高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-33579 | 9.9 CRITICAL | OpenClaw < 2026.3.28 - Privilege Escalation via Missing Caller Scope Validation in Device |
| CVE-2026-32917 | 9.8 CRITICAL | OpenClaw < 2026.3.13 - Remote Command Injection via Unsanitized iMessage Attachment Paths |
| CVE-2026-32916 | 9.4 CRITICAL | OpenClaw 2026.3.7 < 2026.3.11 - Authorization Bypass in Plugin Subagent Routes via Synthet |
| CVE-2026-32920 | 8.4 HIGH | OpenClaw < 2026.3.12 - Arbitrary Code Execution via Auto-Discovery of Workspace Plugins |
| CVE-2026-34504 | 8.3 HIGH | OpenClaw < 2026.3.28 - Server-Side Request Forgery via Unguarded Image Download in fal Pro |
| CVE-2026-33577 | 8.1 HIGH | OpenClaw < 2026.3.28 - Insufficient Scope Validation in node.pair.approve |
| CVE-2026-34503 | 8.1 HIGH | OpenClaw < 2026.3.28 - Incomplete WebSocket Session Termination on Device Removal and Toke |
| CVE-2026-32988 | 7.5 HIGH | OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unvalidated Temporary File Creation |
| CVE-2026-32971 | 7.1 HIGH | OpenClaw < 2026.3.11 - Node-Host Approval UI Mismatch Allows Execution of Unintended Comma |
| CVE-2026-32976 | 6.5 MEDIUM | OpenClaw < 2026.3.11 - Account-Scoped configWrites Policy Bypass via Channel Commands |
| CVE-2026-34505 | 6.5 MEDIUM | OpenClaw < 2026.3.12 - Webhook Rate Limiting Bypass via Pre-Authentication Secret Validati |
| CVE-2026-33576 | 6.5 MEDIUM | OpenClaw < 2026.3.28 - Unauthorized Media Download via Zalo Channel |
| CVE-2026-33580 | 6.5 MEDIUM | OpenClaw < 2026.3.28 - Brute Force Attack via Missing Rate Limiting on Webhook Shared Secr |
| CVE-2026-33581 | 6.5 MEDIUM | OpenClaw < 2026.3.24 - Arbitrary File Read via mediaUrl and fileUrl Parameters |
| CVE-2026-32977 | 6.3 MEDIUM | OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Unanchored writeFile Commit Path |
| CVE-2026-32921 | 6.3 MEDIUM | OpenClaw < 2026.3.8 - Script Content Modification via Mutable Operand Binding in system.ru |
| CVE-2026-34506 | 4.3 MEDIUM | OpenClaw < 2026.3.8 - Sender Allowlist Bypass in Microsoft Teams Plugin via Route Allowlis |
| CVE-2026-33578 | 4.3 MEDIUM | OpenClaw < 2026.3.28 - Sender Policy Allowlist Bypass via Policy Downgrade in Google Chat |
| CVE-2026-32970 | 2.5 LOW | OpenClaw < 2026.3.11 - Credential Fallback Logic Bypass via Unavailable Local Auth SecretR |
まだコメントはありません