
GSK
We are uniting science, technology and talent to get ahead of disease together. Our community guidelines: https://gsk.to/socialmedia



We are uniting science, technology and talent to get ahead of disease together. Our community guidelines: https://gsk.to/socialmedia

At UCB, we believe everyone deserves to live the best life they can - as free as possible from the challenges and uncertainty of disease. Our purpose is to support people living with severe central nervous system and immunological conditions by delivering meaningful solutions that go beyond medicine. We are driven by the experiences of patients and caregivers, and inspired to pursue innovations that create real value - not just in clinical outcomes, but in everyday moments, dreams pursued, and simple pleasures enjoyed. Our ambition is to unlock transformative science and technologies that respond to unmet needs and elevate lives. From our headquarters in Belgium to nearly 40 countries around the world, we nurture a culture of respect and care. We act with thoughtful intent to ensure our work reflects the voices of those we serve. By listening deeply and collaborating across borders and disciplines, we enable cutting-edge research shaped by patients’ needs. Through strong connections with healthcare professionals, partners, and communities, we strive to make a lasting impact - today and into the future.
Security & Compliance Standards Overview












No incidents recorded for GSK in 2025.
No incidents recorded for UCB in 2025.
GSK cyber incidents detection timeline including parent company and subsidiaries
UCB cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).