Comparison Overview

Van Aarsen International

VS

Shantui Group, China

Van Aarsen International

Heelderweg 11 Panheel, Limburg 6097 EW, NL
Last Update: 2025-03-16 (UTC)
Between 900 and 1000

Excellent

Van Aarsen develops, manufactures, and supplies state-of-the-art machines and complete feed mill and premix plant solutions. Our customers include integrators, commercial feed producers, and manufacturers of premix and concentrates worldwide. With our proven technology and industry expertise, we help feed mills optimize efficiency, reduce costs, and ensure feed safety. Operating in the agro-feed chain, we understand the importance of cost efficiency, hygiene, safety, and sustainability. Our innovative solutions are designed to increase production capacity while minimizing energy consumption and operational costs. By focusing on reliability, feed quality, and ease of operation, we help our customers achieve long-term operational excellence. More than just a supplier, we are a trusted partner. Through continuous innovation and close collaboration, we provide tailored solutions that meet todayโ€šร„รดs demands and anticipate tomorrowโ€šร„รดs challenges. Van Aarsen - Beyond Expectations

NAICS: 333
NAICS Definition:
Employees: 51-200
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Shantui Group, China

None
Last Update: 2025-05-04 (UTC)

Excellent

Between 900 and 1000

Founded in 1980, Shantui Construction Machinery Co. Ltd. not only rode the wave of Chinaโ€™s spectacular economic development over the past 25 years but also helped to create it. Originally a fully state-owned company, Shantui today is a public company that is well on its way to becoming one of Chinaโ€™s top multinational firms. With sales in more than 120 countries round the globe, Shantui is also leading the way as one of Chinaโ€™s top global brands. Originally known as a bulldozer company, Shantui today features the entire gamut of construction machinery, from wheel loaders and excavators, to graders, rollers, pipelayers, cement trucks, forklifts and much more. The bulldozer remains Shantuiโ€™s flagship product, as the company has become the worldโ€™s second or third largest brand-maker of this top-of-the-line product in the construction machinery industry. In China alone Shantui holds a 65% market share in bulldozers. Currently Shantui has 12 holding subsidiaries and 2 joint stock subsidiaries. Shantui has established an industry leading Research & Development Center and a Post-Doctoral Research Lab. At present, annual manufacturing and sales capabilities are up to 9,000 units of bulldozers, 1,000 units of road machinery, 1,000 units of concrete machinery, 67,000 sets of crawler assemblies, 50,000 units of hydraulic torque converters, 15,000 units of transmissions, and 540,000 roller kits.

NAICS: 333
NAICS Definition: Machinery Manufacturing
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/van-aarsen-international.jpeg
Van Aarsen International
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Shantui Group, China
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Van Aarsen International
100%
Compliance Rate
0/4 Standards Verified
Shantui Group, China
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Machinery Manufacturing Industry Average (This Year)

No incidents recorded for Van Aarsen International in 2025.

Incidents vs Machinery Manufacturing Industry Average (This Year)

No incidents recorded for Shantui Group, China in 2025.

Incident History โ€” Van Aarsen International (X = Date, Y = Severity)

Van Aarsen International cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Shantui Group, China (X = Date, Y = Severity)

Shantui Group, China cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/van-aarsen-international.jpeg
Van Aarsen International
Incidents

No Incident

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Shantui Group, China
Incidents

No Incident

FAQ

Both Van Aarsen International company and Shantui Group, China company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Shantui Group, China company has disclosed a higher number of cyber incidents compared to Van Aarsen International company.

In the current year, Shantui Group, China company and Van Aarsen International company have not reported any cyber incidents.

Neither Shantui Group, China company nor Van Aarsen International company has reported experiencing a ransomware attack publicly.

Neither Shantui Group, China company nor Van Aarsen International company has reported experiencing a data breach publicly.

Neither Shantui Group, China company nor Van Aarsen International company has reported experiencing targeted cyberattacks publicly.

Neither Van Aarsen International company nor Shantui Group, China company has reported experiencing or disclosing vulnerabilities publicly.

Neither Van Aarsen International company nor Shantui Group, China company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Van Aarsen International company nor Shantui Group, China company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

A flaw has been found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/supplier_add.php. Executing manipulation of the argument supp_email can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/product_add.php. Performing manipulation of the argument prod_name results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in code-projects Voting System 1.0. This affects an unknown function of the file /admin/voters_add.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MongoDB Connector for BI installation viaย MSIย on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24.

Risk Information
cvss4
Base: 8.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X