
East Delta Electricity Production Company
None



None

On 04 January 2018, AREVA NP, became Framatome, a designer, supplier and installer of nuclear steam supply systems. Framatome contributes to the design of power plants, supplies the nuclear steam supply system, designs and manufactures components and fuels, integrates the instrumentation and control systems and carries out the maintenance of in-service nuclear reactors. It delivers its high-performance products and services to customers all over the world. Framatome confirms its recognized manufacturer’s ambition: being the supplier of safe and competitive nuclear solutions, supporting its electrical utility customers all over the world. Framatome employees have recognized skills, a know-how that was forged over the long history of the company and that has enabled us to build outstanding industrial success in France and internationally. Framatome places its faith in the expertise of the women and the men who are at its very core: this expertise underpins the company's strategy and is key to serving the needs of its customers and furthering the success of the nuclear industry. For more information on Framatome, please visit: https://www.framatome.com/
Security & Compliance Standards Overview












No incidents recorded for East Delta Electricity Production Company in 2025.
No incidents recorded for AREVA NP in 2025.
East Delta Electricity Production Company cyber incidents detection timeline including parent company and subsidiaries
AREVA NP cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.