关联漏洞
描述
Mass Scaning vulnerability in Cpanel [XSS]
介绍

[](https://opensource.org/licenses/MIT)
[](https://www.python.org/downloads/release)
[](https://github.com/0-d3y/CVE-2023-29489/issues)
[](https://github.com/0.d3y/CVE-2023-29489/stargazers)
# CVE-2023-29489
Mass Scaning vulnerability in Cpanel [XSS]
## KALI LINUX
```sudo pip install BeautifulSoup```
```sudo pip install shodan```
```sudo pip install pystyle```
```git clone https://github.com/0-d3y/CVE-2023-29489.git```
```cd CVE-2023-29489```
```python cve_2023_29489.py```
## TERMUX
```pkg install BeautifulSoup```
```pkg instaal shodan ```
```pkg install pystyle```
```pkg install requests```
```git clone https://github.com/0-d3y/CVE-2023-29489.git```
```cd CVE-2023-29489```
```python cve_2023_29489.py```
## Follow me on social media:
[](https://twitter.com/Linux_ye)
[](https://www.instagram.com/cyber_77k)
[](https://www.youtube.com/@0.d3y)
[](https://t.me/i_0d3y)
文件快照
[4.0K] /data/pocs/7698bf6a324c36b01e09a93e3796829dc30cd790
├── [2.6K] cve_2023_29489.py
├── [288K] Picsart_24-08-25_02-48-44-728.png
└── [1.6K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。