高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-41329 | 9.9 CRITICAL | OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Context Inheritance and senderIsOwner |
| CVE-2026-41303 | 8.8 HIGH | OpenClaw < 2026.3.28 - Authorization Bypass in Discord Text Approval Commands |
| CVE-2026-41294 | 8.6 HIGH | OpenClaw < 2026.3.28 - Environment Variable Injection via CWD .env File |
| CVE-2026-41296 | 8.2 HIGH | OpenClaw < 2026.3.31 - Sandbox Escape via TOCTOU Race in Remote FS Bridge readFile |
| CVE-2026-41295 | 7.8 HIGH | OpenClaw < 2026.4.2 - Untrusted Workspace Channel Shadow Code Execution during Built-in Ch |
| CVE-2026-41297 | 7.6 HIGH | OpenClaw < 2026.3.31 - Server-Side Request Forgery via Marketplace Plugin Download Redirec |
| CVE-2026-41302 | 7.6 HIGH | OpenClaw < 2026.3.31 - Server-Side Request Forgery via Unguarded fetch() in Marketplace Pl |
| CVE-2026-41299 | 7.1 HIGH | OpenClaw < 2026.3.28 - Client Identity Spoofing in chat.send Gateway Provenance Guard |
| CVE-2026-41300 | 6.5 MEDIUM | OpenClaw < 2026.3.31 - Attacker-Discovered Endpoint Preservation in Remote Onboarding |
| CVE-2026-40045 | 5.7 MEDIUM | OpenClaw < 2026.4.2 - Cleartext Credential Transmission via Unencrypted WebSocket Gateway |
| CVE-2026-41298 | 5.4 MEDIUM | OpenClaw < 2026.4.2 - Authorization Bypass in Session Termination Endpoint |
| CVE-2026-41301 | 5.3 MEDIUM | OpenClaw 2026.3.22 < 2026.3.31 - Forged Nostr DM Pairing State Creation via Signature Veri |
| CVE-2026-41331 | 5.3 MEDIUM | OpenClaw < 2026.3.31 - Resource Consumption via Unauthorized Telegram Audio Preflight Tran |
| CVE-2026-41330 | 4.4 MEDIUM | OpenClaw < 2026.3.31 - Environment Variable Override via Host Exec Policy |
まだコメントはありません