$ winget install --id ClashVergeRev.ClashVergeRev --exact --version 2.4.7Run in Command Prompt, PowerShell, or Windows Terminal. Prompts for any agreements.
Clash Verge uses EXE (NSIS). The silent install switches are /S.
Clash.Verge_2.4.7_x64-setup.exe /S
For Intune admins
Automated application patching for Microsoft Intune. Pckgr keeps a curated library of 1,000+ apps continuously up-to-date in your tenant via Microsoft Graph - no manual repackaging, no chasing vendor sites.
See Pckgr's app libraryClash Verge 的延续 - 基于 Tauri 的 Clash Meta GUI (Windows, MacOS, Linux)
Copy a command tailored to that specific architecture, type, and scope - useful when winget would otherwise pick a different default.
4 known CVEs via NVD
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
A misconfiguration in the Service Mode profile directory of Clash for Windows v0.19.9 allows attackers to escalate privileges and execute arbitrary commands when Service Mode is activated.
Clash for Windows v0.19.8 was discovered to allow arbitrary code execution via a crafted payload injected into the Proxies name column.
In Dreamacro Clash for Windows v0.11.4, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that req...
See a CVE that affects your fleet? Push the patched version to Intune in one click with Pckgr.
More from Clash Verge Rev or browse clash, clash-meta, clash-verge.