Comparison Overview

Norriseal-WellMark

VS

Weatherford

Norriseal-WellMark

11122 West Little York Rd, Houston, TX, 77041, US
Last Update: 2025-03-05 (UTC)

Strong

Norriseal-Wellmark is an ISO 9001-certified manufacturer of engineered valve and control solutions, including control valves, angle-disc butterfly valves, safety relief valves, check valves, positioners, actuators, level controllers, transmitters, switches, pressure controllers and pressure regulators. Renowned for innovative design and dependable quality, our products are used worldwide in oil and gas applications, as well marine, power generation, HVAC and other industries. We are a solutions provider, backing our products with responsive customer service, in-depth applications assistance, and in-house engineering and technical support. To learn more, visit www.norrisealwellmark.com.

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 0
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
0

Weatherford

undefined, Dublin, undefined, undefined, IE
Last Update: 2025-05-06 (UTC)

Strong

Between 800 and 900

Weatherford International plc (Nasdaq: WFRD) is a leading global energy services company. Operating in approximately 75 countries, the Company answers the challenges of the energy industry with its global talent network of approximately 17,000 team members and approximately 350 operating locations, including manufacturing, research and development, service, and training facilities.

NAICS: 211
NAICS Definition: Oil and Gas Extraction
Employees: 29,461
Subsidiaries: 3
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/norriseal.jpeg
Norriseal-WellMark
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/weatherford.jpeg
Weatherford
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Norriseal-WellMark
100%
Compliance Rate
0/4 Standards Verified
Weatherford
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for Norriseal-WellMark in 2025.

Incidents vs Oil and Gas Industry Average (This Year)

No incidents recorded for Weatherford in 2025.

Incident History โ€” Norriseal-WellMark (X = Date, Y = Severity)

Norriseal-WellMark cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Weatherford (X = Date, Y = Severity)

Weatherford cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/norriseal.jpeg
Norriseal-WellMark
Incidents

No Incident

https://images.rankiteo.com/companyimages/weatherford.jpeg
Weatherford
Incidents

No Incident

FAQ

Both Norriseal-WellMark company and Weatherford company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Weatherford company has disclosed a higher number of cyber incidents compared to Norriseal-WellMark company.

In the current year, Weatherford company and Norriseal-WellMark company have not reported any cyber incidents.

Neither Weatherford company nor Norriseal-WellMark company has reported experiencing a ransomware attack publicly.

Neither Weatherford company nor Norriseal-WellMark company has reported experiencing a data breach publicly.

Neither Weatherford company nor Norriseal-WellMark company has reported experiencing targeted cyberattacks publicly.

Neither Norriseal-WellMark company nor Weatherford company has reported experiencing or disclosing vulnerabilities publicly.

Norriseal-WellMark company has more subsidiaries worldwide compared to Weatherford company.

Weatherford company employs more people globally than Norriseal-WellMark company, reflecting its scale as a Oil and Gas.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X