高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-32042 | 8.8 HIGH | OpenClaw < 2026.2.25 - Privilege Escalation via Unpaired Device Identity in Shared Gateway |
| CVE-2026-32051 | 8.8 HIGH | OpenClaw < 2026.3.1 - Authorization Bypass in Agent Runs via Owner-Only Tool Access |
| CVE-2026-32064 | 7.7 HIGH | OpenClaw < 2026.2.21 - Missing VNC Authentication in Sandbox Browser noVNC Observer |
| CVE-2026-32055 | 7.6 HIGH | OpenClaw < 2026.2.26 - Workspace Path Boundary Bypass via Non-existent Symlink |
| CVE-2026-32048 | 7.5 HIGH | OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn |
| CVE-2026-32049 | 7.5 HIGH | OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass |
| CVE-2026-32056 | 7.5 HIGH | OpenClaw < 2026.2.22 - Remote Code Execution via Shell Startup Environment Variable Inject |
| CVE-2026-32057 | 7.1 HIGH | OpenClaw < 2026.2.25 - Authentication Bypass via Control UI client.id Parameter |
| CVE-2026-32054 | 6.5 MEDIUM | OpenClaw < 2026.2.25 - Symlink Traversal in Browser Trace/Download Path Handling |
| CVE-2026-32043 | 6.5 MEDIUM | OpenClaw < 2026.2.25 - Time-of-Check-Time-of-Use via Mutable Symlink in system.run cwd Par |
| CVE-2026-32053 | 6.5 MEDIUM | OpenClaw < 2026.2.23 - Twilio Webhook Replay Bypass via Randomized Event ID Normalization |
| CVE-2026-32052 | 6.4 MEDIUM | OpenClaw < 2026.2.24 - Hidden Command Execution via Shell-Wrapper Positional argv Carriers |
| CVE-2026-32045 | 5.9 MEDIUM | OpenClaw < 2026.2.21 - Authentication Bypass in HTTP Gateway Routes via Tokenless Tailscal |
| CVE-2026-32044 | 5.5 MEDIUM | OpenClaw < 2026.3.2 - Tar Archive Safety Bypass in Skills Installation |
| CVE-2026-32895 | 5.4 MEDIUM | OpenClaw < 2026.2.26 - Sender Authorization Bypass in Slack System Event Handlers |
| CVE-2026-32898 | 5.4 MEDIUM | OpenClaw < 2026.2.23 - ACP Permission Auto-Approval Bypass via Untrusted Tool Metadata |
| CVE-2026-32046 | 5.3 MEDIUM | OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag |
| CVE-2026-32065 | 4.8 MEDIUM | OpenClaw < 2026.2.25 - Approval Identity Mismatch in system.run Command Execution |
| CVE-2026-32896 | 4.8 MEDIUM | OpenClaw < 2026.2.21 - Unauthenticated Webhook Access via Passwordless Fallback in BlueBub |
| CVE-2026-32899 | 4.3 MEDIUM | OpenClaw < 2026.2.25 - Sender Policy Bypass in Slack Reaction and Pin Event Handlers |
Showing 20 of 24 CVEs. View all on vendor page →
まだコメントはありません