2022-07-28 14:18:25
icscert
PUBLISHED
An attacker may use TWinSoft and a malicious source project file (TPG) to extract files on machine executing Ovarro TWinSoft, which could lead to code execution.