Comparison Overview

lori+lulu

VS

Gloria Jeans

lori+lulu

213 Centre Street, Amelia Island, Florida 32034, US
Last Update: 2025-03-13 (UTC)
Between 900 and 1000

Excellent

lori+lulu is a luxury multi-brand luxury women's clothing chain with locations in Florida, North & South Carolina. lori+lulu features laid-back luxury lifestyle brands with a bohemian chic feel. Our brands including Johnny Was, Hale Bob, DL1961 are mostly made in the USA. The concept was spawned by John & Lori Lecker who had owned United Colors of Benetton stores in the southeast for over 30 years & realized there was a giant niche in the market for contemporary comfortable looks with a great fit for the middle age + women.

NAICS: 452
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Gloria Jeans

Nizhniy Susal'nyy pereulok 5 Moscow, RU
Last Update: 2025-03-14 (UTC)

Excellent

Between 900 and 1000

Gloria Jeans is a vertically integrated retailer and leader in fast fashion segment in Russia and CIS countries since 1988 Now Gloria jeans is #1 brand by sales volume in Russia. Gloria Jeans designs, manufactures, and sells fashion apparel, footwear, and accessories for kids 1โ€“14 years and adults. Brand awareness of Gloria Jeans in Russia is 95% (as per McKinsey consulting company). Business model of the company is based on โ€œfast fashionโ€ concept implementation, which assumes timely product development, manufacturing, and selling the most fashion- able assortment at affordable prices. We are the fast fashion market leaders โ€ข 3 countries (Russia, Belorussia and Kazakhstan) โ€ข 660+ retail stores in 300+ cities โ€ข 15 000 employees in 2021 โ€ข 100+ mln visitors per year

NAICS: 452
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/lori-lulu.jpeg
lori+lulu
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/gloria-jeans.jpeg
Gloria Jeans
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
lori+lulu
100%
Compliance Rate
0/4 Standards Verified
Gloria Jeans
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Retail Industry Average (This Year)

No incidents recorded for lori+lulu in 2025.

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Gloria Jeans in 2025.

Incident History โ€” lori+lulu (X = Date, Y = Severity)

lori+lulu cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Gloria Jeans (X = Date, Y = Severity)

Gloria Jeans cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/lori-lulu.jpeg
lori+lulu
Incidents

No Incident

https://images.rankiteo.com/companyimages/gloria-jeans.jpeg
Gloria Jeans
Incidents

No Incident

FAQ

Both lori+lulu company and Gloria Jeans company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Gloria Jeans company has disclosed a higher number of cyber incidents compared to lori+lulu company.

In the current year, Gloria Jeans company and lori+lulu company have not reported any cyber incidents.

Neither Gloria Jeans company nor lori+lulu company has reported experiencing a ransomware attack publicly.

Neither Gloria Jeans company nor lori+lulu company has reported experiencing a data breach publicly.

Neither Gloria Jeans company nor lori+lulu company has reported experiencing targeted cyberattacks publicly.

Neither lori+lulu company nor Gloria Jeans company has reported experiencing or disclosing vulnerabilities publicly.

Neither lori+lulu company nor Gloria Jeans company has publicly disclosed detailed information about the number of their subsidiaries.

lori+lulu company employs more people globally than Gloria Jeans company, reflecting its scale as a Retail.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.

Risk Information
cvss2
Base: 1.7
Severity: LOW
AV:L/AC:L/Au:S/C:N/I:N/A:P
cvss3
Base: 3.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Campcodes Farm Management System 1.0. Affected by this issue is some unknown functionality. The manipulation results in file and directory information exposure. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X