Comparison Overview

Imajine That

VS

Liberty Aviation Museum

Imajine That

354 Merrimack St., Lawrence, MA, 01843, US
Last Update: 2025-12-01
Between 750 and 799

The Imajine That Museum is a Certified B Corporation and a first of its kind family and child interactive play space where human potential has no boundaries. Our unique 12,000 square foot play space located at the Riverwalk in Lawrence, offers an environment where families can create and learn together in a safe and educational manner. Imajine That's "Imagination Stations"​ include a child sized Whole Foods® grocery store, a HUGE dinosaur climbing structure, Between the Lions® literacy area, Peep and the Big Wide World® Science Station, just to name a few. In addition to the museum, Imajine That also offers full day family engagement preschool programs called Imajine That University located at the Riverwalk Lawrence. Imajine That also offers extended learning day programs in the Boston Public Schools and Lawrence Public Schools. Each of the schools Imajine That works with has a customized curriculum to meet the needs of the school and children. Imajine That provides education and enrichment for children in the preschool and elementary years. With a play-based approach, Imajine That follows all National Association for the Education of Young Children (NAEYC) guidelines for developmentally appropriate practices. Practices include an intentional focus on: (1) Social and emotional development (2) Oral language development (speaking, listening, and vocabulary) (3) Early literacy learning (especially phonemic awareness, phonics, and listening comprehension) (4) Exploration of STEM topics through highly engaging interactive play. Art and music are incorporated into many activities. Imajine That uses educational technology from award-winning producers (e.g. the science games from Peep in the Big Wide World produced by WGBH, a PBS affiliate) to enhance learning experiences with iPad technology. And, finally, but very importantly, foundational to the Imajine That approach are physical activity and a healthy way of eating

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 22
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Liberty Aviation Museum

3515 E. State Road, Port Clinton, 43453, US
Last Update: 2025-12-03

HONORING military veterans, PRESERVING aviation legacies, EXPERIENCING historical artifacts The Liberty Aviation Museum was established on December 7th 1991 with a handful of dedicated volunteers to showcase WW2 aircraft. In 1994 we put on a well received air show at the Erie-Ottawa Airport. In 1996 we formally announced intent to locate our museum at Erie-Ottawa County Airport. Embracing the deep aviation heritage of the area we began to plan for a facility to include a hangar and museum along with a 1950's era theme Diner. In 2010 the Liberty Aviation Museum acquired a fully restored and flyable vintage WW2 North American B-25 Mitchell Bomber. The 2011 season was spent training crews to fly her at air shows throughout the year. In 2011, dreams of all three partner organizations to have a permanent home became reality with the announcement that a Museum/Hangar facility would be built at the Erie-Ottawa County Airport, KPCW.

NAICS: 712
NAICS Definition: Museums, Historical Sites, and Similar Institutions
Employees: 8
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/imajine-that.jpeg
Imajine That
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Liberty Aviation Museum
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Imajine That
100%
Compliance Rate
0/4 Standards Verified
Liberty Aviation Museum
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Imajine That in 2025.

Incidents vs Museums, Historical Sites, and Zoos Industry Average (This Year)

No incidents recorded for Liberty Aviation Museum in 2025.

Incident History — Imajine That (X = Date, Y = Severity)

Imajine That cyber incidents detection timeline including parent company and subsidiaries

Incident History — Liberty Aviation Museum (X = Date, Y = Severity)

Liberty Aviation Museum cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/imajine-that.jpeg
Imajine That
Incidents

No Incident

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Liberty Aviation Museum
Incidents

No Incident

FAQ

Imajine That company demonstrates a stronger AI Cybersecurity Score compared to Liberty Aviation Museum company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Liberty Aviation Museum company has disclosed a higher number of cyber incidents compared to Imajine That company.

In the current year, Liberty Aviation Museum company and Imajine That company have not reported any cyber incidents.

Neither Liberty Aviation Museum company nor Imajine That company has reported experiencing a ransomware attack publicly.

Neither Liberty Aviation Museum company nor Imajine That company has reported experiencing a data breach publicly.

Neither Liberty Aviation Museum company nor Imajine That company has reported experiencing targeted cyberattacks publicly.

Neither Imajine That company nor Liberty Aviation Museum company has reported experiencing or disclosing vulnerabilities publicly.

Neither Imajine That nor Liberty Aviation Museum holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Imajine That company nor Liberty Aviation Museum company has publicly disclosed detailed information about the number of their subsidiaries.

Imajine That company employs more people globally than Liberty Aviation Museum company, reflecting its scale as a Museums, Historical Sites, and Zoos.

Neither Imajine That nor Liberty Aviation Museum holds SOC 2 Type 1 certification.

Neither Imajine That nor Liberty Aviation Museum holds SOC 2 Type 2 certification.

Neither Imajine That nor Liberty Aviation Museum holds ISO 27001 certification.

Neither Imajine That nor Liberty Aviation Museum holds PCI DSS certification.

Neither Imajine That nor Liberty Aviation Museum holds HIPAA certification.

Neither Imajine That nor Liberty Aviation Museum holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X