
Grupo Viamar
Distribuidor exclusivo para la República Dominicana de las marcas: Ford, Mazda, Kia, y Lincoln; así como de la división de vehículos comerciales Ecomotors, que representa las marcas: Jac, Fordland, Shineray y Gac Gonow.



Distribuidor exclusivo para la República Dominicana de las marcas: Ford, Mazda, Kia, y Lincoln; así como de la división de vehículos comerciales Ecomotors, que representa las marcas: Jac, Fordland, Shineray y Gac Gonow.

The Home Instead® network is the world's leading provider of personalized in-home care services. We have over 1,100 independently owned and operated franchise offices worldwide that employ compassionate CAREGivers who share our dedication to enhancing the lives of aging adults and their families. Services span the care continuum, from companionship and personal care to specialized Alzheimer's care and hospice support. Caring for others is part of our DNA, and that includes caring for your career. The Home Instead network provides best-in-class training, education, and opportunities for career advancement. It also offers you the opportunity to be part of a supportive family-like culture where you're encouraged to talk with your local office for support, share stories, and seek guidance. Learn more at HomeInstead.com/Careers.
Security & Compliance Standards Overview












No incidents recorded for Grupo Viamar in 2025.
No incidents recorded for Home Instead in 2025.
Grupo Viamar cyber incidents detection timeline including parent company and subsidiaries
Home Instead cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.