Comparison Overview

O Boticário

VS

L'Oréal

O Boticário

Av. Rui Barbosa, 4.110, Parque das Fontes,, São José dos Pinhais, PR, 83.050-010, BR
Last Update: 2025-12-12
Between 750 and 799

A beleza transforma, encanta, conquista e também pode ser conquistada. Eis o ideal de beleza que O Boticário multiplica com seus produtos, lojas e em sua relação com o público. Desde 1977, O Boticário soma inspiração, ousadia, inovação e qualidade, despertando o respeito do mercado, a confiança dos parceiros e a admiração dos consumidores. Conheça mais sobre O Boticário: Instagram: http://instagram.com/oboticario Facebook: http://www.facebook.com/oboticario Youtube: http://www.youtube.com/boticario Twitter: http://twitter.com/oboticario Loja Online: www.boticario.com.br

NAICS: 32562
NAICS Definition: Toilet Preparation Manufacturing
Employees: 19,719
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
0

L'Oréal

41, Rue Martre, None, Paris, None, FR, 92110
Last Update: 2025-12-18
Between 800 and 849

No.1 Beauty Group Worldwide. No.1 most innovative company in Europe (Fortune's ranking). We are 90K employees across 150 countries on five continents, united by our shared purpose: creating the beauty that moves the world. Our 37 international brands are divided into four unique Divisions: Luxe, Consumer Products, Dermatological Beauty, and Professional Products. This diverse portfolio includes brands like Kiehl’s, Lancôme, Giorgio Armani Beauty, Yves Saint Laurent Beauté, Ralph Lauren, Aesop, Maybelline New York, Essie, Kérastase, IT Cosmetics, Prada Beauty, Biotherm, Shu Uemura, Viktor&Rolf, Maison Margiela, Urban Decay, Redken, Vichy, La Roche-Posay, Diesel, Garnier, L’Oréal Paris, and more. For more than a century, L’Oréal has devoted itself solely to one business: beauty. We want to bring beauty to all people. Our goal is to win over another one billion consumers around the world by innovating and creating cosmetic and skincare products that meet the infinite diversity of their beauty needs and desires. That’s about us… now what about you? You are driven and up for a challenge! You’re passionate about putting your best foot forward, but you’re not afraid to fail either. You love to learn, grow and make an impact on the world. You can be an intern, or at a senior level position, we’re always looking for new people to join our teams. If you are ready to take charge of your career and join us, you’re one click away: https://careers.loreal.com/en_US/content Interested about our quest to the next billion consumers, follow us here to get the insider scoop on our business, culture, and tips on how to join us to shape the future of beauty. Freedom to go beyond, that’s the beauty of L’Oréal.

NAICS: 32562
NAICS Definition: Toilet Preparation Manufacturing
Employees: 88,983
Subsidiaries: 15
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/o-boticario.jpeg
O Boticário
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/loréal.jpeg
L'Oréal
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
O Boticário
100%
Compliance Rate
0/4 Standards Verified
L'Oréal
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Personal Care Product Manufacturing Industry Average (This Year)

No incidents recorded for O Boticário in 2025.

Incidents vs Personal Care Product Manufacturing Industry Average (This Year)

No incidents recorded for L'Oréal in 2025.

Incident History — O Boticário (X = Date, Y = Severity)

O Boticário cyber incidents detection timeline including parent company and subsidiaries

Incident History — L'Oréal (X = Date, Y = Severity)

L'Oréal cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/o-boticario.jpeg
O Boticário
Incidents

No Incident

https://images.rankiteo.com/companyimages/loréal.jpeg
L'Oréal
Incidents

No Incident

FAQ

L'Oréal company demonstrates a stronger AI Cybersecurity Score compared to O Boticário company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, L'Oréal company has disclosed a higher number of cyber incidents compared to O Boticário company.

In the current year, L'Oréal company and O Boticário company have not reported any cyber incidents.

Neither L'Oréal company nor O Boticário company has reported experiencing a ransomware attack publicly.

Neither L'Oréal company nor O Boticário company has reported experiencing a data breach publicly.

Neither L'Oréal company nor O Boticário company has reported experiencing targeted cyberattacks publicly.

Neither O Boticário company nor L'Oréal company has reported experiencing or disclosing vulnerabilities publicly.

Neither O Boticário nor L'Oréal holds any compliance certifications.

Neither company holds any compliance certifications.

L'Oréal company has more subsidiaries worldwide compared to O Boticário company.

L'Oréal company employs more people globally than O Boticário company, reflecting its scale as a Personal Care Product Manufacturing.

Neither O Boticário nor L'Oréal holds SOC 2 Type 1 certification.

Neither O Boticário nor L'Oréal holds SOC 2 Type 2 certification.

Neither O Boticário nor L'Oréal holds ISO 27001 certification.

Neither O Boticário nor L'Oréal holds PCI DSS certification.

Neither O Boticário nor L'Oréal holds HIPAA certification.

Neither O Boticário nor L'Oréal holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L