📦 Process Optimization
by Aveva
🔍 What is Process Optimization?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows authenticated standard users to trick Process Optimization services into loading arbitrary code, leading to privilege escalation to system-level access. This could result in ...
The Process Optimization application suite uses unencrypted communication channels by default, allowing attackers to intercept, modify, or steal sensitive data through man-in-the-middle attacks. This ...
This vulnerability allows authenticated Process Optimization Designer users to embed OLE objects into graphics, which can escalate their privileges to the identity of any user who interacts with those...