Comparison Overview

ACME Engineering Products

VS

Appion Tools

ACME Engineering Products

5540 rue Paré, Mont-Royal, H4P 2M1, CA
Last Update: 2025-12-13
Between 750 and 799

ACME Engineering Prod. Ltd. was established in 1956 and has its head office in Montreal, Canada. ACME is an integrated manufacturer, encompassing mechanical, electrical, and electronic manufacturing capabilities within the same company. We have a wide range of standard products but distinguish ourselves by providing custom solutions with ease and minimal additional cost. We manufacture three distinct product lines: – Gas detection systems for building ventilation control. – Process heating equipment for large commercial and industrial applications. – Automatic scraper-strainers for intake, process, and effluent filtration. By choosing ACME as your supplier, you are aligning yourself with a company possessing the experience necessary to produce a custom product with the high quality you require at a competitive price. We have an extensive network of representatives across North America to serve you and our presence in Europe, Asia and Latin/South America increases every year. Please see acmeprod.com for more information on our products or contact us at [email protected]

NAICS: None
NAICS Definition: Others
Employees: 115
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Appion Tools

2800 South Tejon Street, Englewood, CO, 80110, US
Last Update: 2025-12-08
Between 750 and 799

Appion is a privately owned and operated company, known in the HVAC/R industry for manufacturing high-quality tools and equipment. We have distinguished ourselves by delivering reliable products and backing that with excellent customer service. Our employees support this culture of quality by maintaining a friendly environment that rewards and recognizes star performance. We never stop challenging ourselves to develop faster, more reliable tools to help HVAC/R technicians perform their everyday tasks. Our products are made from decades of manufacturing experience, and always with the needs of the HVAC/R technician in mind.

NAICS: None
NAICS Definition: Others
Employees: 15
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/acme-engineering-products.jpeg
ACME Engineering Products
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/appion-inc-.jpeg
Appion Tools
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
ACME Engineering Products
100%
Compliance Rate
0/4 Standards Verified
Appion Tools
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mechanical Or Industrial Engineering Industry Average (This Year)

No incidents recorded for ACME Engineering Products in 2025.

Incidents vs Mechanical Or Industrial Engineering Industry Average (This Year)

No incidents recorded for Appion Tools in 2025.

Incident History — ACME Engineering Products (X = Date, Y = Severity)

ACME Engineering Products cyber incidents detection timeline including parent company and subsidiaries

Incident History — Appion Tools (X = Date, Y = Severity)

Appion Tools cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/acme-engineering-products.jpeg
ACME Engineering Products
Incidents

No Incident

https://images.rankiteo.com/companyimages/appion-inc-.jpeg
Appion Tools
Incidents

No Incident

FAQ

ACME Engineering Products company demonstrates a stronger AI Cybersecurity Score compared to Appion Tools company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Appion Tools company has disclosed a higher number of cyber incidents compared to ACME Engineering Products company.

In the current year, Appion Tools company and ACME Engineering Products company have not reported any cyber incidents.

Neither Appion Tools company nor ACME Engineering Products company has reported experiencing a ransomware attack publicly.

Neither Appion Tools company nor ACME Engineering Products company has reported experiencing a data breach publicly.

Neither Appion Tools company nor ACME Engineering Products company has reported experiencing targeted cyberattacks publicly.

Neither ACME Engineering Products company nor Appion Tools company has reported experiencing or disclosing vulnerabilities publicly.

Neither ACME Engineering Products nor Appion Tools holds any compliance certifications.

Neither company holds any compliance certifications.

Neither ACME Engineering Products company nor Appion Tools company has publicly disclosed detailed information about the number of their subsidiaries.

ACME Engineering Products company employs more people globally than Appion Tools company, reflecting its scale as a Mechanical Or Industrial Engineering.

Neither ACME Engineering Products nor Appion Tools holds SOC 2 Type 1 certification.

Neither ACME Engineering Products nor Appion Tools holds SOC 2 Type 2 certification.

Neither ACME Engineering Products nor Appion Tools holds ISO 27001 certification.

Neither ACME Engineering Products nor Appion Tools holds PCI DSS certification.

Neither ACME Engineering Products nor Appion Tools holds HIPAA certification.

Neither ACME Engineering Products nor Appion Tools holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N