Vulnerabilities (CVE)

Filtered by vendor Wps Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24934 1 Wps 1 Wps Office 2024-11-21 7.5 HIGH 9.8 CRITICAL
wpsupdater.exe in Kingsoft WPS Office through 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry.
CVE-2021-40399 1 Wps 1 Wps Office 2024-11-21 6.8 MEDIUM 7.8 HIGH
An exploitable use-after-free vulnerability exists in WPS Spreadsheets ( ET ) as part of WPS Office, version 11.2.0.10351. A specially-crafted XLS file can cause a use-after-free condition, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.
CVE-2018-6390 1 Wps 1 Wps Office 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
The WStr::assign function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 does not validate the size of the source memory block before an _copy call, which allows remote attackers to cause a denial of service (access violation and application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file.
CVE-2014-6692 1 Wps 1 Kingsoft Clip \(office Tool\) 2024-11-21 5.4 MEDIUM N/A
The Kingsoft Clip (Office Tool) (aka cn.wps.clip) application 1.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
CVE-2014-2271 2 Huawei, Wps 3 P2-6011, P2-6011 Firmware, Wps Office 2024-11-21 6.8 MEDIUM 8.1 HIGH
cn.wps.moffice.common.beans.print.CloudPrintWebView in Kingsoft Office 5.3.1, as used in Huawei P2 devices before V100R001C00B043, falls back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and execute arbitrary Java code by leveraging a network position between the client and the registry to block HTTPS traffic.
CVE-2005-2290 1 Wps 1 Web Portal System 2024-11-20 10.0 HIGH N/A
wps_shop.cgi in WPS Web Portal System 0.7.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) art and (2) cat variables.