Comparison Overview

Jonathan Stevens Mattress Co

VS

Design Public Group

Jonathan Stevens Mattress Co

995 36th St SE, Grand Rapids, Michigan, undefined, US
Last Update: 2025-03-07 (UTC)
Between 900 and 1000

Excellent

Jonathan Stevens Mattress Co is a 79 year old Company that produces mattresses and foundations in our own factory in Grand Rapids Michigan. We sell them directly through our 8 retail outlets in West Michigan and on our website. By making all our own mattresses and selling them direct to the consumer, we can offer better values than any other furniture or mattress store. We offer a large selection of unique mattresses which include innerspring mattresses with unique interlocking flexible coils, latex mattresses, and gel memory foam mattresses. We offer the best locally built mattress that your hard earned money can buy!

NAICS: 337
NAICS Definition:
Employees: 23
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Design Public Group

8707 Washington Blvd, Culver City, California, 90232, US
Last Update: 2025-03-16 (UTC)

Excellent

Between 900 and 1000

Design Public Group connects great designers with beautiful ancillary furniture. Weโ€™re obsessed with technical details and logistics, so you can spend your time doing what you do best: bringing unique spaces to life. Built for designers, architects, and contract dealers, the Design Public Group Platform can be trusted with a vision, a budget, a timeline, and a reputation. Itโ€™s where great design is easy to find. Representing over 300 modern European brands and 10,000+ unique furniture pieces, long gone are the days of dealing with multiple vendors for your furniture. DPG focuses on bringing the most cutting edge brands under one roof and making them easily accessible for any project. Whatever you need, we can get for you. Finding what you need is only half the battle though. Getting it to you is often even harder. We pride ourselves in having advanced logistics tools in place to insure speedy delivery to make your deadlines. With weekly ocean containers, air freighting capabilities, and advanced logistics software, your orders go where they need to, when you need them. Want more information? Please visit us at www.designpublicgroup.com to see what we can do for you today.

NAICS: 337
NAICS Definition:
Employees: 30
Subsidiaries: 15
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/jsmattress-co.jpeg
Jonathan Stevens Mattress Co
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/design-public-group.jpeg
Design Public Group
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Jonathan Stevens Mattress Co
100%
Compliance Rate
0/4 Standards Verified
Design Public Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Jonathan Stevens Mattress Co in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Design Public Group in 2025.

Incident History โ€” Jonathan Stevens Mattress Co (X = Date, Y = Severity)

Jonathan Stevens Mattress Co cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Design Public Group (X = Date, Y = Severity)

Design Public Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/jsmattress-co.jpeg
Jonathan Stevens Mattress Co
Incidents

No Incident

https://images.rankiteo.com/companyimages/design-public-group.jpeg
Design Public Group
Incidents

No Incident

FAQ

Both Jonathan Stevens Mattress Co company and Design Public Group company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Design Public Group company has disclosed a higher number of cyber incidents compared to Jonathan Stevens Mattress Co company.

In the current year, Design Public Group company and Jonathan Stevens Mattress Co company have not reported any cyber incidents.

Neither Design Public Group company nor Jonathan Stevens Mattress Co company has reported experiencing a ransomware attack publicly.

Neither Design Public Group company nor Jonathan Stevens Mattress Co company has reported experiencing a data breach publicly.

Neither Design Public Group company nor Jonathan Stevens Mattress Co company has reported experiencing targeted cyberattacks publicly.

Neither Jonathan Stevens Mattress Co company nor Design Public Group company has reported experiencing or disclosing vulnerabilities publicly.

Design Public Group company has more subsidiaries worldwide compared to Jonathan Stevens Mattress Co company.

Design Public Group company employs more people globally than Jonathan Stevens Mattress Co company, reflecting its scale as a Furniture and Home Furnishings Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X