Логотип exploitDog
bind:CVE-2025-0118
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-0118

Количество 3

Количество 3

nvd логотип

CVE-2025-0118

11 месяцев назад

A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-4gx3-p432-m8m7

11 месяцев назад

A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.

CVSS3: 8
EPSS: Низкий
fstec логотип

BDU:2025-03999

11 месяцев назад

Уязвимость программного средства для обеспечения безопасного удаленного доступа к данным Palo Alto Networks GlobalProtect App, связанная с открытым небезопасным методом ActiveX, позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-0118

A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.

CVSS3: 8
0%
Низкий
11 месяцев назад
github логотип
GHSA-4gx3-p432-m8m7

A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.

CVSS3: 8
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-03999

Уязвимость программного средства для обеспечения безопасного удаленного доступа к данным Palo Alto Networks GlobalProtect App, связанная с открытым небезопасным методом ActiveX, позволяющая нарушителю выполнять произвольные команды

CVSS3: 9.6
0%
Низкий
11 месяцев назад

Уязвимостей на страницу