7 results (0.009 seconds)

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 0

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in WPServeur, NicolasKulka, wpformation WPS Hide Login allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WPS Hide Login: from n/a through 1.9.11. Exposición de información confidencial a una vulnerabilidad de actor no autorizado en WPServeur, NicolasKulka, wpformation WPS Hide Login permite acceder a la funcionalidad no restringida adecuadamente por las ACL. Este problema afecta a WPS Hide Login: desde n/a hasta 1.9.11. The WPS Hide Login plugin for WordPress is vulnerable to login page disclosure in all versions up to, and including, 1.9.11. This makes it possible for unauthenticated attackers to bypass an intended security restriction designed to prevent brute force authentication attempts on multi-site installations. • https://patchstack.com/database/vulnerability/wps-hide-login/wordpress-wps-hide-login-plugin-1-9-11-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-693: Protection Mechanism Failure •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

An exploitable use-after-free vulnerability exists in WPS Spreadsheets ( ET ) as part of WPS Office, version 11.2.0.10351. A specially-crafted XLS file can cause a use-after-free condition, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability. Se presenta una vulnerabilidad explotable de uso de memoria previamente liberada en WPS Spreadsheets ( ET ) como parte de WPS Office, versión 11.2.0.10351. Un archivo XLS especialmente diseñado puede causar una condición de uso de memoria previamente liberada, resultando en una ejecución de código remota. • https://security.wps.cn/notices/28 https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412 • CWE-416: Use After Free •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 5

wpsupdater.exe in Kingsoft WPS Office through 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry. El ejecutable wpsupdater.exe en Kingsoft WPS Office versiones hasta 11.2.0.10382, permite una ejecución de código remota mediante la modificación de HKEY_CURRENT_USER en el registro • https://github.com/webraybtl/CVE-2022-24934 https://github.com/nanaao/CVE-2022-24934 https://github.com/ASkyeye/WPS-CVE-2022-24934 https://github.com/MagicPiperSec/WPS-CVE-2022-24934 https://decoded.avast.io/luigicamastra/operation-dragon-castling-apt-group-targeting-betting-companies https://www.wps.com •

CVSS: 8.1EPSS: 5%CPEs: 3EXPL: 0

cn.wps.moffice.common.beans.print.CloudPrintWebView in Kingsoft Office 5.3.1, as used in Huawei P2 devices before V100R001C00B043, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and execute arbitrary Java code by leveraging a network position between the client and the registry to block HTTPS traffic. cn.wps.moffice.common.beans.print.CloudPrintWebView en Kingsoft Office versión 5.3.1, como es usado en los dispositivos Huawei P2 versiones anteriores a V100R001C00B043, vuelve a HTTP cuando la conexión HTTPS presenta un fallo en el registro, lo que permite a atacantes de tipo man-in-the-middle dirigir ataques de degradación y ejecutar código Java arbitrario mediante el aprovechamiento de una posición de red entre el cliente y el registro para bloquear el tráfico HTTPS. • http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-401529.htm http://www.securityfocus.com/bid/71381 https://exchange.xforce.ibmcloud.com/vulnerabilities/99089 https://labs.f-secure.com/advisories/kingsoft-office-remote-code-execution https://labs.f-secure.com/assets/763/original/mwri_advisory_huawei_kingsoft-office.pdf • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 1

The WStr::assign function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 does not validate the size of the source memory block before an _copy call, which allows remote attackers to cause a denial of service (access violation and application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file. La función WStr::assign en kso.dll en Kingsoft WPS Office 10.1.0.7106 y 10.2.0.5978 no valida el tamaño del bloque de memoria de origen antes de una llamada _copy. Esto permite que atacantes remotos provoquen una denegación de servicio (violación de acceso y cierre inesperado de la aplicación) mediante (a) una página web, (b) un documento de office o (c) un archivo .rtf manipulados. • https://github.com/Khwarezmia/WPS_POC/tree/master/wps_20180129 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •