Comparison Overview

Norriseal-WellMark

VS

NOV

Norriseal-WellMark

11122 West Little York Rd, Houston, TX, 77041, US
Last Update: 2025-03-05 (UTC)

Strong

Norriseal-Wellmark is an ISO 9001-certified manufacturer of engineered valve and control solutions, including control valves, angle-disc butterfly valves, safety relief valves, check valves, positioners, actuators, level controllers, transmitters, switches, pressure controllers and pressure regulators. Renowned for innovative design and dependable quality, our products are used worldwide in oil and gas applications, as well marine, power generation, HVAC and other industries. We are a solutions provider, backing our products with responsive customer service, in-depth applications assistance, and in-house engineering and technical support. To learn more, visit www.norrisealwellmark.com.

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 0
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
0

NOV

10353 Richmond Ave, Houston, Texas, 77042, US
Last Update: 2025-05-06 (UTC)

Strong

Between 800 and 900

NOV delivers technology-driven solutions to empower the global energy industry. For more than 150 years, NOV has pioneered innovations that enable its customers to safely produce abundant energy while minimizing environmental impact. The energy industry depends on NOVโ€™s deep expertise and technology to continually improve oilfield operations and assist in efforts to advance the energy transition towards a more sustainable future. NOV powers the industry that powers the world.

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 34,809
Subsidiaries: 21
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/norriseal.jpeg
Norriseal-WellMark
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/national-oilwell-varco.jpeg
NOV
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Norriseal-WellMark
100%
Compliance Rate
0/4 Standards Verified
NOV
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for Norriseal-WellMark in 2025.

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for NOV in 2025.

Incident History โ€” Norriseal-WellMark (X = Date, Y = Severity)

Norriseal-WellMark cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” NOV (X = Date, Y = Severity)

NOV cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/norriseal.jpeg
Norriseal-WellMark
Incidents

No Incident

https://images.rankiteo.com/companyimages/national-oilwell-varco.jpeg
NOV
Incidents

No Incident

FAQ

Both Norriseal-WellMark company and NOV company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, NOV company has disclosed a higher number of cyber incidents compared to Norriseal-WellMark company.

In the current year, NOV company and Norriseal-WellMark company have not reported any cyber incidents.

Neither NOV company nor Norriseal-WellMark company has reported experiencing a ransomware attack publicly.

Neither NOV company nor Norriseal-WellMark company has reported experiencing a data breach publicly.

Neither NOV company nor Norriseal-WellMark company has reported experiencing targeted cyberattacks publicly.

Neither Norriseal-WellMark company nor NOV company has reported experiencing or disclosing vulnerabilities publicly.

NOV company has more subsidiaries worldwide compared to Norriseal-WellMark company.

NOV company employs more people globally than Norriseal-WellMark company, reflecting its scale as a Oil and Gas.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X