Metrics
Affected Vendors & Products
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 03 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Tue, 03 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Metrics |
ssvc
|
ssvc
|
Thu, 22 Aug 2024 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 (inclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document | Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document |
Fri, 16 Aug 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows |
|
| CPEs | cpe:2.3:a:kingsoft:wps_office:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows |
|
| Metrics |
cvssV3_1
|
Fri, 16 Aug 2024 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library. Using the MHTML format allows an attacker to automatically deliver a malicious library on opening the document and a single user click on a crafted hyperlink leads to the execution of the library. | Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 (inclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document |
Thu, 15 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kingsoft
Kingsoft wps Office |
|
| CPEs | cpe:2.3:a:kingsoft:wps_office:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Kingsoft
Kingsoft wps Office |
|
| Metrics |
ssvc
|
Thu, 15 Aug 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library. Using the MHTML format allows an attacker to automatically deliver a malicious library on opening the document and a single user click on a crafted hyperlink leads to the execution of the library. | |
| Title | Arbitrary Code Execution in WPS Office | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ESET
Published: 2024-08-15T14:24:44.511Z
Updated: 2025-10-21T22:55:47.179Z
Reserved: 2024-07-30T07:50:53.765Z
Link: CVE-2024-7262
Updated: 2024-08-15T14:57:10.707Z
Status : Modified
Published: 2024-08-15T15:15:22.290
Modified: 2025-10-21T23:16:42.453
Link: CVE-2024-7262
No data.
ReportizFlow