
EDF Energy Services
Please visit EDF Energy North America, the new location for our company.



Please visit EDF Energy North America, the new location for our company.

Exelon Corporation (Nasdaq: EXC) is one of the nation’s largest utility companies, serving more than 10 million customers through six fully regulated utilities. We believe that reliable and affordable energy is essential to a brighter, more sustainable future. We are a FORTUNE 250 company operating across a large urban footprint, serving major metro areas in Delaware, the District of Columbia, Illinois, Maryland, New Jersey and Pennsylvania. Exelon is recognized as an industry leader with best-in-class operations, a firm commitment to maintaining energy affordability, a track record of top-quartile reliability performance, strong ESG leadership and principles, and a deep dedication to supporting and investing in the communities we serve.
Security & Compliance Standards Overview












No incidents recorded for EDF Energy Services in 2026.
No incidents recorded for Exelon in 2026.
EDF Energy Services cyber incidents detection timeline including parent company and subsidiaries
Exelon cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.