Auto-Update: 2024-08-16T10:00:16.869402+00:00

This commit is contained in:
cad-safe-bot 2024-08-16 10:03:13 +00:00
parent 6ea5257cc9
commit 45c6440b79
4 changed files with 17 additions and 18 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-7262",
"sourceIdentifier": "security@eset.com",
"published": "2024-08-15T15:15:22.290",
"lastModified": "2024-08-15T17:34:07.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T08:15:03.780",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library.\nUsing the MHTML format allows an attacker to automatically deliver a malicious library on opening the document and a single user click on a crafted hyperlink leads to the execution of the library."
"value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 (inclusive) on Windows allows an attacker to load an arbitrary Windows library.\nThe vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document"
}
],
"metrics": {

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-7263",
"sourceIdentifier": "security@eset.com",
"published": "2024-08-15T15:15:22.453",
"lastModified": "2024-08-15T17:34:07.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-08-16T08:15:03.897",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library.\nThe patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough. Another hyperlink parameter was not properly sanitized which leads to the execution of an arbitrary Windows library."
"value": "Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.17153 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.\nThe patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough. Another parameter was not properly sanitized which leads to the execution of an arbitrary Windows library."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-08-16T08:00:17.064307+00:00
2024-08-16T10:00:16.869402+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-08-16T07:15:05.003000+00:00
2024-08-16T08:15:03.897000+00:00
```
### Last Data Feed Release
@ -38,17 +38,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `0`
- [CVE-2024-6460](CVE-2024/CVE-2024-64xx/CVE-2024-6460.json) (`2024-08-16T06:15:04.170`)
- [CVE-2024-7501](CVE-2024/CVE-2024-75xx/CVE-2024-7501.json) (`2024-08-16T07:15:05.003`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `2`
- [CVE-2024-32673](CVE-2024/CVE-2024-326xx/CVE-2024-32673.json) (`2024-08-16T07:15:03.693`)
- [CVE-2024-7262](CVE-2024/CVE-2024-72xx/CVE-2024-7262.json) (`2024-08-16T08:15:03.780`)
- [CVE-2024-7263](CVE-2024/CVE-2024-72xx/CVE-2024-7263.json) (`2024-08-16T08:15:03.897`)
## Download and Usage

View File

@ -251507,7 +251507,7 @@ CVE-2024-3267,0,0,940010b55b9a616638f110687c77a6c496dcf0d2dfd170d1aa59ab5c8e8481
CVE-2024-32670,0,0,11e459444671f45b9f26d0cdaea8328e4da91a68f683a4e2c21fd5a0bc52f597,2024-07-11T13:05:54.930000
CVE-2024-32671,0,0,6a813a16be23f5f1d38aab16f1ea83feab7085f490ba24d04e87e7caf4f0848c,2024-07-29T14:12:08.783000
CVE-2024-32672,0,0,ee29fc695f581fb34ab7bf98446e86972f27b7ccbb3dc78cde6e814c3b7d95d3,2024-05-14T16:12:23.490000
CVE-2024-32673,0,1,3ba332f405fb62a9db852b3a3b63947df990ff59922b5ccf63ffb803181a7192,2024-08-16T07:15:03.693000
CVE-2024-32673,0,0,3ba332f405fb62a9db852b3a3b63947df990ff59922b5ccf63ffb803181a7192,2024-08-16T07:15:03.693000
CVE-2024-32674,0,0,8e274e9762e7b32d105911c76fa84ee156bae08969022295a61c40a0ca8ab4bf,2024-07-03T01:56:55.253000
CVE-2024-32675,0,0,913204d4cbd7767b42b95dac3f501448ad855a8cc8b6e44b189aaed7fb9c4ba4,2024-04-24T17:16:50.397000
CVE-2024-32676,0,0,b31f11d0c79f627eee2fc0dd8ef5512167a52a89883adae7727493e2257da5c8,2024-05-17T09:15:38.620000
@ -259404,7 +259404,7 @@ CVE-2024-6455,0,0,8630ebc1a98e741e91f009e85126d02bca9a8a2c6f3c48f74f4c74c8c868f3
CVE-2024-6456,0,0,bc36926cd39d9c147941407431b009e2492d4daa481901d0ea883b3657b0a7bf,2024-08-15T21:15:18.047000
CVE-2024-6457,0,0,2021b397e47ab38cda013de2c201fe3ea53b49570246fbb65269f60be90e5ab4,2024-07-16T13:43:58.773000
CVE-2024-6458,0,0,e6f4f9a699790cfa92517dafe90bcdba32232615fceb305817a9ccda94d06fc4,2024-07-29T14:12:08.783000
CVE-2024-6460,1,1,ab45ea0deabed8609ca1eeb4abfd3cff05db3028c4cc4323de2fa5625d6caa24,2024-08-16T06:15:04.170000
CVE-2024-6460,0,0,ab45ea0deabed8609ca1eeb4abfd3cff05db3028c4cc4323de2fa5625d6caa24,2024-08-16T06:15:04.170000
CVE-2024-6461,0,0,86a214d0c7bd3f57cea37cd567b01f1a0e55f8d4342f6c7c46fd15b8942c8d90,2024-07-03T21:15:04.580000
CVE-2024-6463,0,0,f8d7d80ca565804c0caafdbc8214fe1eca7dc83d43861affc813af07365c0cc0,2024-07-03T21:15:04.640000
CVE-2024-6464,0,0,8fab89d1b3aef32a257cf0d7fb909cce6ac18d5ef8dc898bb9f0cc6c52356cbf,2024-07-03T21:15:04.697000
@ -259871,8 +259871,8 @@ CVE-2024-7252,0,0,b11855d09d58123416b1c452f42a306230094dfbea0e43cbf3d1a4ad2d82d8
CVE-2024-7255,0,0,fd2a8f993022fe32cb5a87546341ab7eeda32776ebc3f07d5c930f36c0483b95,2024-08-02T12:59:43.990000
CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000
CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000
CVE-2024-7262,0,0,16c3e9b23c6a2c37a29ce523f07979e910ee2e56be7543634d7e6efdf2afd45a,2024-08-15T17:34:07.033000
CVE-2024-7263,0,0,71acef8a4c5697f07ebf990e0137d208351c107be51654de3168c97cdbfa4b02,2024-08-15T17:34:07.033000
CVE-2024-7262,0,1,d60dbfbf9319b6eac66a6b4e1dfce58ccb5030b654af2818e0169c0934be100e,2024-08-16T08:15:03.780000
CVE-2024-7263,0,1,204a24d64bef00a86bbb0d2328dff2567dd672dfe7303f7bb6981d723e86377e,2024-08-16T08:15:03.897000
CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee63586a,2024-08-12T17:30:51.880000
CVE-2024-7265,0,0,b8acefabc570cba3338fbcc031201c451674349cab85dfd61e02fb2e8f5c7f19,2024-08-08T15:15:18.970000
CVE-2024-7266,0,0,40ec5b3f4d10f4b6f3816acd7da5d1c216bf118efd4b627aae50abb96a0696e6,2024-08-07T15:17:46.717000
@ -260026,7 +260026,7 @@ CVE-2024-7497,0,0,171d6206f3c6dadbebd8902a7e0a0a1774e2796713d12e03c39eb365b5f7df
CVE-2024-7498,0,0,34558512fcd1426a2a2d148e9d2625ea3cd75c20501206f3df3d025acddc8114,2024-08-06T16:30:24.547000
CVE-2024-7499,0,0,6a02f27fcba04de10769d0a3eb8df3330f0153ea641827dd4e7a8cea71e560a6,2024-08-06T16:30:24.547000
CVE-2024-7500,0,0,931897362fb2ba79107882fb00e70aa09beff68614f848f39093ae56ae63e032,2024-08-06T16:30:24.547000
CVE-2024-7501,1,1,3089c3693a789a5827625ccdeca3210da85eb8da93bfd28e8a099cdbea8253dc,2024-08-16T07:15:05.003000
CVE-2024-7501,0,0,3089c3693a789a5827625ccdeca3210da85eb8da93bfd28e8a099cdbea8253dc,2024-08-16T07:15:05.003000
CVE-2024-7502,0,0,400715e8cd7f13a2a067bad8525237ee0b427d91f26288ec69911983b1e213dc,2024-08-12T18:50:46.897000
CVE-2024-7503,0,0,e784b3ab46a1e81c39e310fabae0c1eb2177c76661481ff0b29d2e5ba473397f,2024-08-12T13:41:36.517000
CVE-2024-7505,0,0,aecd8f77bf4729577cedcf26eddaf42651063906380e7519311f6a7e624532e3,2024-08-06T16:30:24.547000

Can't render this file because it is too large.