Comparison Overview

Office Star Products

VS

Decorative Wooden Poles

Office Star Products

undefined, Ontario, California, 91761, US
Last Update: 2025-11-26
Between 750 and 799

Office Star Products is a leading supplier of high quality, best-value furniture. With an extensive selection and in-stock availability, we simplify the furniture buying process, so you can effectively and efficiently save your customers time and money. Our corporate headquarters and main warehouses are located in two massive facilities in Ontario and Fontana, California; with additional locations in New Jersey, Kentucky, Texas, and Toronto, Canada, we provide efficient, cost effective delivery across all of North America. With over 30 years of experience and 200+ employees, we attribute our success to the dedicated women and men of our organization as well as the strong relationships developed with our partner factories and customers.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 143
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Decorative Wooden Poles

Linjakuja 2, Parikkala, 59100, FI
Last Update: 2025-11-21
Between 750 and 799

DECORATIVE WOODEN POLES by Tehomet - a Valmont Company Combining modern aesthetics with natural elements, Tehomet decorative wood pole brings a traditional material to streets and parks and a myriad of shapes and possibilities to lighting poles. Customers seeking to integrate decorative lighting into natural environmental settings are increasingly interested in these wooden lighting poles. Typical sites for the wooden poles are city park areas, play parks, day-care centers, historic urban settings and low-rise residential districts. Architects are able to achieve naturally inspired designs from this PEFC certified wood, which is sustainably harvested from the rich, fertile forests of Finland. The visible grain, surface texture and finishing options of wood result in countless product variations. Tehomet wood light poles have been delivered to over 30 countries with destinations as remote as the United States and New Zealand.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: None
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/office-star.jpeg
Office Star Products
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/woodenpoles.jpeg
Decorative Wooden Poles
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Office Star Products
100%
Compliance Rate
0/4 Standards Verified
Decorative Wooden Poles
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Office Star Products in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Decorative Wooden Poles in 2025.

Incident History — Office Star Products (X = Date, Y = Severity)

Office Star Products cyber incidents detection timeline including parent company and subsidiaries

Incident History — Decorative Wooden Poles (X = Date, Y = Severity)

Decorative Wooden Poles cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/office-star.jpeg
Office Star Products
Incidents

No Incident

https://images.rankiteo.com/companyimages/woodenpoles.jpeg
Decorative Wooden Poles
Incidents

No Incident

FAQ

Office Star Products company demonstrates a stronger AI Cybersecurity Score compared to Decorative Wooden Poles company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Decorative Wooden Poles company has disclosed a higher number of cyber incidents compared to Office Star Products company.

In the current year, Decorative Wooden Poles company and Office Star Products company have not reported any cyber incidents.

Neither Decorative Wooden Poles company nor Office Star Products company has reported experiencing a ransomware attack publicly.

Neither Decorative Wooden Poles company nor Office Star Products company has reported experiencing a data breach publicly.

Neither Decorative Wooden Poles company nor Office Star Products company has reported experiencing targeted cyberattacks publicly.

Neither Office Star Products company nor Decorative Wooden Poles company has reported experiencing or disclosing vulnerabilities publicly.

Neither Office Star Products nor Decorative Wooden Poles holds any compliance certifications.

Neither company holds any compliance certifications.

Decorative Wooden Poles company has more subsidiaries worldwide compared to Office Star Products company.

Neither Office Star Products nor Decorative Wooden Poles holds SOC 2 Type 1 certification.

Neither Office Star Products nor Decorative Wooden Poles holds SOC 2 Type 2 certification.

Neither Office Star Products nor Decorative Wooden Poles holds ISO 27001 certification.

Neither Office Star Products nor Decorative Wooden Poles holds PCI DSS certification.

Neither Office Star Products nor Decorative Wooden Poles holds HIPAA certification.

Neither Office Star Products nor Decorative Wooden Poles holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.