高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-32273 | 5.4 MEDIUM | Discourse: XSS on category description update via API |
| CVE-2026-32618 | 4.3 MEDIUM | Discourse: Unauthorized channel membership inference via excluded_memberships_channel_id |
| CVE-2026-32951 | 4.3 MEDIUM | Discourse: Authorization bypass in oneboxer via user-controlled category id |
| CVE-2026-32113 | Discourse: Open redirect via `sso_destination_url` cookie in `enter` | |
| CVE-2026-32607 | Discourse: Stored XSS via unescaped assignee name | |
| CVE-2026-32619 | Discourse: Insufficient topic visibility check allows unauthorized poll manipulation in pr | |
| CVE-2026-32243 | Discourse: Stored XSS in discourse-ai shared conversations onebox | |
| CVE-2026-32615 | Discourse: Category group moderators can perform actions on topics in restricted categorie | |
| CVE-2026-32143 | Discourse: Admin-only report can be exported by moderators | |
| CVE-2026-33074 | Discourse: Vulnerability in discourse-subscriptions plugin allowing users to self-grant to | |
| CVE-2026-33073 | discourse-subscriptions plugin leaking stripe API key in multisite environment | |
| CVE-2026-33415 | Discourse: Improper Access Control in discourse-ai Allows Unauthorized Category Content Ex | |
| CVE-2026-33300 | Discourse: Hidden group names and access metadata are exposed to moderators through the `c | |
| CVE-2026-33185 | Discourse: Group SMTP test endpoint susceptible to SSRF |
まだコメントはありません