高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2025-68662 | 7.6 HIGH | FinalDestination hostname matching allows SSRF protection bypass |
| CVE-2025-68479 | 7.1 HIGH | Discourse subscriptions are susceptible to takeover |
| CVE-2025-68933 | 6.9 MEDIUM | Discourse non-admin moderators can exfiltrate private content via post ownership transfer |
| CVE-2026-24742 | 6.5 MEDIUM | Discourse staff action logs expose sensitive information to moderators |
| CVE-2026-21865 | 6.5 MEDIUM | Discourse topic conversion permission vulnerability for moderators |
| CVE-2025-68934 | 6.5 MEDIUM | Discourse Has Denial of Service (DoS) Vulnerability in Drafts Creation Endpoint |
| CVE-2025-67723 | 4.6 MEDIUM | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin |
| CVE-2025-66488 | 4.6 MEDIUM | Discourse allows script execution in uploaded HTML/XML files on S3 |
| CVE-2025-68659 | 4.3 MEDIUM | Discourse has DoS vulnerability in username change endpoint |
| CVE-2026-23743 | Discourse allows permalinks to restricted resources to leak resource slugs to unauthorized | |
| CVE-2025-69289 | Discourse has insecure default configuration that allows non-admin moderators to takeover | |
| CVE-2025-69218 | Discourse moderators can access admin-only reports exposing private upload URLs | |
| CVE-2025-68660 | Discourse AI Discover's continue conversation allows threat actor to impersonate user |
まだコメントはありません