关联漏洞
介绍
# CVE-2024-24919
## Name: CVE-2024-24919 Scanner
## Author: 0x.ans
## Contact: Instagram: [0x.ans](https://instagram.com/0x.ans)
______ ______
/ ___/ | / / __/
/ /__ | |/ / _/-2024-24919
\___/ |___/___/
0xans
## Usage:
```sh
python3 scanner.py [-x TARGET] [-w WORDLIST]
```
## Tool Description:
The CVE-2024-24919 Scanner is a Python tool designed to find potential CVE-2024-24919 vulnerabilities in web applications.
## Options:
- `-h, --help`: Show help message and exit.
- `-x TARGET, --target TARGET`: Specify the target domain.
- `-w WORDLIST, --wordlist WORDLIST`: Wordlist file containing URLs.
## Example Usage:
**To scan a specific target:**
```sh
python3 scanner.py -x example.com
```
**To scan multiple targets from a wordlist:**
```sh
python3 scanner.py -w urls.txt
```
## Issues?
- DM me on Instagram
- If you have any questions about the tool, you can reach out to me on Instagram: [0x.ans](https://instagram.com/0x.ans)
文件快照
[4.0K] /data/pocs/085188ffbb07fbcdb2f108156e484fd02379ba44
├── [2.2K] CVE-2024-24919.py
└── [ 993] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。