Browse all 5 CVE security advisories affecting Dragonmonk111. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-43993 | JunoClaw: SSRF in WAVS computeDataVerify allows cloud-metadata and internal-service access — junoclawCWE-918 | 8.2 | High | 2026-05-12 |
| CVE-2026-43992 | JunoClaw: MCP write tools exposed raw BIP-39 mnemonic as a tool-call parameter — junoclawCWE-200 | 9.8 | Critical | 2026-05-12 |
| CVE-2026-43990 | JunoClaw: plugin-shell shell-metacharacter injection via shell wrapper — junoclawCWE-77 | 8.4 | High | 2026-05-12 |
| CVE-2026-43989 | JunoClaw: upload_wasm accepted arbitrary filesystem paths without validation — junoclawCWE-20 | 8.5 | High | 2026-05-12 |
| CVE-2026-43991 | JunoClaw: plugin-shell shell-injection bypass via substring blocklist — junoclawCWE-78 | 8.4 | High | 2026-05-12 |
This page lists every published CVE security advisory associated with Dragonmonk111. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.