Comparison Overview

Jewel-Osco

VS

L Brands

Jewel-Osco

150 Pierce Road, Suite 400, Itasca, IL, US, 60143
Last Update: 2025-12-11
Between 750 and 799

Proudly serving our customers in the Chicagoland area since 1899, Jewel-Osco provides friendly service, quality products and great value. Jewel-Osco operates 188 stores throughout the Chicagoland area, Indiana and Iowa, which is part of a 2,200+ store operation that employs approximately 290,000 people nationwide. All of our stores, no matter what banner they operate under, were founded around the philosophy of offering customers the products they wanted to buy at a fair price, with lots of tender, loving care. We still open our doors every day with that in mind.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 11,479
Subsidiaries: 1
12-month incidents
0
Known data breaches
3
Attack type number
2

L Brands

3 Limited Parkway, Columbus, OH, 43230, US
Last Update: 2025-12-09
Between 750 and 799

On August 2, 2021, L Brands (NYSE: LB) completed the separation of the Victoria’s Secret business into an independent, public company through a tax-free spin-off to L Brands shareholders. The new company, named Victoria’s Secret & Co., includes Victoria’s Secret Lingerie, PINK and Victoria’s Secret Beauty. Victoria’s Secret & Co. is a NYSE listed company trading under the ticker symbol VSCO. In conjunction with this announcement, L Brands changed its name to Bath & Body Works, Inc. and now trades under the ticker symbol BBWI. For more information on Bath & Body Works, Inc. or Victoria’s Secret & Co., please visit the corporate websites.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 10,154
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/jewel-osco.jpeg
Jewel-Osco
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/limited-brands.jpeg
L Brands
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Jewel-Osco
100%
Compliance Rate
0/4 Standards Verified
L Brands
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Jewel-Osco in 2025.

Incidents vs Retail Industry Average (This Year)

No incidents recorded for L Brands in 2025.

Incident History — Jewel-Osco (X = Date, Y = Severity)

Jewel-Osco cyber incidents detection timeline including parent company and subsidiaries

Incident History — L Brands (X = Date, Y = Severity)

L Brands cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/jewel-osco.jpeg
Jewel-Osco
Incidents

Date Detected: 12/2023
Type:Breach
Attack Vector: Credential Theft (Fraudulent Website)
Blog: Blog

Date Detected: 12/2022
Type:Breach
Blog: Blog

Date Detected: 8/2014
Type:Cyber Attack
Motivation: Criminal (Potential Theft of Payment Card Data)
Blog: Blog
https://images.rankiteo.com/companyimages/limited-brands.jpeg
L Brands
Incidents

No Incident

FAQ

L Brands company demonstrates a stronger AI Cybersecurity Score compared to Jewel-Osco company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Jewel-Osco company has historically faced a number of disclosed cyber incidents, whereas L Brands company has not reported any.

In the current year, L Brands company and Jewel-Osco company have not reported any cyber incidents.

Neither L Brands company nor Jewel-Osco company has reported experiencing a ransomware attack publicly.

Jewel-Osco company has disclosed at least one data breach, while the other L Brands company has not reported such incidents publicly.

Jewel-Osco company has reported targeted cyberattacks, while L Brands company has not reported such incidents publicly.

Neither Jewel-Osco company nor L Brands company has reported experiencing or disclosing vulnerabilities publicly.

Neither Jewel-Osco nor L Brands holds any compliance certifications.

Neither company holds any compliance certifications.

L Brands company has more subsidiaries worldwide compared to Jewel-Osco company.

Jewel-Osco company employs more people globally than L Brands company, reflecting its scale as a Retail.

Neither Jewel-Osco nor L Brands holds SOC 2 Type 1 certification.

Neither Jewel-Osco nor L Brands holds SOC 2 Type 2 certification.

Neither Jewel-Osco nor L Brands holds ISO 27001 certification.

Neither Jewel-Osco nor L Brands holds PCI DSS certification.

Neither Jewel-Osco nor L Brands holds HIPAA certification.

Neither Jewel-Osco nor L Brands holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X