Comparison Overview

KUNAN S.A.

VS

Zealtec Energy Pvt Ltd

KUNAN S.A.

Av. La Voz del Interior 8501 - Parque Empresarial Aeropuerto - Córdoba, Córdoba, Córdoba, AR
Last Update: 2025-03-20 (UTC)
Between 900 and 1000

Excellent

Somos una destacada empresa tecnológica con sede en Córdoba desde 2004, especializándonos como expertos en respaldar a las organizaciones en la adopción e implementación de tecnologías vanguardistas. Nos destacamos por proporcionar respuestas ágiles e innovadoras que satisfacen la creciente y dinámica demanda del mercado, operando con alcance global desde nuestra sede central en Córdoba. Guiados por nuestro lema, "Facilitamos la vida de las personas con tecnología", ofrecemos un amplio abanico de soluciones tecnológicas de última generación: Asistentes Virtuales de IA para Empresas Whapp (Plataforma Comercial Omnicanal) Metabase o Business Intelligence CRM para Empresas Kuning Tech – Staff Augmentation (gestión y administración de equipos IT) Remote DBA (Administración Remota de Bases de Datos) Estas soluciones están meticulosamente desarrolladas utilizando tecnologías avanzadas como Big Data y análisis, inteligencia artificial, aprendizaje automático, lenguaje natural, ingeniería de software, entre otras. Nos enorgullece ser impulsores de la transformación digital, aportando soluciones innovadoras para satisfacer las necesidades tecnológicas de las empresas en todo el mundo. .... We are a prominent technology company based in Córdoba since 2004, specializing as experts in supporting organizations in the adoption and implementation of cutting-edge technologies. Renowned for providing agile and innovative responses to meet the growing and dynamic market demand, we operate globally from our central headquarters in Córdoba. Guided by our motto, "We make life easier for people with technology," we offer a comprehensive range of state-of-the-art technological solutions: Conversational Virtual Assistants for Enterprises Whapp (Omnichannel Commercial Platform) Metabase or Business Intelligence CRM for Enterprises Kuning Tech – Staff Augmentation (management and administration of IT teams) Remote DBA (Remote Database Administration) These solutions are metic

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Zealtec Energy Pvt Ltd

Bengaluru, IN
Last Update: 2025-03-17 (UTC)

Excellent

Between 900 and 1000

Zealtec Energy Pvt Ltd is operating in the space of eco friendly power generation. India is currently the sixth largest energy consumer. As India grows, our energy needs are also growing. We, along with our partner companies have been working out relationships with international power majors to set up Power Plants in India. In the first phase, we are setting up a Solar Power Plant with an installed generation capacity of 20 MW in Karnataka.

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 11-50
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/zealtec-infosolutions-pvt-ltd.jpeg
Zealtec Energy Pvt Ltd
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
KUNAN S.A.
100%
Compliance Rate
0/4 Standards Verified
Zealtec Energy Pvt Ltd
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for KUNAN S.A. in 2025.

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for Zealtec Energy Pvt Ltd in 2025.

Incident History — KUNAN S.A. (X = Date, Y = Severity)

KUNAN S.A. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Zealtec Energy Pvt Ltd (X = Date, Y = Severity)

Zealtec Energy Pvt Ltd cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
Incidents

No Incident

https://images.rankiteo.com/companyimages/zealtec-infosolutions-pvt-ltd.jpeg
Zealtec Energy Pvt Ltd
Incidents

No Incident

FAQ

Both KUNAN S.A. company and Zealtec Energy Pvt Ltd company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Zealtec Energy Pvt Ltd company has disclosed a higher number of cyber incidents compared to KUNAN S.A. company.

In the current year, Zealtec Energy Pvt Ltd company and KUNAN S.A. company have not reported any cyber incidents.

Neither Zealtec Energy Pvt Ltd company nor KUNAN S.A. company has reported experiencing a ransomware attack publicly.

Neither Zealtec Energy Pvt Ltd company nor KUNAN S.A. company has reported experiencing a data breach publicly.

Neither Zealtec Energy Pvt Ltd company nor KUNAN S.A. company has reported experiencing targeted cyberattacks publicly.

Neither KUNAN S.A. company nor Zealtec Energy Pvt Ltd company has reported experiencing or disclosing vulnerabilities publicly.

Neither KUNAN S.A. company nor Zealtec Energy Pvt Ltd company has publicly disclosed detailed information about the number of their subsidiaries.

Neither KUNAN S.A. company nor Zealtec Energy Pvt Ltd company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X