高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-35638 | 8.8 HIGH | OpenClaw < 2026.3.22 - Privilege Escalation via Self-Declared Scopes in Trusted-Proxy Cont |
| CVE-2026-35639 | 8.8 HIGH | OpenClaw < 2026.3.22 - Privilege Escalation via device.pair.approve Scope Validation |
| CVE-2026-35645 | 8.1 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Synthetic operator.admin in deleteSession |
| CVE-2026-34512 | 8.1 HIGH | OpenClaw < 2026.3.25 - Improper Access Control in /sessions/:sessionKey/kill Endpoint |
| CVE-2026-35625 | 7.8 HIGH | OpenClaw < 2026.3.25 - Privilege Escalation via Silent Local Shared-Auth Reconnect |
| CVE-2026-35629 | 7.4 HIGH | OpenClaw < 2026.3.25 - Server-Side Request Forgery via Unguarded Configured Base URLs in C |
| CVE-2026-35637 | 7.3 HIGH | OpenClaw < 2026.3.22 - Premature Cite Expansion Before Authorization in Channel and DM |
| CVE-2026-35632 | 7.1 HIGH | OpenClaw <= 2026.2.22 - Symlink Traversal via IDENTITY.md appendFile in agents.create/upda |
| CVE-2026-35644 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Credential Exposure via baseUrl Fields in Gateway Snapshots |
| CVE-2026-35636 | 6.5 MEDIUM | OpenClaw 2026.3.11 < 2026.3.25 - Session Isolation Bypass via sessionId Resolution |
| CVE-2026-35631 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Missing Authorization Enforcement in Internal ACP Chat Commands |
| CVE-2026-35627 | 6.5 MEDIUM | OpenClaw < 2026.3.22 - Unauthenticated Cryptographic Work in Nostr Inbound DM Handling |
| CVE-2026-35618 | 6.5 MEDIUM | OpenClaw < 2026.3.23 - Replay Identity Drift via Query-Only Variants in Plivo V2 Verificat |
| CVE-2026-35622 | 5.9 MEDIUM | OpenClaw < 2026.3.22 - Improper Authentication Verification in Google Chat Webhook |
| CVE-2026-35640 | 5.3 MEDIUM | OpenClaw < 2026.3.25 - Denial of Service via Unauthenticated Webhook Request Parsing |
| CVE-2026-35633 | 5.3 MEDIUM | OpenClaw < 2026.3.22 - Unbounded Memory Allocation via Remote Media Error Responses |
| CVE-2026-35626 | 5.3 MEDIUM | OpenClaw < 2026.3.22 - Unauthenticated Resource Exhaustion via Voice Call Webhook |
| CVE-2026-35634 | 5.1 MEDIUM | OpenClaw < 2026.3.23 - Authentication Bypass via Local-Direct Requests in Canvas Gateway |
| CVE-2026-35646 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit Bypass in Webhook Token Validation |
| CVE-2026-35623 | 4.8 MEDIUM | OpenClaw < 2026.3.25 - Brute-Force Attack via Missing Webhook Password Rate Limiting |
Showing 20 of 25 CVEs. View all on vendor page →
まだコメントはありません