Comparison Overview

Laboratorio Petrizzio

VS

Clinique

Laboratorio Petrizzio

Last Update: 2025-03-15 (UTC)
Between 800 and 900

Strong

Tenemos mโˆšยฐs de 70 aโˆšยฑos de experiencia en la industria de la belleza y cuidado personal. Desde nuestros inicios hemos puesto toda nuestra pasiโˆšโ‰ฅn y esfuerzo en desarrollar productos innovadores, de alta calidad y al alcance de tod@s. Estamos para democratizar la belleza!!! Las personas nos inspiran, por eso estamos a la vanguardia de las tendencias y las adaptamos para desarrollar los mejores productos. Sin embargo creemos que nuestro compromiso no solo debe ser con nuestros clientes y colaboradores sino tambiโˆšยฉn con toda la comunidad, los animales y el medio ambiente. Somos Cruelty Free. Nuestras Marcas : - PZZO - Petrizzio Dermo - Petrizzio Hair care - Pielarmina - Plaisance - Piero Butti - Benjamin Vicuโˆšยฑa - Diana Bolocco - Itzy - Jean Les Pins - Rayito de Sol

NAICS: 325
NAICS Definition:
Employees: 501-1,000
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Clinique

767 Fifth Avenue, New York, NY, 10153, US
Last Update: 2025-05-06 (UTC)

Excellent

Between 900 and 1000

Clinique believes great skin can be created. Because whatever the skin concern, Clinique has safe, clinical solutions. Informed by decades of experience, working with dermatologists, scientists and ophthalmologists. Formulated with the perfect balance of ingredients for powerful efficacy with rigorous safety. Our unwavering dedication is why millions around the world trust their skin to Clinique. And have for over 55 years.

NAICS: 32562
NAICS Definition: Toilet Preparation Manufacturing
Employees: 10,257
Subsidiaries: 8
12-month incidents
0
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/laboratorio-petrizzio.jpeg
Laboratorio Petrizzio
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/clinique.jpeg
Clinique
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Laboratorio Petrizzio
100%
Compliance Rate
0/4 Standards Verified
Clinique
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Personal Care Product Manufacturing Industry Average (This Year)

No incidents recorded for Laboratorio Petrizzio in 2025.

Incidents vs Personal Care Product Manufacturing Industry Average (This Year)

No incidents recorded for Clinique in 2025.

Incident History โ€” Laboratorio Petrizzio (X = Date, Y = Severity)

Laboratorio Petrizzio cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Clinique (X = Date, Y = Severity)

Clinique cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/laboratorio-petrizzio.jpeg
Laboratorio Petrizzio
Incidents

No Incident

https://images.rankiteo.com/companyimages/clinique.jpeg
Clinique
Incidents

Date Detected: 7/2023
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog

Date Detected: 5/2023
Type:Breach
Attack Vector: External System Breach
Blog: Blog

FAQ

Clinique company company demonstrates a stronger AI risk posture compared to Laboratorio Petrizzio company company, reflecting its advanced AI governance and monitoring frameworks.

Clinique company has historically faced a number of disclosed cyber incidents, whereas Laboratorio Petrizzio company has not reported any.

In the current year, Clinique company and Laboratorio Petrizzio company have not reported any cyber incidents.

Neither Clinique company nor Laboratorio Petrizzio company has reported experiencing a ransomware attack publicly.

Clinique company has disclosed at least one data breach, while Laboratorio Petrizzio company has not reported such incidents publicly.

Neither Clinique company nor Laboratorio Petrizzio company has reported experiencing targeted cyberattacks publicly.

Neither Laboratorio Petrizzio company nor Clinique company has reported experiencing or disclosing vulnerabilities publicly.

Clinique company has more subsidiaries worldwide compared to Laboratorio Petrizzio company.

Clinique company employs more people globally than Laboratorio Petrizzio company, reflecting its scale as a Personal Care Product Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.4.3.15 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 update 15 through update 92 allow remote attackers to inject arbitrary web script or HTML via crafted payload injected into a Terms and Condition's Name text field to (1) Payment Terms, or (2) the Delivery Term on the view order page.

Risk Information
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in PHPGurukul Beauty Parlour Management System 1.1. This affects an unknown part of the file /admin/invoices.php. Performing manipulation of the argument delid results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/customer-list.php. Such manipulation of the argument delid leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.

Risk Information
cvss2
Base: 1.7
Severity: LOW
AV:L/AC:L/Au:S/C:N/I:N/A:P
cvss3
Base: 3.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Cross-site scripting (XSS) vulnerability in the Commerce Search Result widget in Liferay Portal 7.4.0 through 7.4.3.111, and Liferay DXP 2023.Q4 before patch 6, 2023.Q3 before patch 9, and 7.4 GA through update 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Commerce Product's Name text field.

Risk Information
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X