Lucene search

K
Clash ProjectClash

5 matches found

CVE
CVE
added 2022/03/28 12:15 a.m.60 views

CVE-2022-26255

Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.

9.8CVSS9.6AI score0.01061EPSS
CVE
CVE
added 2022/03/21 3:15 p.m.51 views

CVE-2020-24772

In Dreamacro Clash for Windows v0.11.4, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed ...

8.8CVSS8.8AI score0.00114EPSS
CVE
CVE
added 2023/02/23 10:15 p.m.47 views

CVE-2023-24205

Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).

9.8CVSS9.9AI score0.00774EPSS
CVE
CVE
added 2024/06/07 10:15 a.m.43 views

CVE-2024-5732

A vulnerability was found in Clash up to 0.20.1 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Proxy Port. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public an...

9.8CVSS7.6AI score0.00192EPSS
CVE
CVE
added 2022/09/29 12:15 p.m.40 views

CVE-2022-40126

A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.

7.8CVSS8.1AI score0.00073EPSS