尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2026-22812 - OpenCode Unauth RCE | https://github.com/Udyz/CVE-2026-22812-Exp | POC详情 |
| 2 | None | https://github.com/rohmatariow/CVE-2026-22812-exploit | POC详情 |
| 3 | CVE-2026-22812 | https://github.com/Ashwesker/Ashwesker-CVE-2026-22812 | POC详情 |
| 4 | CVE-2026-22812 - OpenCode Unauthenticated RCE-Nuclei template for scan | https://github.com/mad12wader/CVE-2026-22812 | POC详情 |
| 5 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%BA%E5%B7%A5%E6%99%BA%E8%83%BD%E6%BC%8F%E6%B4%9E/OpenCode%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2026-22812.md | POC详情 |
| 6 | OpenCode versions prior to 1.0.216 contain an unauthenticated remote code execution vulnerability. The application exposes session and shell execution endpoints without proper authentication, allowing remote attackers to create sessions and execute arbitrary shell commands on the underlying server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-22812.yaml | POC详情 |
| 7 | Security-hardened fork of OpenCode - Fixes CVE-2026-22812 (CVSS 8.8 RCE) that upstream refuses to patch | https://github.com/barrersoftware/opencode-secure | POC详情 |
| 8 | OpenCode < v1.0.216 - Unauthenticated RCE | https://github.com/0xgh057r3c0n/CVE-2026-22812 | POC详情 |
| 9 | None | https://github.com/CayberMods/CVE-2026-22812-POC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论