Comparison Overview

Bremcon

VS

AGBAR

Bremcon

Last Update: 2025-03-15 (UTC)
Between 900 and 1000

Excellent

Bremcon is een gespecialiseerd bodemsanerings- en grondrecyclagebedrijf dat zich sinds kort ook toelegt op enkele belangrijke aspecten van het integraal waterbeheer. Bremcon bestaat uit drie afdelingen: saneringsprojecten, CGR/TOP en de commerciรซle afdeling. Voor de uitvoering van grondwerken tekenden we een samenwerkingsverband met een grondwerkbedrijf. Bremcon heeft een eigen grondrecyclagecentrum en een tijdelijke opslagplaats in Zwijndrecht. We zijn volgens het Achilles Protocol gecerti๏ฌceerd voor de categorieรซn standaardwerken, in-situ sanering en complexe werken.

NAICS: 541
NAICS Definition:
Employees: 11-50
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

AGBAR

Sociedad General de Aguas de Barcelona S.A. Paseo de la Zona Franca, 38 Barcelona, Barcelona 08038, ES
Last Update: 2025-05-06 (UTC)

Strong

Between 800 and 900

With more than 150 years of experience, at Agbar we continue to anticipate and adapt to respond to the needs of our environment, with the aim of improving people's quality of life. With the strength of alliances, we promote innovative solutions for the sustainable management of water and the environment, in line with the United Nations Sustainable Development Goals.

NAICS: 54162
NAICS Definition: Environmental Consulting Services
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bremcon.jpeg
Bremcon
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/agbar.jpeg
AGBAR
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Bremcon
100%
Compliance Rate
0/4 Standards Verified
AGBAR
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Environmental Services Industry Average (This Year)

No incidents recorded for Bremcon in 2025.

Incidents vs Environmental Services Industry Average (This Year)

No incidents recorded for AGBAR in 2025.

Incident History โ€” Bremcon (X = Date, Y = Severity)

Bremcon cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” AGBAR (X = Date, Y = Severity)

AGBAR cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bremcon.jpeg
Bremcon
Incidents

No Incident

https://images.rankiteo.com/companyimages/agbar.jpeg
AGBAR
Incidents

No Incident

FAQ

Bremcon company company demonstrates a stronger AI risk posture compared to AGBAR company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, AGBAR company has disclosed a higher number of cyber incidents compared to Bremcon company.

In the current year, AGBAR company and Bremcon company have not reported any cyber incidents.

Neither AGBAR company nor Bremcon company has reported experiencing a ransomware attack publicly.

Neither AGBAR company nor Bremcon company has reported experiencing a data breach publicly.

Neither AGBAR company nor Bremcon company has reported experiencing targeted cyberattacks publicly.

Neither Bremcon company nor AGBAR company has reported experiencing or disclosing vulnerabilities publicly.

Neither Bremcon company nor AGBAR company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Bremcon company nor AGBAR company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X