Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2024-5732
Disclosure Date: June 07, 2024 (last updated June 12, 2024)
A vulnerability was found in Clash up to 0.20.1 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Proxy Port. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-267406 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2023-24205
Disclosure Date: February 23, 2023 (last updated October 08, 2023)
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
0
Attacker Value
Unknown
CVE-2022-40126
Disclosure Date: September 29, 2022 (last updated October 08, 2023)
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
0
Attacker Value
Unknown
CVE-2022-26255
Disclosure Date: March 28, 2022 (last updated October 07, 2023)
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
0
Attacker Value
Unknown
CVE-2020-24772
Disclosure Date: March 21, 2022 (last updated October 07, 2023)
In Dreamacro Clash for Windows v0.11.4, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed (using a tool like responder) for code execution (or captured for hash cracking).
0