Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

CVE-2023-24205

Disclosure Date: February 23, 2023 (last updated October 08, 2023)
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
Attacker Value
Unknown

CVE-2022-40126

Disclosure Date: September 29, 2022 (last updated October 08, 2023)
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
Attacker Value
Unknown

CVE-2022-26255

Disclosure Date: March 28, 2022 (last updated February 23, 2025)
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
Attacker Value
Unknown

CVE-2020-24772

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
In Dreamacro Clash for Windows v0.11.4, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed (using a tool like responder) for code execution (or captured for hash cracking).