
Nuovo Pignone
https://onlinecareer360.com/



https://onlinecareer360.com/

Anhar Company, Established in 1974, after 44 years of experience has been transformed to the leading contractor in several field in Iran. From the establishment the founders had ambitious goal to change the local company to a well-known contractor in country and now they are thinking about becoming an international known contractor. In 2017, Anhar Co. awarded 3 first grade of contractor works in Instrumentation, Construction and Oil & Gas from the Vice-Presidency for strategic planning and supervision of Iran. These high rankings are an indication of the company’s proficiency in mentioned field which its implemented projects are exemplary throughout Iran. Anhar Co., joined APEC (Association of Petroleum Industry Engineering & Construction Companies) in 2002 and attempts to take part in cooperative activities which led to forming Energy Pouya Co. with some credible contractors of this association. Some Gas Compressor Stations, Quite few Oil & Gas pipelines, Several Constructions are only some of Anhar Co. projects direction through this 44 years.
Security & Compliance Standards Overview












No incidents recorded for Nuovo Pignone in 2025.
No incidents recorded for Anhar Company in 2025.
Nuovo Pignone cyber incidents detection timeline including parent company and subsidiaries
Anhar Company cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.