
Regional Obstetric Consultants
None



None

A purpose-driven company, Clariane is the leading European community for care in times of vulnerability. Our Group’s purpose “To take care of each person’s humanity in times of vulnerability” is inspired by our three core values: trust, responsibility and initiative. With facilities at the heart of 700 cities and communities across six European countries, we are dedicated to standing alongside vulnerable individuals, ensuring our presence wherever they need us. Our expertise? Delivering our Positive Care approach through 3 areas of activity: - Care homes – we care. - Healthcare facilites and services – we cure. - Shared living solutions – we welcome and enliven. Relying on their diverse expertise, each year, our community unites, trains and supports around 63,000 employees who provide services to over 890,000 patients and residents in three main areas of activity: long-term care (Korian, Seniors Residencias, etc.), specialty care (Inicea, Ita, Grupo 5, Lebenswert, etc.), and community care (Âges & Vie...). In 2025, Clariane was awarded Top Employer certification in Europe and in each of the six countries where we operate: Germany (for the 5th consecutive year), France (for the 4th consecutive year), Belgium and Italy (for the 3rd consecutive years), and Spain and the Netherlands (for the 1st time). Our actions are guided every day by five key commitments: consideration, equity, innovation, proximity and sustainability. Our Clariane community: at your side, at every moment. #ClarianeAtYourSide #WeAreClariane #PurposeDrivenCompany
Security & Compliance Standards Overview












No incidents recorded for Regional Obstetric Consultants in 2026.
No incidents recorded for Clariane in 2026.
Regional Obstetric Consultants cyber incidents detection timeline including parent company and subsidiaries
Clariane cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.