Comparison Overview

Norriseal-WellMark

VS

ConocoPhillips

Norriseal-WellMark

11122 West Little York Rd, Houston, TX, 77041, US
Last Update: 2025-03-05 (UTC)

Strong

Norriseal-Wellmark is an ISO 9001-certified manufacturer of engineered valve and control solutions, including control valves, angle-disc butterfly valves, safety relief valves, check valves, positioners, actuators, level controllers, transmitters, switches, pressure controllers and pressure regulators. Renowned for innovative design and dependable quality, our products are used worldwide in oil and gas applications, as well marine, power generation, HVAC and other industries. We are a solutions provider, backing our products with responsive customer service, in-depth applications assistance, and in-house engineering and technical support. To learn more, visit www.norrisealwellmark.com.

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 0
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
0

ConocoPhillips

925 N Eldridge Pkwy, Houston, Texas, 77079, US
Last Update: 2025-05-06 (UTC)

We are a global oil and gas company tasked with an important job—to safely find and deliver energy for the world. We’re experts in what we do—from the well site to the office. Across our operations and activities in 13 countries, we never forget our responsibility to be a great neighbor, and a great place to work. Guided by our SPIRIT Values—Safety, People, Integrity, Responsibility, Innovation and Teamwork—we deliver strong performance, keeping our promises to our stakeholders, communities and each other. We solve problems and develop new approaches together, as a team of people—not job titles. That’s ConocoPhillips. It’s not just what we do. It’s how we do it. At ConocoPhillips, we believe it is important to foster a safe and constructive online environment for our community. To do so, we encourage visitors to contribute to conversations by following a few guidelines: - Please contribute to the dialogue by keeping your comments relevant to the community and on topic. - Direct your comments at issues, rather than individuals. Any of the following violations of these guidelines may warrant, without prior notice, actions such as removing posts and comments or blocking an account: - Comments that are spam, defamatory or offensive (e.g., obscene, indecent, profane, violent, cruel or discriminatory) will be removed. - Content that violates the terms of use stipulated by each social media operating company. - Any other behavior ConocoPhillips deems inappropriate. Community policy: https://bit.ly/3mrTG4d

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 16,610
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/norriseal.jpeg
Norriseal-WellMark
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/conocophillips.jpeg
ConocoPhillips
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Norriseal-WellMark
100%
Compliance Rate
0/4 Standards Verified
ConocoPhillips
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for Norriseal-WellMark in 2025.

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for ConocoPhillips in 2025.

Incident History — Norriseal-WellMark (X = Date, Y = Severity)

Norriseal-WellMark cyber incidents detection timeline including parent company and subsidiaries

Incident History — ConocoPhillips (X = Date, Y = Severity)

ConocoPhillips cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/norriseal.jpeg
Norriseal-WellMark
Incidents

No Incident

https://images.rankiteo.com/companyimages/conocophillips.jpeg
ConocoPhillips
Incidents

No Incident

FAQ

Both Norriseal-WellMark company and ConocoPhillips company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, ConocoPhillips company has disclosed a higher number of cyber incidents compared to Norriseal-WellMark company.

In the current year, ConocoPhillips company and Norriseal-WellMark company have not reported any cyber incidents.

Neither ConocoPhillips company nor Norriseal-WellMark company has reported experiencing a ransomware attack publicly.

Neither ConocoPhillips company nor Norriseal-WellMark company has reported experiencing a data breach publicly.

Neither ConocoPhillips company nor Norriseal-WellMark company has reported experiencing targeted cyberattacks publicly.

Neither Norriseal-WellMark company nor ConocoPhillips company has reported experiencing or disclosing vulnerabilities publicly.

Norriseal-WellMark company has more subsidiaries worldwide compared to ConocoPhillips company.

ConocoPhillips company employs more people globally than Norriseal-WellMark company, reflecting its scale as a Oil and Gas.

Latest Global CVEs (Not Company-Specific)

Description

Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience. If an attacker learns the victim’s actual user.id, they can craft an arbitrary JWT with an alg: "none" header and use it to authenticate and reset the victim’s password. This issue has been patched in version 4.0.1.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Description

Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies. This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
Description

A security vulnerability has been detected in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /consulta-dispensas. Such manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /module/Api/aluno. This manipulation of the argument aluno_id causes improper authorization. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tencent WeKnora 0.1.0. This impacts the function testEmbeddingModel of the file /api/v1/initialization/embedding/test. The manipulation of the argument baseUrl results in server-side request forgery. The attack can be launched remotely. The exploit has been released to the public and may be exploited. It is advisable to upgrade the affected component. The vendor responds: "We have confirmed that the issue mentioned in the report does not exist in the latest releases".

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X