Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
iconics bizviz 9.21 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2011-2089
Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x prior to 9.22 and GENESIS32 9.x prior to 9.22 allows remote malicious users to execute arbitrary code via a long s...
Iconics Bizviz 9.21
Iconics Bizviz 9.20
Iconics Bizviz 9.0
Iconics Bizviz 9.1
Iconics Bizviz 9.2
Iconics Bizviz 9.01
Iconics Bizviz 9.13
Iconics Genesis32 9.21
Iconics Genesis32 9.20
Iconics Genesis32 9.2
Iconics Genesis32 9.01
Iconics Genesis32 9.13
Iconics Genesis32 9.1
Iconics Genesis32 9.0
2 EDB exploits
4.4
CVSSv2
CVE-2012-3018
The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and previous versions and BizViz 9.22 and previous versions uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended ac...
Iconics Genesis32
Iconics Genesis32 9.13
Iconics Genesis32 9.21
Iconics Genesis32 9.0
Iconics Genesis32 9.2
Iconics Genesis32 9.20
Iconics Genesis32 9.1
Iconics Genesis32 9.01
Iconics Genesis32 8.05
Iconics Bizviz 9.20
Iconics Bizviz 8.05
Iconics Bizviz 9.0
Iconics Bizviz 9.1
Iconics Bizviz 9.01
Iconics Bizviz 9.13
Iconics Bizviz
Iconics Bizviz 9.21
Iconics Bizviz 9.2
9.3
CVSSv2
CVE-2011-5088
The GENESIS32 IcoSetServer ActiveX control in ICONICS GENESIS32 9.21 and BizViz 9.21 configures the trusted zone on the basis of user input, which allows remote malicious users to execute arbitrary code via a crafted web site, related to a "Workbench32/WebHMI component SetTr...
Iconics Genesis32 9.21
Iconics Bizviz 9.21
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started