Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Nuclei template for CVE-2023-29489 | https://github.com/learnerboy88/CVE-2023-29489 | POC Details |
| 2 | None | https://github.com/xKore123/cPanel-CVE-2023-29489 | POC Details |
| 3 | a pyhton script to test all results from shodan for cPanel CVE-2023-29489, credits to @assetnote, I just automate | https://github.com/ipk1/CVE-2023-29489.py | POC Details |
| 4 | None | https://github.com/Mostafa-Elguerdawi/CVE-2023-29489.yaml | POC Details |
| 5 | None | https://github.com/Mostafa-Elguerdawi/CVE-2023-29489 | POC Details |
| 6 | Scanner CVE-2023-29489 Python (Selenium) | https://github.com/haxor1337x/Scanner-CVE-2023-29489 | POC Details |
| 7 | To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run ./ee.sh -f "path/to/index_screenshot.txt" -k "hacked" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots. | https://github.com/whalebone7/EagleEye | POC Details |
| 8 | CVE-2023-29489 mass exploit | https://github.com/1337r0j4n/CVE-2023-29489 | POC Details |
| 9 | CVE-2023-29489-XSS | https://github.com/Abdullah7-ma/CVE-2023-29489 | POC Details |
| 10 | None | https://github.com/tucommenceapousser/CVE-2023-29489 | POC Details |
| 11 | None | https://github.com/tucommenceapousser/CVE-2023-29489.py | POC Details |
| 12 | Mass Exploitation For (CVE-2023-29489) | https://github.com/ViperM4sk/cpanel-xss-177 | POC Details |
| 13 | None | https://github.com/S4muraiMelayu1337/CVE-2023-29489 | POC Details |
| 14 | SynixCyberCrimeMY CVE-2023-29489 Scanner By SamuraiMelayu1337 & h4zzzzzz@scc | https://github.com/SynixCyberCrimeMy/CVE-2023-29489 | POC Details |
| 15 | None | https://github.com/Makurorororororororo/Validate-CVE-2023-29489-scanner- | POC Details |
| 16 | This Tool is used to check for CVE-2023-29489 Vulnerability in the provided URL with the set of payloads available | https://github.com/prasad-1808/tool-29489 | POC Details |
| 17 | None | https://github.com/Praveenms13/CVE-2023-29489 | POC Details |
| 18 | cpanel_xss_2023 is a simple Python script designed for finding CVE-2023-29489 vulnerability in cpanel. | https://github.com/mdaseem03/cpanel_xss_2023 | POC Details |
| 19 | # CVE-2023-29489 exploit | https://github.com/some-man1/CVE-2023-29489 | POC Details |
| 20 | An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID. | https://github.com/Cappricio-Securities/CVE-2023-29489 | POC Details |
| 21 | None | https://github.com/md-thalal/CVE-2023-29489 | POC Details |
| 22 | Mass Scaning vulnerability in Cpanel [XSS] | https://github.com/0-d3y/CVE-2023-29489 | POC Details |
| 23 | An issue was discovered in cPanel before 11.109.9999.116. Cross Site Scripting can occur on the cpsrvd error page via an invalid webcall ID. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-29489.yaml | POC Details |
| 24 | None | https://github.com/Thuankobtcode/CVE-2023-29489 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet