CVE-2023-24205
- EPSS 2.05%
- Veröffentlicht 23.02.2023 22:15:11
- Zuletzt bearbeitet 12.03.2025 17:15:39
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
CVE-2022-40126
- EPSS 0.11%
- Veröffentlicht 29.09.2022 12:15:11
- Zuletzt bearbeitet 21.05.2025 15:15:59
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
CVE-2022-26255
- EPSS 1.12%
- Veröffentlicht 28.03.2022 00:15:07
- Zuletzt bearbeitet 21.11.2024 06:53:39
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
CVE-2020-24772
- EPSS 0.12%
- Veröffentlicht 21.03.2022 15:15:07
- Zuletzt bearbeitet 21.11.2024 05:16:04
In Dreamacro Clash for Windows v0.11.4, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when openi...