
PCMR International Ltd.
Excellent
None
Excellent
None
Excellent
Desde nuestra fundación en 1970, en Grupo Famsa hemos venido consolidándonos como una empresa pública líder en el sector minorista; enfocada en la venta de productos y servicios a crédito. Siguiendo un proyecto disciplinado de crecimiento, hemos fundamentado nuestra estrategia en el desarrollo de un portafolio sólido de negocios complementarios basados en el crédito al consumo y el ahorro. A través de nuestras tres unidades de negocio, brindamos una oferta de valor integral dirigida a mejorar la calidad de vida de un segmento poblacional que demanda servicios personalizados y opciones de crédito que no le son brindadas por la banca tradicional. Un comprometido equipo de trabajo con más de 18,000 empleados y una amplia red de 421 tiendas con cobertura en 78 ciudades de México y 37 de las ciudades con mayor población hispana de Estados Unidos, están dedicados a superar las expectativas de más de 9 millones de clientes de Grupo Famsa. En enero de 2007 inició operaciones Banco Ahorro Famsa, S.A., Institución de Banca Múltiple, que constituye un ambicioso proyecto para instituir el brazo financiero de Grupo Famsa y complementar nuestra propuesta de valor con servicios bancarios. Los avances en la implementación de nuestro banco ya comienzan a convertirse en valiosas sinergias con el área comercial que impulsan el desempeño operativo y financiero del Grupo.
Security & Compliance Standards Overview
No incidents recorded for PCMR International Ltd. in 2025.
No incidents recorded for Famsa in 2025.
PCMR International Ltd. cyber incidents detection timeline including parent company and subsidiaries
Famsa cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A security flaw has been discovered in LogicalDOC Community Edition up to 9.2.1. This issue affects some unknown processing of the file /frontend.jsp of the component Add Contact Page. Performing manipulation of the argument First Name/Last Name/Company/Address/Phone/Mobile results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in toeverything AFFiNE up to 0.24.1. This vulnerability affects unknown code of the component Avatar Upload Image Endpoint. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was determined in givanz Vvveb up to 1.0.7.3. This affects the function Import of the file admin/controller/tools/import.php of the component Raw SQL Handler. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: 52204b4a106b2fb02d16eee06a88a1f2697f9b35. It is recommended to apply a patch to fix this issue.
A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.