Company Details
columbia-river-maritime-museum
18
406
712
crmm.org
0
COL_2985183
In-progress

Columbia River Maritime Museum Company CyberSecurity Posture
crmm.orgThe Columbia River Maritime Museum has been sharing the Columbia River’s rich maritime heritage and history since 1962. The Museum’s wide-ranging exhibits, programs, collections and distinctive architecture express the vision of Founder Rolf Klep. The Museum is Oregon’s official state maritime museum, was the first Oregon museum to be nationally accredited, and is widely regarded as among the finest maritime museums in the United States.
Company Details
columbia-river-maritime-museum
18
406
712
crmm.org
0
COL_2985183
In-progress
Between 750 and 799

CRMM Global Score (TPRM)XXXX



No incidents recorded for Columbia River Maritime Museum in 2025.
No incidents recorded for Columbia River Maritime Museum in 2025.
No incidents recorded for Columbia River Maritime Museum in 2025.
CRMM cyber incidents detection timeline including parent company and subsidiaries

The Columbia River Maritime Museum has been sharing the Columbia River’s rich maritime heritage and history since 1962. The Museum’s wide-ranging exhibits, programs, collections and distinctive architecture express the vision of Founder Rolf Klep. The Museum is Oregon’s official state maritime museum, was the first Oregon museum to be nationally accredited, and is widely regarded as among the finest maritime museums in the United States.


O Museu Brasileiro da Escultura - MuBE é uma entidade cultural sem fins econômicos. Abriga exposições de arte, promove oficinas e cursos regulares de história da arte, cerâmica, pintura, escultura, arte e inclusão, palestras, debates, entre outras atividades. O MuBE realiza ainda todos os domingos

About Us. Bath Preservation Trust was founded in 1934 as a small pressure group, with the object of protecting the city's unique architectural heritage. Bath is many things to many people but we want it to be a place for everyone which can positively adapt to Climate Change and continue to evolve

The Halsey Institute of Contemporary Art at the College of Charleston School of the Arts provides a multidisciplinary laboratory for the production, presentation, interpretation, and dissemination of ideas by innovative visual artists from around the world. As a non-collecting museum, we create mean

Exhibitions | Classes | Music | Summerfest | Gift Shop Standing in BDAC’s main gallery at 90 North Main Street, it can be hard to fathom how much this art center has developed in 40+ years. By 1974, the growing Davis County community developed a need for a local art center. That need was met as Bou

Founded in 1976 by the 19 Pueblos of New Mexico, the Indian Pueblo Cultural Center (IPCC) is responsible for preserving and perpetuating Pueblo culture, and advancing understanding – by presenting with dignity and respect – the accomplishments and evolving history of the Pueblo people of New Mexico.

The National Museum of American Jewish History, located on historic Independence Mall, brings the 350-year history of Jews in America to life. Tracing the stories of how Jewish immigrants became Jewish Americans, the museum invites visitors of all heritages to share their own stories and reflect on
.png)
It's a spectacularly big country, and there are so many places to see—including, increasingly, quirky, character-filled small towns that are...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Columbia River Maritime Museum is http://www.crmm.org.
According to Rankiteo, Columbia River Maritime Museum’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, Columbia River Maritime Museum currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Columbia River Maritime Museum is not certified under SOC 2 Type 1.
According to Rankiteo, Columbia River Maritime Museum does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Columbia River Maritime Museum is not listed as GDPR compliant.
According to Rankiteo, Columbia River Maritime Museum does not currently maintain PCI DSS compliance.
According to Rankiteo, Columbia River Maritime Museum is not compliant with HIPAA regulations.
According to Rankiteo,Columbia River Maritime Museum is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Columbia River Maritime Museum operates primarily in the Museums, Historical Sites, and Zoos industry.
Columbia River Maritime Museum employs approximately 18 people worldwide.
Columbia River Maritime Museum presently has no subsidiaries across any sectors.
Columbia River Maritime Museum’s official LinkedIn profile has approximately 406 followers.
Columbia River Maritime Museum is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, Columbia River Maritime Museum does not have a profile on Crunchbase.
Yes, Columbia River Maritime Museum maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/columbia-river-maritime-museum.
As of December 03, 2025, Rankiteo reports that Columbia River Maritime Museum has not experienced any cybersecurity incidents.
Columbia River Maritime Museum has an estimated 2,134 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Columbia River Maritime Museum has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.