Metrics
Affected Vendors & Products
Fri, 05 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos |
|
| Vendors & Products |
Apple
Apple macos |
Tue, 26 Aug 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used. | |
| Title | Mihomo Party Socket sysproxy.ts enableSysProxy temp file | |
| Weaknesses | CWE-377 CWE-378 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-26T05:02:09.404Z
Updated: 2025-09-05T17:10:11.510Z
Reserved: 2025-08-25T15:08:19.362Z
Link: CVE-2025-9474
Updated: 2025-08-26T15:45:35.333Z
Status : Awaiting Analysis
Published: 2025-08-26T05:15:33.173
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-9474
No data.