高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-8961 | Spoofing issue in the Form Autofill component | |
| CVE-2026-8945 | Sandbox escape in Firefox and Firefox Focus for Android | |
| CVE-2026-8946 | Incorrect boundary conditions in the Audio/Video: Web Codecs component | |
| CVE-2026-8947 | Use-after-free in the DOM: Bindings (WebIDL) component | |
| CVE-2026-8948 | Same-origin policy bypass in the DOM: Networking component | |
| CVE-2026-8949 | Integer overflow in the Widget: Win32 component | |
| CVE-2026-8950 | Same-origin policy bypass in the Networking: HTTP component | |
| CVE-2026-8952 | Privilege escalation in the Application Update component | |
| CVE-2026-8953 | Sandbox escape due to use-after-free in the Disability Access APIs component | |
| CVE-2026-8954 | Incorrect boundary conditions, integer overflow in the Audio/Video component | |
| CVE-2026-8955 | Privilege escalation in the DOM: Workers component | |
| CVE-2026-8956 | Integer overflow in the Networking: JAR component | |
| CVE-2026-8957 | Privilege escalation in the Enterprise Policies component | |
| CVE-2026-8958 | Information disclosure, sandbox escape in the Security: Process Sandboxing component | |
| CVE-2026-8959 | Sandbox escape due to incorrect boundary conditions in the Widget: Win32 component | |
| CVE-2026-8960 | Spoofing issue in WebExtensions | |
| CVE-2026-8706 | Sensitive user data could be leaked to other applications through Reader mode | |
| CVE-2026-8962 | Mitigation bypass in the DOM: Security component | |
| CVE-2026-8963 | Spoofing issue in the Web Speech component | |
| CVE-2026-8964 | Spoofing issue in the Popup Blocker component |
Showing 20 of 32 CVEs. View all on vendor page →
まだコメントはありません