The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of GraphWorX32

ICONICS WebHMI: directory traversal
An attacker can traverse directories of ICONICS WebHMI, in order to read a file outside the service root path...
CVE-2016-2289, ICSA-16-091-01, VIGILANCE-VUL-19281
ICONICS GENESIS32: code execution via IcoLaunch.dll
An attacker can invite the victim to display an HTML page calling IcoLaunch.dll of ICONICS GENESIS32, in order to execute code on his computer...
BID-65706, CVE-2014-0758, ICSA-14-051-01, VIGILANCE-VUL-14287
ICONICS GENESIS32: privilege elevation via Security Configurator
A local attacker can use a vulnerability of ICONICS GENESIS32 and BizViz applications, in order to elevate his privileges...
BID-54732, CVE-2012-3018, ICSA-12-212-01, VIGILANCE-VUL-11809
Our database contains other pages. You can request a free trial to read them.