Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f35p-mp22-6w3m

Опубликовано: 26 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 1.1
CVSS3: 4.5

Описание

A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used.

A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used.

EPSS

Процентиль: 2%
0.00013
Низкий

1.1 Low

CVSS4

4.5 Medium

CVSS3

Дефекты

CWE-377

Связанные уязвимости

CVSS3: 4.5
nvd
6 месяцев назад

A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used.

EPSS

Процентиль: 2%
0.00013
Низкий

1.1 Low

CVSS4

4.5 Medium

CVSS3

Дефекты

CWE-377