The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of AlarmWorX32

ICONICS GENESIS32/GENESIS64: multiple vulnerabilities
An attacker can use several vulnerabilities of ICONICS GENESIS32/GENESIS64...
CVE-2020-12007, CVE-2020-12009, CVE-2020-12011, CVE-2020-12013, CVE-2020-12015, ICSA-20-170-03, VIGILANCE-VUL-32668, ZDI-20-777, ZDI-20-778, ZDI-20-779, ZDI-20-780, ZDI-20-800
ICONICS WebHMI: directory traversal
An attacker can traverse directories of ICONICS WebHMI, in order to read a file outside the service root path...
CVE-2016-2289, ICSA-16-091-01, VIGILANCE-VUL-19281
ICONICS GENESIS32: code execution via IcoLaunch.dll
An attacker can invite the victim to display an HTML page calling IcoLaunch.dll of ICONICS GENESIS32, in order to execute code on his computer...
BID-65706, CVE-2014-0758, ICSA-14-051-01, VIGILANCE-VUL-14287
ICONICS GENESIS32: privilege elevation via Security Configurator
A local attacker can use a vulnerability of ICONICS GENESIS32 and BizViz applications, in order to elevate his privileges...
BID-54732, CVE-2012-3018, ICSA-12-212-01, VIGILANCE-VUL-11809
Our database contains other pages. You can request a free trial to read them.