高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-33824 | 9.8 CRITICAL | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability |
| CVE-2026-26149 | 9.0 CRITICAL | Microsoft Power Apps Desktop Client Spoofing Vulnerability |
| CVE-2026-33120 | 8.8 HIGH | Microsoft SQL Server Remote Code Execution Vulnerability |
| CVE-2026-26167 | 8.8 HIGH | Windows Push Notifications Elevation of Privilege Vulnerability |
| CVE-2026-26178 | 8.8 HIGH | Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability |
| CVE-2026-32171 | 8.8 HIGH | Azure Logic Apps Elevation of Privilege Vulnerability |
| CVE-2026-32225 | 8.8 HIGH | Windows Shell Security Feature Bypass Vulnerability |
| CVE-2026-32157 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2026-27928 | 8.7 HIGH | Windows Hello Security Feature Bypass Vulnerability |
| CVE-2026-32221 | 8.4 HIGH | Windows Graphics Component Remote Code Execution Vulnerability |
| CVE-2026-32091 | 8.4 HIGH | Microsoft Brokering File System Elevation of Privilege Vulnerability |
| CVE-2026-32162 | 8.4 HIGH | Windows COM Elevation of Privilege Vulnerability |
| CVE-2026-32190 | 8.4 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2026-33115 | 8.4 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2026-33114 | 8.4 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2026-33827 | 8.1 HIGH | Windows TCP/IP Remote Code Execution Vulnerability |
| CVE-2026-27912 | 8.0 HIGH | Windows Kerberos Elevation of Privilege Vulnerability |
| CVE-2026-33826 | 8.0 HIGH | Windows Active Directory Remote Code Execution Vulnerability |
| CVE-2026-27907 | 7.8 HIGH | Windows Storage Spaces Controller Elevation of Privilege Vulnerability |
| CVE-2026-33095 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
Showing 20 of 163 CVEs. View all on vendor page →
まだコメントはありません