Comparison Overview

Glorious Leather Group

VS

ChenOne Stores Limited

Glorious Leather Group

Sialkot 51310, PK
Last Update: 2025-03-17 (UTC)

The Glorious leather Group is manufacturer and exporter of fashion & sports products. Glorious Leather Group makes very durable product and exports. Made us to any products anytime, anywhere got no complaints. The first is our standard. Example of our sustainability can not even find you.Since the invention by Tariq Mehmood in 1986, GLG's leather products have been capturing the imagination and loyalty of people for generations. Manufacturer & Exporter of Leather and Textile Garments.We provide the unique and best quality of leather and textile products to our customers.

NAICS: 448
NAICS Definition: Clothing and Clothing Accessories Stores
Employees: 51-200
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

ChenOne Stores Limited

Gulberg Lahore, Punjab, PK
Last Update: 2025-03-15 (UTC)
Between 750 and 799

ChenOne is a chain of fashion stores owned by the Chenab Group. The first ChenOne store was opened in 1997 at Islamabad with the sole ambition to bring world class standards to a local market. Currently, there are more than 30 business units changing lifestyles both locally and all over the globe.

NAICS: 448
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/glorious-leather-group.jpeg
Glorious Leather Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/chenone-stores-limited.jpeg
ChenOne Stores Limited
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Glorious Leather Group
100%
Compliance Rate
0/4 Standards Verified
ChenOne Stores Limited
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Retail Apparel and Fashion Industry Average (This Year)

No incidents recorded for Glorious Leather Group in 2025.

Incidents vs Retail Apparel and Fashion Industry Average (This Year)

No incidents recorded for ChenOne Stores Limited in 2025.

Incident History — Glorious Leather Group (X = Date, Y = Severity)

Glorious Leather Group cyber incidents detection timeline including parent company and subsidiaries

Incident History — ChenOne Stores Limited (X = Date, Y = Severity)

ChenOne Stores Limited cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/glorious-leather-group.jpeg
Glorious Leather Group
Incidents

No Incident

https://images.rankiteo.com/companyimages/chenone-stores-limited.jpeg
ChenOne Stores Limited
Incidents

No Incident

FAQ

Glorious Leather Group company demonstrates a stronger AI Cybersecurity Score compared to ChenOne Stores Limited company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, ChenOne Stores Limited company has disclosed a higher number of cyber incidents compared to Glorious Leather Group company.

In the current year, ChenOne Stores Limited company and Glorious Leather Group company have not reported any cyber incidents.

Neither ChenOne Stores Limited company nor Glorious Leather Group company has reported experiencing a ransomware attack publicly.

Neither ChenOne Stores Limited company nor Glorious Leather Group company has reported experiencing a data breach publicly.

Neither ChenOne Stores Limited company nor Glorious Leather Group company has reported experiencing targeted cyberattacks publicly.

Neither Glorious Leather Group company nor ChenOne Stores Limited company has reported experiencing or disclosing vulnerabilities publicly.

Neither Glorious Leather Group nor ChenOne Stores Limited holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Glorious Leather Group company nor ChenOne Stores Limited company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Glorious Leather Group company nor ChenOne Stores Limited company has publicly disclosed the exact number of their employees.

Neither Glorious Leather Group nor ChenOne Stores Limited holds SOC 2 Type 1 certification.

Neither Glorious Leather Group nor ChenOne Stores Limited holds SOC 2 Type 2 certification.

Neither Glorious Leather Group nor ChenOne Stores Limited holds ISO 27001 certification.

Neither Glorious Leather Group nor ChenOne Stores Limited holds PCI DSS certification.

Neither Glorious Leather Group nor ChenOne Stores Limited holds HIPAA certification.

Neither Glorious Leather Group nor ChenOne Stores Limited holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: System Configuration). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Incorrect Default Permissions vulnerability in The Wikimedia Foundation Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Mediawiki - Thanks Extension, Mediawiki - Growth Experiments Extension: from 1.43 before 1.44.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N