Comparison Overview

ZOLL TherOx

VS

Medline Industries, LP

ZOLL TherOx

Last Update: 2024-08-13 (UTC)
Between 800 and 900

Strong

TherOx is a part of ZOLL Medical Corporation. Based in San Jose, California, TherOx is focused on improving the treatment of heart attacks (acute myocardial infarction, or AMI). The company is commercializing SuperSaturated Oxygen (SSO2) Therapy for the sizeable AMI patient population to save hearts, improving and ultimately saving lives. SSO2 Therapy is based on the known benefits of hyperbaric oxygen treatment in improving the bodyโ€™s ability to heal. SSO2 Therapy infuses superoxygenated blood to improve microvascular flow after successful percutaneous coronary intervention (PCI) and has been shown to save heart muscle by reducing infarct size. Immediately after the coronary artery has been opened by PCI, SSO2 Therapy delivers a one-time, 60-minute infusion of the patientโ€™s superoxygenated blood to the targeted ischemic area of the heart through a small catheter. The superoxygenated blood helps reduce capillary swelling to restore blood flow to surrounding tissue and decrease infarct size. SSO2 Therapy is aligned with current guidelines for interventional cardiology procedures. SSO2 Therapy is indicated for the preparation and delivery of supersaturated oxygen to targeted ischemic regions perfused by the patientโ€™s left anterior descending coronary artery immediately following revascularization by means of percutaneous coronary intervention (PCI) with stenting that has been completed within six hours after the onset of anterior acute myocardial infarction (AMI) symptoms caused by a left anterior descending artery infarct lesion.

NAICS: 3391
NAICS Definition: Medical Equipment and Supplies Manufacturing
Employees: 36
Subsidiaries: 20
12-month incidents
0
Known data breaches
4
Attack type number
2

Medline Industries, LP

Three Lakes Drive, Northfield, IL, 60093, US
Last Update: 2025-03-04 (UTC)

Strong

Between 800 and 900

Medline is the largest provider of medical-surgical products and supply chain solutions serving all points of care. Through its unique offering of world-class products, supply chain resilience and clinical practice expertise, Medline delivers improved clinical, financial and operational outcomes. Headquartered in Northfield, Illinois, the company employs 43,000 people worldwide and operates in over 100 countries and territories. To learn more about how Medline makes healthcare run better, visit www.medline.com.

NAICS: 3391
NAICS Definition: Medical Equipment and Supplies Manufacturing
Employees: 16,474
Subsidiaries: 10
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/therox.jpeg
ZOLL TherOx
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/medline-industries.jpeg
Medline Industries, LP
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
ZOLL TherOx
100%
Compliance Rate
0/4 Standards Verified
Medline Industries, LP
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Medical Equipment Manufacturing Industry Average (This Year)

No incidents recorded for ZOLL TherOx in 2025.

Incidents vs Medical Equipment Manufacturing Industry Average (This Year)

No incidents recorded for Medline Industries, LP in 2025.

Incident History โ€” ZOLL TherOx (X = Date, Y = Severity)

ZOLL TherOx cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Medline Industries, LP (X = Date, Y = Severity)

Medline Industries, LP cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/therox.jpeg
ZOLL TherOx
Incidents

Date Detected: 11/2023
Type:Breach
Attack Vector: Phishing
Blog: Blog

Date Detected: 8/2023
Type:Breach
Attack Vector: Phishing
Blog: Blog

Date Detected: 1/2023
Type:Breach
Attack Vector: External System Hack
Blog: Blog
https://images.rankiteo.com/companyimages/medline-industries.jpeg
Medline Industries, LP
Incidents

No Incident

FAQ

Both ZOLL TherOx company and Medline Industries, LP company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

ZOLL TherOx company has historically faced a number of disclosed cyber incidents, whereas Medline Industries, LP company has not reported any.

In the current year, Medline Industries, LP company and ZOLL TherOx company have not reported any cyber incidents.

Neither Medline Industries, LP company nor ZOLL TherOx company has reported experiencing a ransomware attack publicly.

ZOLL TherOx company has disclosed at least one data breach, while the other Medline Industries, LP company has not reported such incidents publicly.

Neither Medline Industries, LP company nor ZOLL TherOx company has reported experiencing targeted cyberattacks publicly.

Neither ZOLL TherOx company nor Medline Industries, LP company has reported experiencing or disclosing vulnerabilities publicly.

ZOLL TherOx company has more subsidiaries worldwide compared to Medline Industries, LP company.

Medline Industries, LP company employs more people globally than ZOLL TherOx company, reflecting its scale as a Medical Equipment Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X