Known Vulnerabilities in PI ProcessBook