高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-41352 | 8.8 HIGH | OpenClaw < 2026.3.31 - Remote Code Execution via Node Scope Gate Bypass |
| CVE-2026-41349 | 8.8 HIGH | OpenClaw < 2026.3.28 - Agentic Consent Bypass via config.patch |
| CVE-2026-41353 | 8.1 HIGH | OpenClaw < 2026.3.22 - allowProfiles Bypass via Profile Mutation and Runtime Selection |
| CVE-2026-41336 | 7.8 HIGH | OpenClaw < 2026.3.31 - Arbitrary Hook Code Execution via OPENCLAW_BUNDLED_HOOKS_DIR Enviro |
| CVE-2026-41342 | 7.3 HIGH | OpenClaw < 2026.3.28 - Unauthenticated Discovery Endpoint Credential Exfiltration via Remo |
| CVE-2026-41355 | 7.3 HIGH | OpenShell < 2026.3.28 - Arbitrary Code Execution via Mirror Mode Sandbox File Conversion |
| CVE-2026-41359 | 7.1 HIGH | OpenClaw < 2026.3.28 - Privilege Escalation via operator.write to Admin-Class Telegram Con |
| CVE-2026-41361 | 7.1 HIGH | OpenClaw < 2026.3.28 - SSRF Guard Bypass via IPv6 Special-Use Ranges |
| CVE-2026-41347 | 7.1 HIGH | OpenClaw < 2026.3.31 - Cross-Site Request Forgery via Missing Browser-Origin Validation in |
| CVE-2026-41360 | 6.7 MEDIUM | OpenClaw < 2026.4.2 - Approval Integrity Bypass in pnpm dlx Local Script Binding |
| CVE-2026-41340 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Authentication Boundary Bypass via Telegram Legacy allowFrom Migrat |
| CVE-2026-41334 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Decompression Bomb Denial of Service via Image Pixel-Limit Guard By |
| CVE-2026-41348 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Group DM Channel Allowlist Bypass via Discord Slash Commands |
| CVE-2026-41356 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Incomplete WebSocket Session Termination in device.token.rotate |
| CVE-2026-41909 | 5.4 MEDIUM | OpenClaw < 2026.4.20 - Improper Authorization in Paired-Device Pairing Actions |
| CVE-2026-41344 | 5.4 MEDIUM | OpenClaw < 2026.3.28 - Privilege Escalation via chat.send /verbose Parameter |
| CVE-2026-41358 | 5.4 MEDIUM | OpenClaw < 2026.4.2 - Sender Allowlist Bypass via Slack Thread Context |
| CVE-2026-41341 | 5.4 MEDIUM | OpenClaw < 2026.3.31 - Component Interaction Misclassification in Discord Extension |
| CVE-2026-41335 | 5.3 MEDIUM | OpenClaw < 2026.3.31 - Information Disclosure via Control UI Bootstrap JSON |
| CVE-2026-41332 | 5.3 MEDIUM | OpenClaw < 2026.3.28 - Code Execution via Missing Environment Variable Blocklist |
Showing 20 of 32 CVEs. View all on vendor page →
まだコメントはありません