Comparison Overview

Living Wellness LLC

VS

osakidetza

Living Wellness LLC

Springfield, US
Last Update: 2025-03-14 (UTC)
Between 900 and 1000

Excellent

Has life become a balancing act where you are juggling your life, work, and family and only dream of a time when you can breathe and read your favorite book without always having to multitask? It doesn’t have to be this way. When you focus on prioritizing your needs, letting go of overthinking and relying on your own wisdom you CAN find more time, feel in control, and drop stress so that you can live a life on purpose. If you are ready to take back control without adding more to-do’s, I can help.

NAICS: 713
NAICS Definition:
Employees: 1 employee
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

osakidetza

c/ Olagibel 38 Vitoria-Gasteiz, Araba 01004, ES
Last Update: 2025-03-14 (UTC)

Excellent

Osakidetza ha mantenido desde su creación una vigilancia constante en todos los aspectos relacionados con sus señas de identidad, con la finalidad de proyectar hacia la sociedad una imagen corporativa que facilite la identificación de las referencias visuales y de los mensajes promovidos por este Ente Público. Las necesidades técnicas y comunicativas que han surgido con el paso del tiempo son los factores principales que han condicionado la creación de un nuevo Manual de Identidad Corporativa en aras de impulsar la línea estratégica de normalización y consolidación de una identidad común en todas las organizaciones que conforman la red de Osakidetza.

NAICS: 713
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/living-wellness.jpeg
Living Wellness LLC
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/osakidetza.jpeg
osakidetza
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Living Wellness LLC
100%
Compliance Rate
0/4 Standards Verified
osakidetza
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Wellness and Fitness Services Industry Average (This Year)

No incidents recorded for Living Wellness LLC in 2025.

Incidents vs Wellness and Fitness Services Industry Average (This Year)

No incidents recorded for osakidetza in 2025.

Incident History — Living Wellness LLC (X = Date, Y = Severity)

Living Wellness LLC cyber incidents detection timeline including parent company and subsidiaries

Incident History — osakidetza (X = Date, Y = Severity)

osakidetza cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/living-wellness.jpeg
Living Wellness LLC
Incidents

No Incident

https://images.rankiteo.com/companyimages/osakidetza.jpeg
osakidetza
Incidents

No Incident

FAQ

Both Living Wellness LLC company and osakidetza company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, osakidetza company has disclosed a higher number of cyber incidents compared to Living Wellness LLC company.

In the current year, osakidetza company and Living Wellness LLC company have not reported any cyber incidents.

Neither osakidetza company nor Living Wellness LLC company has reported experiencing a ransomware attack publicly.

Neither osakidetza company nor Living Wellness LLC company has reported experiencing a data breach publicly.

Neither osakidetza company nor Living Wellness LLC company has reported experiencing targeted cyberattacks publicly.

Neither Living Wellness LLC company nor osakidetza company has reported experiencing or disclosing vulnerabilities publicly.

Neither Living Wellness LLC company nor osakidetza company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Living Wellness LLC company nor osakidetza company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

A flaw has been found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/supplier_add.php. Executing manipulation of the argument supp_email can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/product_add.php. Performing manipulation of the argument prod_name results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in code-projects Voting System 1.0. This affects an unknown function of the file /admin/voters_add.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.

Risk Information
cvss4
Base: 8.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X