
Yik Yak
Yik Yak is a location-based social network that helps you connect with the people right around you. By letting you express yourself, exchange thoughts, and explore your world, Yik Yak helps you feel at home within your local community.



Yik Yak is a location-based social network that helps you connect with the people right around you. By letting you express yourself, exchange thoughts, and explore your world, Yik Yak helps you feel at home within your local community.

Meesho is India’s fastest growing internet commerce company. We want to make eCommerce accessible to all. Our vision is to enable 100 million small businesses in India, including individual entrepreneurs, to succeed online. Our mission is to democratise internet commerce by bringing a range of products & new customers online. What started as a reseller-focused platform six years ago has now emerged as a single ecosystem connecting millions of sellers, consumers and entrepreneurs. Want to know more. Check us out on Twitter: https://twitter.com/Meesho_Official
Security & Compliance Standards Overview












No incidents recorded for Yik Yak in 2025.
No incidents recorded for Meesho in 2025.
Yik Yak cyber incidents detection timeline including parent company and subsidiaries
Meesho cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.