Vulnerabilities in ICONICS, Inc. software