Comparison Overview

Dassault Systèmes

VS

Airbnb

Dassault Systèmes

10, rue Marcel Dassault, None, Vélizy-Villacoublay, None, FR, 78140
Last Update: 2025-12-09
Between 800 and 849

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create sustainable innovations that drive meaningful impact. For more information, visit: https://www.3ds.com

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 27,261
Subsidiaries: 29
12-month incidents
0
Known data breaches
0
Attack type number
1

Airbnb

888 Brannan Street, San Francisco, CA, US, 94103
Last Update: 2025-12-11
Between 800 and 849

Airbnb was born in 2007 when two hosts welcomed three guests to their San Francisco home, and has since grown to over 5 million hosts who have welcomed over 2 billion guest arrivals in almost every country across the globe. Every day, hosts offer unique stays, experiences and services that make it possible for guests to connect with communities in a more authentic way.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 58,281
Subsidiaries: 4
12-month incidents
1
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dassaultsystemes.jpeg
Dassault Systèmes
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/airbnb.jpeg
Airbnb
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Dassault Systèmes
100%
Compliance Rate
0/4 Standards Verified
Airbnb
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Dassault Systèmes in 2025.

Incidents vs Software Development Industry Average (This Year)

Airbnb has 72.41% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — Dassault Systèmes (X = Date, Y = Severity)

Dassault Systèmes cyber incidents detection timeline including parent company and subsidiaries

Incident History — Airbnb (X = Date, Y = Severity)

Airbnb cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dassaultsystemes.jpeg
Dassault Systèmes
Incidents

Date Detected: 6/2020
Type:Vulnerability
Attack Vector: Network, Malicious SOAP Requests, Base64-encoded GZIP-compressed .NET Executable
Blog: Blog
https://images.rankiteo.com/companyimages/airbnb.jpeg
Airbnb
Incidents

Date Detected: 6/2025
Type:Cyber Attack
Attack Vector: Phantom listing scam, Bait and switch scams, Fake positive reviews, Misleading property images, Delusive tactics
Motivation: Criminal intent or nefarious financial gain
Blog: Blog

FAQ

Airbnb company demonstrates a stronger AI Cybersecurity Score compared to Dassault Systèmes company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Dassault Systèmes and Airbnb have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Airbnb company has reported more cyber incidents than Dassault Systèmes company.

Neither Airbnb company nor Dassault Systèmes company has reported experiencing a ransomware attack publicly.

Neither Airbnb company nor Dassault Systèmes company has reported experiencing a data breach publicly.

Airbnb company has reported targeted cyberattacks, while Dassault Systèmes company has not reported such incidents publicly.

Dassault Systèmes company has disclosed at least one vulnerability, while Airbnb company has not reported such incidents publicly.

Neither Dassault Systèmes nor Airbnb holds any compliance certifications.

Neither company holds any compliance certifications.

Dassault Systèmes company has more subsidiaries worldwide compared to Airbnb company.

Airbnb company employs more people globally than Dassault Systèmes company, reflecting its scale as a Software Development.

Neither Dassault Systèmes nor Airbnb holds SOC 2 Type 1 certification.

Neither Dassault Systèmes nor Airbnb holds SOC 2 Type 2 certification.

Neither Dassault Systèmes nor Airbnb holds ISO 27001 certification.

Neither Dassault Systèmes nor Airbnb holds PCI DSS certification.

Neither Dassault Systèmes nor Airbnb holds HIPAA certification.

Neither Dassault Systèmes nor Airbnb holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X