高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-22171 | 8.2 HIGH | OpenClaw < 2026.2.19 - Path Traversal in Feishu Media Temporary File Naming |
| CVE-2026-22181 | 7.6 HIGH | OpenClaw < 2026.3.2 - DNS Pinning Bypass via Environment Proxy Configuration in web_fetch |
| CVE-2026-22179 | 7.2 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Command Substitution in system.run |
| CVE-2026-22175 | 7.1 HIGH | OpenClaw < 2026.2.23 - Exec Approval Bypass via Unrecognized Multiplexer Shell Wrappers |
| CVE-2026-22169 | 6.7 MEDIUM | OpenClaw < 2026.2.22 - Allowlist Bypass via sort Configuration in safeBins |
| CVE-2026-27522 | 6.5 MEDIUM | OpenClaw < 2026.2.24 - Arbitrary File Read via sendAttachment and setGroupIcon Message Act |
| CVE-2026-22178 | 6.5 MEDIUM | OpenClaw < 2026.2.19 - ReDoS and Regex Injection via Unescaped Feishu Mention Metadata |
| CVE-2026-22170 | 6.5 MEDIUM | OpenClaw < 2026.2.22 BlueBubbles - Access Control Bypass via Empty allowFrom Configuration |
| CVE-2026-22168 | 6.5 MEDIUM | OpenClaw < 2026.2.21 - Command Injection via cmd.exe /c Trailing Arguments in system.run |
| CVE-2026-27545 | 6.1 MEDIUM | OpenClaw < 2026.2.26 - Approval Bypass via Parent Symlink Current Working Directory Rebind |
| CVE-2026-27523 | 6.1 MEDIUM | OpenClaw < 2026.2.24 - Sandbox Bind Validation Bypass via Symlink-Parent Missing-Leaf Path |
| CVE-2026-22217 | 6.1 MEDIUM | OpenClaw 2026.2.22 < 2026.2.23 - Arbitrary Binary Execution via $SHELL Environment Variabl |
| CVE-2026-22177 | 6.1 MEDIUM | OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars |
| CVE-2026-22180 | 5.3 MEDIUM | OpenClaw < 2026.3.2 - Path Confinement Bypass in Browser Output and File Write Operations |
| CVE-2026-27524 | 4.3 MEDIUM | OpenClaw < 2026.2.21 - Prototype Pollution via Debug Override Path |
まだコメントはありません