Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-9786 | An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution. |
Solution
Ovarro recommends affected users update to 12.5 or later of TWinSoft to mitigate these vulnerabilities. The latest version can be found on www.ovarro.com in the customer support section (service portal).
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-054-04 |
|
Thu, 17 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-17T15:49:09.268Z
Reserved: 2021-01-05T00:00:00.000Z
Link: CVE-2021-22650
Updated: 2024-08-03T18:51:05.834Z
Status : Modified
Published: 2022-07-28T15:15:07.477
Modified: 2025-04-17T16:15:22.643
Link: CVE-2021-22650
No data.
OpenCVE Enrichment
No data.
EUVD