
Objectif Lune
Nous diffusons une méthode que nous avons élaboré depuis deux ans, pour vous aider à atteindre vos objectifs



Nous diffusons une méthode que nous avons élaboré depuis deux ans, pour vous aider à atteindre vos objectifs

Ayesa is a global provider of technology and engineering services with more than 11500 employees in twenty-three countries across Europe, Latin America, Africa and Asia. The company develops and implements digital solutions for the private and public sector and uses the latest technology to provide cutting-edge infrastructure design and supervision services. To do this, it has certified experts covering more than 70 different disciplines in utilities and energy; the public sector; banking and insurance; water and the environment, transportation; aeronautics and defence; and construction. As a company that is driven by people and innovation, its business approach is underpinned by talent.
Security & Compliance Standards Overview












No incidents recorded for Objectif Lune in 2026.
No incidents recorded for Ayesa in 2026.
Objectif Lune cyber incidents detection timeline including parent company and subsidiaries
Ayesa cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.