No analysis available yet.
Vendor Solution
Ovarro recommends affected users update to 12.5 or later of TWinSoft to mitigate these vulnerabilities. The latest version can be found on www.ovarro.com in the customer support section (service portal).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-9786 | An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution. |
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-054-04 |
|
Thu, 17 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-17T15:49:09.268Z
Reserved: 2021-01-05T00:00:00.000Z
Link: CVE-2021-22650
Updated: 2024-08-03T18:51:05.834Z
Status : Modified
Published: 2022-07-28T15:15:07.477
Modified: 2025-04-17T16:15:22.643
Link: CVE-2021-22650
No data.
OpenCVE Enrichment
No data.
EUVD