
Safepay Limited
Safepay Limited is a financial services company based out of Dartford, United Kingdom.



Safepay Limited is a financial services company based out of Dartford, United Kingdom.

From the largest cities to the smallest villages, India is filled with ambition and enterprise. As Indians from all walks of life set out to write their growth story, our timely and affordable credit empowers them to bring their dreams alive. As part of the TVS Group, we empower Indians from various socio-economic backgrounds with financial products that serve their needs. In doing so, we further the cause of financial inclusion. Being the number one financier for TVS Motor Company Limited and one of the leading Two-Wheeler, Consumer Durable and Mobile Phone financiers, we have a fast-growing footprint in Used Car Loans, Tractor Loans, Used Commercial Vehicle Loans, and Unsecured Loans. Our entrepreneurial culture, which inspires us to deliver our best, has given rise to initiatives as AIM, a framework to implement innovative ideas, and GURU, a mentorship programme to help new employees deliver excellence from the get-go. With over 2.1 Cr customers and a long-term CRISIL rating of AA+ (Stable), our growth is built on firm fundamentals. We have received several awards, including being ranked #78 among India’s Top 100 Best Companies to Work For in 2025 by Great Place To Work®, winning the ET Best BFSI Brand title for eight years in a row, featuring in Dun & Bradstreet’s BFSI and FinTech listings for five years, and earning RMAI's Flame and PRCI Awards for our marketing campaigns.
Security & Compliance Standards Overview












No incidents recorded for Safepay Limited in 2026.
No incidents recorded for TVS Credit Services Ltd. in 2026.
Safepay Limited cyber incidents detection timeline including parent company and subsidiaries
TVS Credit Services Ltd. cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.