高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-32038 | 9.8 CRITICAL | OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter |
| CVE-2026-32013 | 8.8 HIGH | OpenClaw < 2026.2.25 - Symlink Traversal in agents.files Methods |
| CVE-2026-31998 | 8.6 HIGH | OpenClaw 2026.2.22 < 2026.2.24 - Authorization Bypass in Synology Chat Plugin via Empty al |
| CVE-2026-32014 | 8.0 HIGH | OpenClaw < 2026.2.26 - Node Reconnect Metadata Spoofing via Unsigned Platform Fields |
| CVE-2026-32032 | 7.8 HIGH | OpenClaw < 2026.2.22 - Arbitrary Shell Execution via Unvalidated SHELL Environment Variabl |
| CVE-2026-32015 | 7.8 HIGH | OpenClaw 2026.1.21 < 2026.2.19 - PATH Hijacking Bypass in tools.exec.safeBins Allowlist Va |
| CVE-2026-32016 | 7.8 HIGH | OpenClaw < 2026.2.22 - Path Traversal via Basename-Only Allowlist Matching on macOS |
| CVE-2026-28461 | 7.5 HIGH | OpenClaw < 2026.3.1 - Unbounded Memory Growth in Zalo Webhook via Query String Key Churn |
| CVE-2026-32030 | 7.5 HIGH | OpenClaw < 2026.2.19 - Sensitive File Disclosure via stageSandboxMedia Path Traversal |
| CVE-2026-32025 | 7.5 HIGH | OpenClaw < 2026.2.25 - Password Brute-Force via Browser-Origin WebSocket Authentication By |
| CVE-2026-32011 | 7.5 HIGH | OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing |
| CVE-2026-31989 | 7.4 HIGH | OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect |
| CVE-2026-32019 | 7.4 HIGH | OpenClaw < 2026.2.22 - Incomplete IPv4 Special-Use Range Blocking in SSRF Guard |
| CVE-2026-32017 | 7.1 HIGH | OpenClaw < 2026.2.19 - Arbitrary File Write via Short-Option Bypass in exec Allowlist |
| CVE-2026-31994 | 7.1 HIGH | OpenClaw < 2026.2.19 - Local Command Injection via Unsafe cmd Argument Handling in Windows |
| CVE-2026-28460 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Shell Line-Continuation Command Substitution i |
| CVE-2026-27566 | 7.1 HIGH | OpenClaw < 2026.2.22 - Allowlist Bypass via Wrapper Binary Unwrapping in system.run |
| CVE-2026-32023 | 7.1 HIGH | OpenClaw < 2026.2.24 - Approval Gating Bypass via Dispatch-Wrapper Depth-Cap Mismatch in s |
| CVE-2026-31992 | 7.1 HIGH | OpenClaw < 2026.2.23 - Allowlist Exec-Guard Bypass via env -S |
| CVE-2026-32000 | 7.1 HIGH | OpenClaw < 2026.2.19 - Command Injection via Windows Shell Fallback in Lobster Tool Execut |
Showing 20 of 60 CVEs. View all on vendor page →
まだコメントはありません