Comparison Overview

Duraplay

VS

Holmen Skog

Duraplay

Avenida Santa Bárbara 21, Hidalgo del Parral, Chihuahua, 33870, MX
Last Update: 2025-05-05 (UTC)
Between 700 and 800

Good

En Duraplay nos sentimos orgullosos de ser la empresa líder en fabricación de tableros de madera en México. Nuestro compromiso en Duraplay es trabajar en una empresa responsable con el medio ambiente y nuestra comunidad, para cada día ofrecer un producto de mejor calidad y seguro para uso residencial, a la vez que cuidamos la sustentabilidad de la industria.

NAICS: 113
NAICS Definition: Forestry and Logging
Employees: 243
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Holmen Skog

undefined, undefined, undefined, undefined, SE
Last Update: 2025-03-07 (UTC)

Good

Between 700 and 800

Holmen är en av Sveriges största skogsägare. Vi brukar skogen aktivt och hållbart för att den ska växa optimalt och ge oss den bästa råvaran. Långsiktigt tar vi ansvar för skogens kretslopp från frö till återplantering och värnar den biologiska mångfalden. Våra medarbetare sköter våra skogar, köper virke och hjälper priva­ta skogsägare över hela landet med skörd och skogsvård.

NAICS: 113
NAICS Definition: Forestry and Logging
Employees: 334
Subsidiaries: 5
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/duraplay.jpeg
Duraplay
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/holmen-skog-ab.jpeg
Holmen Skog
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Duraplay
100%
Compliance Rate
0/4 Standards Verified
Holmen Skog
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Forestry and Logging Industry Average (This Year)

No incidents recorded for Duraplay in 2025.

Incidents vs Forestry and Logging Industry Average (This Year)

No incidents recorded for Holmen Skog in 2025.

Incident History — Duraplay (X = Date, Y = Severity)

Duraplay cyber incidents detection timeline including parent company and subsidiaries

Incident History — Holmen Skog (X = Date, Y = Severity)

Holmen Skog cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/duraplay.jpeg
Duraplay
Incidents

No Incident

https://images.rankiteo.com/companyimages/holmen-skog-ab.jpeg
Holmen Skog
Incidents

No Incident

FAQ

Both Duraplay company and Holmen Skog company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Holmen Skog company has disclosed a higher number of cyber incidents compared to Duraplay company.

In the current year, Holmen Skog company and Duraplay company have not reported any cyber incidents.

Neither Holmen Skog company nor Duraplay company has reported experiencing a ransomware attack publicly.

Neither Holmen Skog company nor Duraplay company has reported experiencing a data breach publicly.

Neither Holmen Skog company nor Duraplay company has reported experiencing targeted cyberattacks publicly.

Neither Duraplay company nor Holmen Skog company has reported experiencing or disclosing vulnerabilities publicly.

Holmen Skog company has more subsidiaries worldwide compared to Duraplay company.

Holmen Skog company employs more people globally than Duraplay company, reflecting its scale as a Forestry and Logging.

Latest Global CVEs (Not Company-Specific)

Description

Volto is a ReactJS-based frontend for the Plone Content Management System. Versions 16.34.0 and below, 17.0.0 through 17.22.1, 18.0.0 through 18.27.1, and 19.0.0-alpha.1 through 19.0.0-alpha.5, an anonymous user could cause the NodeJS server part of Volto to quit with an error when visiting a specific URL. This issue is fixed in versions 16.34.1, 17.22.2, 18.27.2 and 19.0.0-alpha.6.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain a Broken Access Control vulnerability, identified in the get_relatorios_socios.php endpoint. This vulnerability allows unauthenticated attackers to directly access sensitive personal and financial information of members without requiring authentication or authorization. This issue is fixed in version 3.5.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an Open Redirect vulnerability, identified in the control.php endpoint, specifically in the nextPage parameter (metodo=listarUmnomeClasse=FuncionarioControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This issue is fixed in version 3.5.0.

Risk Information
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X