Comparison Overview

Sunair Vakanties

VS

Carnival Cruise Line

Sunair Vakanties

Raoul Wallenbergplein 27, Alphen aan den Rijn, Zuid-Holland, 3074HN, NL
Last Update: 2025-03-15 (UTC)
Between 900 and 1000

Excellent

Sunair Vakanties is een middelgrote zelfstandige Nederlandse reisorganisatie, gespecialiseerd in Stedenvakanties en reizen naar de Kanaaleilanden. Vanuit ons kantoor in Alphen aan den Rijn werken wij met een enthousiast en gedreven team van 30 collegaโ€™s aan ons product; van het bedenken van de vakanties, het inkopen ervan, het samenstellen van de brochures en onze websites Sunair.nl en Stedentrips.nl, het verkopen, zowel via de ANVR reisbureaus als rechtstreeks aan consumenten. Onze organisatie kenmerkt zich door de informele sfeer, korte lijnen en flexibele en daadkrachtige instelling.

NAICS: 561
NAICS Definition:
Employees: 37
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Carnival Cruise Line

3655 NW 87th Avenue, Miami, Florida, 33178, US
Last Update: 2025-03-04 (UTC)

Excellent

Between 900 and 1000

Since our founding in 1972, Carnival Cruise Line โ€” "The Worldโ€™s Most Popular Cruise Lineยฎโ€ โ€” carries millions of passengers every year. We offer a fun and unique career destination for a wide range of professionals in Marketing, IT, Accounting/Audit, Finance, Marine Operations and Human Resources, just to mention a few. We also offer remote opportunities flexibility for select positions. Headquartered in sunny South Florida, team members have access to a multi-station cafeteria, Starbucks (with cafecitos! - It's a Miami thing...), car wash, on-site gas delivery service, Carnival Care Center for preventative and sick care, dry-cleaning pick-up, on-site Day Care Center, and a full-service gym. We offer top of line benefits including: health, dental, 401K matching, commitment to continued learning & development, employee stock purchase discount, cruise discounts for employees and more! We are committed to a culture of diversity, equity and inclusion for our shoreside and shipboard team members, as well as our guests. We are proud to be part of a family of companies owned by Carnival Corporation & plc, a Fortune 200 Company, which includes sister lines Princess Cruises, Holland America Line and Cunard Line, among others. We pride ourselves on delivering fun, memorable vacations to our guests by offering a wide array of quality cruises which present outstanding value for the money.

NAICS: 5615
NAICS Definition: Travel Arrangement and Reservation Services
Employees: 24,594
Subsidiaries: 23
12-month incidents
0
Known data breaches
7
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/sunair.jpeg
Sunair Vakanties
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/carnival-cruise-lines.jpeg
Carnival Cruise Line
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Sunair Vakanties
100%
Compliance Rate
0/4 Standards Verified
Carnival Cruise Line
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Sunair Vakanties in 2025.

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Carnival Cruise Line in 2025.

Incident History โ€” Sunair Vakanties (X = Date, Y = Severity)

Sunair Vakanties cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Carnival Cruise Line (X = Date, Y = Severity)

Carnival Cruise Line cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/sunair.jpeg
Sunair Vakanties
Incidents

No Incident

https://images.rankiteo.com/companyimages/carnival-cruise-lines.jpeg
Carnival Cruise Line
Incidents

Date Detected: 3/2021
Type:Breach
Attack Vector: Email Account Compromise
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email (phishing or credential compromise)
Blog: Blog

FAQ

Both Sunair Vakanties company and Carnival Cruise Line company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Carnival Cruise Line company has historically faced a number of disclosed cyber incidents, whereas Sunair Vakanties company has not reported any.

In the current year, Carnival Cruise Line company and Sunair Vakanties company have not reported any cyber incidents.

Carnival Cruise Line company has confirmed experiencing a ransomware attack, while Sunair Vakanties company has not reported such incidents publicly.

Carnival Cruise Line company has disclosed at least one data breach, while Sunair Vakanties company has not reported such incidents publicly.

Neither Carnival Cruise Line company nor Sunair Vakanties company has reported experiencing targeted cyberattacks publicly.

Neither Sunair Vakanties company nor Carnival Cruise Line company has reported experiencing or disclosing vulnerabilities publicly.

Carnival Cruise Line company has more subsidiaries worldwide compared to Sunair Vakanties company.

Carnival Cruise Line company employs more people globally than Sunair Vakanties company, reflecting its scale as a Travel Arrangements.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X