高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-43575 | 9.8 CRITICAL | OpenClaw 2026.2.21 < 2026.4.10 - Authentication Bypass in Sandbox noVNC Helper Route |
| CVE-2026-44109 | 9.8 CRITICAL | OpenClaw < 2026.4.15 - Authentication Bypass in Feishu Webhook and Card-Action Validation |
| CVE-2026-43581 | 9.6 CRITICAL | OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposure via Overly Broad CDP Relay Bindin |
| CVE-2026-43578 | 9.1 CRITICAL | OpenClaw 2026.3.31 < 2026.4.10 - Privilege Escalation via Missed Async Exec Completion Eve |
| CVE-2026-44110 | 8.8 HIGH | OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairin |
| CVE-2026-44115 | 8.8 HIGH | OpenClaw < 2026.4.22 - Shell Expansion Bypass in Unquoted Heredocs via Exec Allowlist |
| CVE-2026-43584 | 8.8 HIGH | OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy |
| CVE-2026-44116 | 8.6 HIGH | OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation |
| CVE-2026-43585 | 8.1 HIGH | OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution |
| CVE-2026-44114 | 7.8 HIGH | OpenClaw < 2026.4.20 - Environment Variable Namespace Collision via Workspace dotenv |
| CVE-2026-44118 | 7.8 HIGH | OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header |
| CVE-2026-43576 | 7.7 HIGH | OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL |
| CVE-2026-43579 | 6.5 MEDIUM | OpenClaw < 2026.4.10 - Insufficient Access Control in Nostr Profile Mutation Routes |
| CVE-2026-43577 | 6.5 MEDIUM | OpenClaw < 2026.4.9 - Arbitrary File Read via Browser Interaction Routes |
| CVE-2026-43582 | 6.3 MEDIUM | OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass |
| CVE-2026-44117 | 5.8 MEDIUM | OpenClaw < 2026.4.20 - Server-Side Request Forgery in QQBot Direct Media Upload |
| CVE-2026-43583 | 5.3 MEDIUM | OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Policy Context in Delivery Queue Recov |
| CVE-2026-44113 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Time-of-Check/Time-of-Use Race Condition in OpenShell FS Bridge |
| CVE-2026-44112 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes |
| CVE-2026-44111 | 4.3 MEDIUM | OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get |
まだコメントはありません