尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Nuclei template for CVE-2023-29489 | https://github.com/learnerboy88/CVE-2023-29489 | POC详情 |
| 2 | None | https://github.com/xKore123/cPanel-CVE-2023-29489 | POC详情 |
| 3 | a pyhton script to test all results from shodan for cPanel CVE-2023-29489, credits to @assetnote, I just automate | https://github.com/ipk1/CVE-2023-29489.py | POC详情 |
| 4 | None | https://github.com/Mostafa-Elguerdawi/CVE-2023-29489.yaml | POC详情 |
| 5 | None | https://github.com/Mostafa-Elguerdawi/CVE-2023-29489 | POC详情 |
| 6 | Scanner CVE-2023-29489 Python (Selenium) | https://github.com/haxor1337x/Scanner-CVE-2023-29489 | POC详情 |
| 7 | To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run ./ee.sh -f "path/to/index_screenshot.txt" -k "hacked" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots. | https://github.com/whalebone7/EagleEye | POC详情 |
| 8 | CVE-2023-29489 mass exploit | https://github.com/1337r0j4n/CVE-2023-29489 | POC详情 |
| 9 | CVE-2023-29489-XSS | https://github.com/Abdullah7-ma/CVE-2023-29489 | POC详情 |
| 10 | None | https://github.com/tucommenceapousser/CVE-2023-29489 | POC详情 |
| 11 | None | https://github.com/tucommenceapousser/CVE-2023-29489.py | POC详情 |
| 12 | Mass Exploitation For (CVE-2023-29489) | https://github.com/ViperM4sk/cpanel-xss-177 | POC详情 |
| 13 | None | https://github.com/S4muraiMelayu1337/CVE-2023-29489 | POC详情 |
| 14 | SynixCyberCrimeMY CVE-2023-29489 Scanner By SamuraiMelayu1337 & h4zzzzzz@scc | https://github.com/SynixCyberCrimeMy/CVE-2023-29489 | POC详情 |
| 15 | None | https://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner- | POC详情 |
| 16 | This Tool is used to check for CVE-2023-29489 Vulnerability in the provided URL with the set of payloads available | https://github.com/prasad-1808/tool-29489 | POC详情 |
| 17 | None | https://github.com/Praveenms13/CVE-2023-29489 | POC详情 |
| 18 | cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel. | https://github.com/mdaseem03/cpanel_xss_2023 | POC详情 |
| 19 | # CVE-2023-29489 exploit | https://github.com/some-man1/CVE-2023-29489 | POC详情 |
| 20 | An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID. | https://github.com/Cappricio-Securities/CVE-2023-29489 | POC详情 |
| 21 | None | https://github.com/md-thalal/CVE-2023-29489 | POC详情 |
| 22 | Mass Scaning vulnerability in Cpanel [XSS] | https://github.com/0-d3y/CVE-2023-29489 | POC详情 |
| 23 | An issue was discovered in cPanel before 11.109.9999.116. Cross Site Scripting can occur on the cpsrvd error page via an invalid webcall ID. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-29489.yaml | POC详情 |
| 24 | None | https://github.com/Thuankobtcode/CVE-2023-29489 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论