Comparison Overview

AMIRIPROJECT

VS

Inova Health

AMIRIPROJECT

P.O. Box 60122, Dayton, Ohio, 45406, US
Last Update: 2025-03-05 (UTC)
Between 800 and 900

Strong

The goal of this initiative is for young African-American males to broaden their knowledge base regarding healthy living; to begin to envision themselves in a career in the healthcare professions; to empower this targeted population with employment and life skills through mentoring, networking, and self-esteem development; to become inspired to develop both short- and long-term goals that will place them in a similar or superior situation to the healthcare professionals with whom they interact. Eric Charlton, the founder and executive director of The AmiriProject, believes in this philosophy because of the lack of healthy lifestyles and future professionals within the young African-American male population in the City of Dayton. This program focuses on increasing opportunities in middle and high schools for mentoring and guidance regarding healthy lifestyles and healthcare careers, challenging negative attitudes and unhealthy environments among the young African-American male population. The AmiriProject also teaches program participants about the importance of networking and improved self-esteem. This empowerment initiative is instrumental to those young African-American men who do not have the support system in their household (or school) which constitutes a lower standard of expectation to pursue a higher educational status.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 2,194
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Inova Health

3300 Gallows Road, Falls Church, Virginia, 22042, US
Last Update: 2025-03-04 (UTC)

Excellent

Between 900 and 1000

We are Inova, Northern Virginia and the Washington, DC, metropolitan areaโ€™s leading nonprofit healthcare provider. With expertise and compassion, we partner with our patients to help them stay healthy. We treat illness, heal injury and look at a patientโ€™s whole health to help them flourish. Through our expansive network of hospitals, primary and specialty care practices, emergency and urgent care centers, and outpatient services, Inova provides care for more than 1 million unique patients every year. Total patient visits exceed 4 million annually, demonstrating our ability to deliver the best clinical care and ensuring a seamless experience for all who rely on us for their healthcare needs. Consistently ranked and recognized as a national healthcare leader in safety, quality and patient experience, Inovaโ€™s world-class care is made possible by the strength and breadth of our network, our more than 25,000 team members, our technology and our innovation. Inova is home to Northern Virginiaโ€™s only Level 1 Trauma Center and Level 4 Neonatal Intensive Care Unit and provides high-quality healthcare to each person in every community we are privileged to serve โ€“ regardless of ability to pay โ€“ every day of their life. More information about Inova can be found at Inova.org.

NAICS: 62
NAICS Definition: Health Care and Social Assistance
Employees: 13,295
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/good-samaritan-hospital.jpeg
AMIRIPROJECT
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/inova-health-system.jpeg
Inova Health
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
AMIRIPROJECT
100%
Compliance Rate
0/4 Standards Verified
Inova Health
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for AMIRIPROJECT in 2025.

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Inova Health in 2025.

Incident History โ€” AMIRIPROJECT (X = Date, Y = Severity)

AMIRIPROJECT cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Inova Health (X = Date, Y = Severity)

Inova Health cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/good-samaritan-hospital.jpeg
AMIRIPROJECT
Incidents

No Incident

https://images.rankiteo.com/companyimages/inova-health-system.jpeg
Inova Health
Incidents

Date Detected: 2/2020
Type:Ransomware
Blog: Blog

FAQ

Inova Health company company demonstrates a stronger AI risk posture compared to AMIRIPROJECT company company, reflecting its advanced AI governance and monitoring frameworks.

Inova Health company has historically faced a number of disclosed cyber incidents, whereas AMIRIPROJECT company has not reported any.

In the current year, Inova Health company and AMIRIPROJECT company have not reported any cyber incidents.

Inova Health company has confirmed experiencing a ransomware attack, while AMIRIPROJECT company has not reported such incidents publicly.

Neither Inova Health company nor AMIRIPROJECT company has reported experiencing a data breach publicly.

Neither Inova Health company nor AMIRIPROJECT company has reported experiencing targeted cyberattacks publicly.

Neither AMIRIPROJECT company nor Inova Health company has reported experiencing or disclosing vulnerabilities publicly.

Inova Health company has more subsidiaries worldwide compared to AMIRIPROJECT company.

Inova Health company employs more people globally than AMIRIPROJECT company, reflecting its scale as a Hospitals and Health Care.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X