PoC-in-GitHub/2023/CVE-2023-29489.json
2023-05-01 15:29:14 +09:00

205 lines
No EOL
7.2 KiB
JSON

[
{
"id": 633223830,
"name": "CVE-2023-29489",
"full_name": "learnerboy88\/CVE-2023-29489",
"owner": {
"login": "learnerboy88",
"id": 99548826,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99548826?v=4",
"html_url": "https:\/\/github.com\/learnerboy88"
},
"html_url": "https:\/\/github.com\/learnerboy88\/CVE-2023-29489",
"description": "Nuclei template for CVE-2023-29489",
"fork": false,
"created_at": "2023-04-27T03:30:24Z",
"updated_at": "2023-04-27T03:30:24Z",
"pushed_at": "2023-04-27T03:32:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 633587053,
"name": "cPanel-CVE-2023-29489",
"full_name": "xKore123\/cPanel-CVE-2023-29489",
"owner": {
"login": "xKore123",
"id": 63617858,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63617858?v=4",
"html_url": "https:\/\/github.com\/xKore123"
},
"html_url": "https:\/\/github.com\/xKore123\/cPanel-CVE-2023-29489",
"description": null,
"fork": false,
"created_at": "2023-04-27T20:51:47Z",
"updated_at": "2023-04-28T21:29:10Z",
"pushed_at": "2023-04-27T21:17:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 633952269,
"name": "CVE-2023-29489.py",
"full_name": "ipk1\/CVE-2023-29489.py",
"owner": {
"login": "ipk1",
"id": 32953048,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32953048?v=4",
"html_url": "https:\/\/github.com\/ipk1"
},
"html_url": "https:\/\/github.com\/ipk1\/CVE-2023-29489.py",
"description": "a pyhton script to test all results from shodan for cPanel CVE-2023-29489, credits to @assetnote, I just automate",
"fork": false,
"created_at": "2023-04-28T16:56:36Z",
"updated_at": "2023-04-28T17:07:02Z",
"pushed_at": "2023-04-28T17:02:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 634124004,
"name": "CVE-2023-29489.yaml",
"full_name": "Mostafa-Elguerdawi\/CVE-2023-29489.yaml",
"owner": {
"login": "Mostafa-Elguerdawi",
"id": 61470364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61470364?v=4",
"html_url": "https:\/\/github.com\/Mostafa-Elguerdawi"
},
"html_url": "https:\/\/github.com\/Mostafa-Elguerdawi\/CVE-2023-29489.yaml",
"description": null,
"fork": false,
"created_at": "2023-04-29T05:52:53Z",
"updated_at": "2023-04-29T05:52:54Z",
"pushed_at": "2023-04-29T05:52:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 634124302,
"name": "CVE-2023-29489",
"full_name": "Mostafa-Elguerdawi\/CVE-2023-29489",
"owner": {
"login": "Mostafa-Elguerdawi",
"id": 61470364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61470364?v=4",
"html_url": "https:\/\/github.com\/Mostafa-Elguerdawi"
},
"html_url": "https:\/\/github.com\/Mostafa-Elguerdawi\/CVE-2023-29489",
"description": null,
"fork": false,
"created_at": "2023-04-29T05:54:19Z",
"updated_at": "2023-04-29T05:54:20Z",
"pushed_at": "2023-04-29T05:55:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 634323955,
"name": "Scanner-CVE-2023-29489",
"full_name": "haxor1337x\/Scanner-CVE-2023-29489",
"owner": {
"login": "haxor1337x",
"id": 63400168,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63400168?v=4",
"html_url": "https:\/\/github.com\/haxor1337x"
},
"html_url": "https:\/\/github.com\/haxor1337x\/Scanner-CVE-2023-29489",
"description": "Scanner CVE-2023-29489 Python (Selenium)",
"fork": false,
"created_at": "2023-04-29T18:52:37Z",
"updated_at": "2023-04-30T18:06:56Z",
"pushed_at": "2023-04-29T18:54:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 634734009,
"name": "EagleEye",
"full_name": "whalebone7\/EagleEye",
"owner": {
"login": "whalebone7",
"id": 125891350,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125891350?v=4",
"html_url": "https:\/\/github.com\/whalebone7"
},
"html_url": "https:\/\/github.com\/whalebone7\/EagleEye",
"description": "To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run .\/ee.sh -f \"path\/to\/index_screenshot.txt\" -k \"hacked\" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots.",
"fork": false,
"created_at": "2023-05-01T03:29:11Z",
"updated_at": "2023-05-01T03:54:54Z",
"pushed_at": "2023-05-01T03:44:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]