高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-41270 | 7.1 HIGH | Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function S |
| CVE-2026-41272 | 7.1 HIGH | Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure) |
| CVE-2026-41269 | 7.1 HIGH | Flowise: File Upload Validation Bypass in createAttachment |
| CVE-2026-41274 | Flowise: Cypher Injection in GraphCypherQAChain | |
| CVE-2026-41273 | Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow | |
| CVE-2026-41277 | Flowise: Mass Assignment in DocumentStore Create Endpoint Leads to Cross-Workspace Object | |
| CVE-2026-41264 | Flowise: CSV Agent Prompt Injection Remote Code Execution Vulnerability | |
| CVE-2026-41137 | Flowise: Code Injection in CSVAgent leads to Authenticated RCE | |
| CVE-2026-41138 | Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input v | |
| CVE-2026-41279 | Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs — enables API credi | |
| CVE-2026-41268 | Flowise: Flowise Parameter Override Bypass Remote Command Execution | |
| CVE-2026-41278 | Flowise: Public chatflow endpoints return unsanitized flowData including plaintext API key | |
| CVE-2026-41275 | Flowise: Password Reset Link Sent Over Unsecured HTTP | |
| CVE-2026-41265 | Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability | |
| CVE-2026-41266 | Flowise: Sensitive Data Leak in public-chatbotConfig | |
| CVE-2026-41276 | Flowise: AccountService resetPassword Authentication Bypass Vulnerability | |
| CVE-2026-41271 | Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains |
まだコメントはありません