高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| MervinPraison | PraisonAIAgents | < 1.5.128 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-40088 | 9.7 CRITICAL | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
| CVE-2026-40154 | 9.3 CRITICAL | PraisonAI Affected by Untrusted Remote Template Code Execution |
| CVE-2026-40113 | 8.4 HIGH | PraisonAI has an Argument Injection into Cloud Run Environment Variables via Unsanitized C |
| CVE-2026-40149 | 7.9 HIGH | PraisonAI has an Unauthenticated Allow-List Manipulation Bypasses Agent Tool Approval Safe |
| CVE-2026-40116 | 7.5 HIGH | PraisonAI's Unauthenticated WebSocket Endpoint Proxies to Paid OpenAI Realtime API Without |
| CVE-2026-40153 | 7.4 HIGH | PraisonAIAgents Affected by Environment Variable Secret Exfiltration via os.path.expandvar |
| CVE-2026-40114 | 7.2 HIGH | PraisonAI has Server-Side Request Forgery via Unvalidated webhook_url in Jobs API |
| CVE-2026-40148 | 6.5 MEDIUM | PraisonAI Affected by Decompression Bomb DoS via Recipe Bundle Extraction Without Size Lim |
| CVE-2026-40115 | 6.2 MEDIUM | PraisonAI has an Unrestricted Upload Size in WSGI Recipe Registry Server Enables Memory Ex |
| CVE-2026-40117 | 6.2 MEDIUM | PraisonAIAgents Affected by Arbitrary File Read via read_skill_file Missing Workspace Boun |
| CVE-2026-40112 | 5.4 MEDIUM | PraisonAI has Stored XSS via Unsanitized Agent Output in HTML Rendering (nh3 Not a Require |
| CVE-2026-40151 | 5.3 MEDIUM | PraisonAI Affected by Unauthenticated Information Disclosure of Agent Instructions via /ap |
| CVE-2026-40152 | 5.3 MEDIUM | PraisonAIAgents has a Path Traversal via Unvalidated Glob Pattern in list_files Bypasses W |
| CVE-2026-40111 | PraisonAIAgents has an OS Command Injection via shell=True in Memory Hooks Executor (memor |
まだコメントはありません