
MCDONALD
McDonald is a company based out of Lurgan, United Kingdom.



McDonald is a company based out of Lurgan, United Kingdom.

Cemex is a global industry leader in producing and supplying cement, aggregates, ready-mix concrete, and urbanization solutions. We’re driving innovation further to solve the world’s building challenges and help the world reach the next frontier of sustainable living. #BuildingABetterFuture Nuestra compañía fue fundada en Monterrey, México, en 1906. Empezamos como una empresa local y, gracias a nuestra visión, evolucionamos hasta convertirnos en una de las compañías globales líderes en nuestra industria. En México contamos con una capacidad de producción anual de 30 millones de toneladas de cemento, operamos con 15 plantas de cemento, 265 plantas de concreto premezclado, 15 canteras de agregados, 78 centro de distribución terrestre y 7 terminales marítimas. Construimos un mejor futuro gracias a nuestro afán de innovar a través de una oferta de productos y soluciones integrales de calidad y de un proceso operativo eficiente y seguro que respeta el medio ambiente.
Security & Compliance Standards Overview












No incidents recorded for MCDONALD in 2025.
No incidents recorded for Cemex in 2025.
MCDONALD cyber incidents detection timeline including parent company and subsidiaries
Cemex cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).