Skip to content

This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.

Notifications You must be signed in to change notification settings

Jenderal92/CVE-2024-8856

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

CVE-2024-8856

This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below "1.22.22" as vulnerable and logs results to "vuln.txt". Simple and efficient, it helps security researchers and admins detect and address risks quickly.

Features

  • Scans a list of URLs to detect vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.
  • Identifies plugin versions below 1.22.22 as vulnerable (e.g., 1.22.21, 1.22.20).
  • Uses Python libraries such as "requests" to send HTTP requests and check for plugin versions.
  • Supports multithreading to speed up the scanning process across multiple sites simultaneously.
  • Displays scan results with the vulnerability status: vulnerable or not vulnerable based on the version.
  • The found vulnerable sites are saved to a result file ("vuln.txt")

Buy Coffee :

Jenderal92 CVE-2024-8856

How To Run?

  • Download and install Python from the official Python website: https://www.python.org.
  • Install the required modules using the command: pip install requests.
  • Run the script with: python file.py.
  • Provide a list of sites (e.g., url.txt) as input.

Disclaimer !!!

I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!

About

This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy