Comparison Overview

Menagerie

VS

Detour Design

Menagerie

None
Last Update: 2025-12-03
Between 800 and 849

Hello there So, firstly, my name's Andy Doran, my company name is Menagerie and I basically make things on the screen look good and sometimes move around. As a design student I was a Royal Society of Arts Finalist and a member of the Manchester Creative Circle. I had my first taste of the industry at BDH Advertising, worked round a few other design studios and agencies, ran the graphic design department at Telewest and then jumped headfirst into the world of freelance design. Along the way I've built up a direct client list, learnt more things, learnt what not to do, welcomed and embraced the internet, designed, maintained and hosted websites, directed and animated music videos for broadcast, worked as freelancer for Code Computerlove, Love Creative, Iris Nation, The Chase, True North, Creative Lynx, Epigram and others, met lots of good people, composed and recorded soundtracks for animation and video, learnt how to code in actionscript and xhtml, produced motion graphics sequences and 3d scenarios, perfected my tea making abilities...[pause for breath...]

NAICS: 54143
NAICS Definition: Graphic Design Services
Employees: 16
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Detour Design

34 Delhi St, Adelaide, 5000, AU
Last Update: 2025-12-03

Detour is a graphic design studio that provides an experienced visual communication journey and brand direction through impressive ideas and design solutions for your business and brand. We believe that great design is integral to business success. With over 20 years of experience Detour offers creative, skilled, practical & affordable, strategic design that helps achieve that success. We have developed a ”Map” or process to help guide us: We listen & ask, we diagnose & prescribe. Then we create, solve & realise. By using our “Map”, we are able to respond to any brief, large or small, with knowledge, strategic agility and relevance. Our “Map” also give each of our team members the ability to manage their projects, over seen by a Creative Director. No account managers here. You work directly with “your” designer. We look forward to working with you.

NAICS: 54143
NAICS Definition: Graphic Design Services
Employees: 5
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/menagerie.jpeg
Menagerie
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/detour-design.jpeg
Detour Design
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Menagerie
100%
Compliance Rate
0/4 Standards Verified
Detour Design
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for Menagerie in 2025.

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for Detour Design in 2025.

Incident History — Menagerie (X = Date, Y = Severity)

Menagerie cyber incidents detection timeline including parent company and subsidiaries

Incident History — Detour Design (X = Date, Y = Severity)

Detour Design cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/menagerie.jpeg
Menagerie
Incidents

No Incident

https://images.rankiteo.com/companyimages/detour-design.jpeg
Detour Design
Incidents

No Incident

FAQ

Menagerie company demonstrates a stronger AI Cybersecurity Score compared to Detour Design company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Detour Design company has disclosed a higher number of cyber incidents compared to Menagerie company.

In the current year, Detour Design company and Menagerie company have not reported any cyber incidents.

Neither Detour Design company nor Menagerie company has reported experiencing a ransomware attack publicly.

Neither Detour Design company nor Menagerie company has reported experiencing a data breach publicly.

Neither Detour Design company nor Menagerie company has reported experiencing targeted cyberattacks publicly.

Neither Menagerie company nor Detour Design company has reported experiencing or disclosing vulnerabilities publicly.

Neither Menagerie nor Detour Design holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Menagerie company nor Detour Design company has publicly disclosed detailed information about the number of their subsidiaries.

Menagerie company employs more people globally than Detour Design company, reflecting its scale as a Graphic Design.

Neither Menagerie nor Detour Design holds SOC 2 Type 1 certification.

Neither Menagerie nor Detour Design holds SOC 2 Type 2 certification.

Neither Menagerie nor Detour Design holds ISO 27001 certification.

Neither Menagerie nor Detour Design holds PCI DSS certification.

Neither Menagerie nor Detour Design holds HIPAA certification.

Neither Menagerie nor Detour Design holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X