized as a renowned brand product in China, and also a famous and most competitive brand in China. It strives to build itself into a leading Chinese beverage company with diversified products. Looking ahead, CRE will continue to build on the strategy of “market leadership with outstanding brands, operational excellence and synergies among its businesses”, and endeavor to become a world renowned retail and consumer goods company.
Security & Compliance Standards Overview












No incidents recorded for GameStop in 2025.
No incidents recorded for 华润创业有限公司 in 2025.
GameStop cyber incidents detection timeline including parent company and subsidiaries
华润创业有限公司 cyber incidents detection timeline including parent company and subsidiaries
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.