
GSK
We are uniting science, technology and talent to get ahead of disease together. Our community guidelines: https://gsk.to/socialmedia



We are uniting science, technology and talent to get ahead of disease together. Our community guidelines: https://gsk.to/socialmedia

Championing the missions that matter™. Catalent, Inc. is a leading global contract development and manufacturing organization (CDMO) and trusted partner to pharma, biotech, and consumer health companies worldwide. We put patients first in everything we do, helping people live better and healthier lives through every product we help develop, manufacture and deliver. With over 1,000 active development programs at any given time, we launch over 100 new products and line extensions annually. Catalent has supported half of all FDA approvals over the past decade, and our teams working at over 40 global sites help us produce over 60 billion doses every year. Our strength lies in our people: teams across our more than 40 sites and thousands of passionate scientists and technicians who bring expertise in development sciences, delivery technologies, and multi-modality manufacturing. What unites us is our commitment to championing our partners’ missions as our own, anticipating customer needs, solving complex challenges and ultimately making a difference in the lives of patients across the globe. At Catalent, you will be able to directly have an impact, solving problems and ensuring excellence for our customers. Our focus on delivering meaningful outcomes alongside our customers means your work directly impacts millions of people around the world. Join us in championing the missions that matter. Catalent is headquartered in Tampa, Florida, with over 40 global sites. Visit www.catalent.com to learn more.
Security & Compliance Standards Overview












No incidents recorded for GSK in 2025.
No incidents recorded for Catalent in 2025.
GSK cyber incidents detection timeline including parent company and subsidiaries
Catalent cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).