Comparison Overview

Gibson Truck World

VS

Yazaki Corporation

Gibson Truck World

None
Last Update: 2025-03-11 (UTC)

Excellent

Gibson Truck World is the first and last place you will need to shop at for a used Ford, Chevrolet, GMC or Dodge truck. The team at Gibson Truck World is proud to serve the communities of Sanford, Orlando, Daytona Beach, Tampa, Jacksonville, Miami, Leesburg, Eustis, Georgia, Tennessee, Alabama, South Carolina and so many more with quality trucks. We also sell and ship our trucks WORLDWIDE! Gibson delivers quality trucks to satisfied customers internationally everyday.

NAICS: 336
NAICS Definition:
Employees: 31
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Yazaki Corporation

Last Update: 2025-05-06 (UTC)

Strong

Between 800 and 900

Yazaki is a Japanese-based manufacturing company. It was founded in 1941 as an automotive company. "Yazaki produces and markets wire harnesses for cars, electric cables, and gas equipment, as well as air conditioning and solar-powered equipment in Japan, while wire harness manufacture consists of the core of Yazakiโ€™s overseas operations." (Yazaki 2008 Social and Environmental Report)

NAICS: 3361
NAICS Definition: Motor Vehicle Manufacturing
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/gibson-truck-world.jpeg
Gibson Truck World
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Yazaki Corporation
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Gibson Truck World
100%
Compliance Rate
0/4 Standards Verified
Yazaki Corporation
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Motor Vehicle Manufacturing Industry Average (This Year)

No incidents recorded for Gibson Truck World in 2025.

Incidents vs Motor Vehicle Manufacturing Industry Average (This Year)

No incidents recorded for Yazaki Corporation in 2025.

Incident History โ€” Gibson Truck World (X = Date, Y = Severity)

Gibson Truck World cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Yazaki Corporation (X = Date, Y = Severity)

Yazaki Corporation cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/gibson-truck-world.jpeg
Gibson Truck World
Incidents

No Incident

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Yazaki Corporation
Incidents

No Incident

FAQ

Gibson Truck World company company demonstrates a stronger AI risk posture compared to Yazaki Corporation company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, Yazaki Corporation company has disclosed a higher number of cyber incidents compared to Gibson Truck World company.

In the current year, Yazaki Corporation company and Gibson Truck World company have not reported any cyber incidents.

Neither Yazaki Corporation company nor Gibson Truck World company has reported experiencing a ransomware attack publicly.

Neither Yazaki Corporation company nor Gibson Truck World company has reported experiencing a data breach publicly.

Neither Yazaki Corporation company nor Gibson Truck World company has reported experiencing targeted cyberattacks publicly.

Neither Gibson Truck World company nor Yazaki Corporation company has reported experiencing or disclosing vulnerabilities publicly.

Neither Gibson Truck World company nor Yazaki Corporation company has publicly disclosed detailed information about the number of their subsidiaries.

Gibson Truck World company employs more people globally than Yazaki Corporation company, reflecting its scale as a Motor Vehicle Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X