1 vulnerabilities classified as CWE-618 (暴露的不安全ActiveX方法). AI Chinese analysis included.
CWE-618 represents a critical exposure weakness where ActiveX controls, designed for web browsers, inadvertently reveal dangerous methods that bypass standard browser security models like zone or domain restrictions. Attackers typically exploit this vulnerability by crafting malicious web pages that trigger these exposed methods, allowing the control to execute privileged actions with far greater operating system control than standard JavaScript or Java applets. This often leads to unauthorized file system access, registry modifications, or arbitrary code execution. To mitigate this risk, developers must rigorously audit ActiveX components to ensure no sensitive functionality is exposed to the web environment. Implementing strict interface segregation, removing unnecessary methods, and adhering to the principle of least privilege are essential strategies. Additionally, using modern web standards that do not rely on ActiveX technology provides a more secure alternative, effectively eliminating the attack surface associated with these legacy controls.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-0118 | GlobalProtect App: Execution of Unsafe ActiveX Control Vulnerability — GlobalProtect App | 8.8 | - | 2025-03-12 |
Vulnerabilities classified as CWE-618 (暴露的不安全ActiveX方法) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.