https://github.com/jenderal92/cve-2024-10508
This tool scans WordPress sites for vulnerabilities in the "RegistrationMagic" plugin (CVE-2024-10508). It checks for the presence of a specific version (`6.0.2.6`) and marks the site as vulnerable if found. The results are saved in a file (`vuln.txt`) for further analysis.
https://github.com/jenderal92/cve-2024-10508
cve-2024-10508 cve-scanner plugin-security python registrationmagic security-tools vulnerability vulnerability-detection vulnerability-scanner wordpress wordpress-security
Last synced: about 1 month ago
JSON representation
This tool scans WordPress sites for vulnerabilities in the "RegistrationMagic" plugin (CVE-2024-10508). It checks for the presence of a specific version (`6.0.2.6`) and marks the site as vulnerable if found. The results are saved in a file (`vuln.txt`) for further analysis.
- Host: GitHub
- URL: https://github.com/jenderal92/cve-2024-10508
- Owner: Jenderal92
- Created: 2024-11-21T04:32:19.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-11-21T04:39:49.000Z (6 months ago)
- Last Synced: 2025-04-09T22:13:51.191Z (about 1 month ago)
- Topics: cve-2024-10508, cve-scanner, plugin-security, python, registrationmagic, security-tools, vulnerability, vulnerability-detection, vulnerability-scanner, wordpress, wordpress-security
- Language: Python
- Homepage:
- Size: 3.91 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2024-10508
This tool scans WordPress sites for vulnerabilities in the RegistrationMagic plugin (CVE-2024-10508).
It checks for the presence of a specific version (6.0.2.6) and marks the site as vulnerable if found.
The results are saved in a file (`vuln.txt`) for further analysis.## Features:
- Scans WordPress websites for vulnerabilities in the "RegistrationMagic" plugin, specifically for CVE-2024-10508.
- Checks for the vulnerable version "6.0.2.6" of the plugin and flags those websites as vulnerable.
- Saves the URLs of vulnerable sites into a result file called "vuln.txt" for further review and reporting.
## Buy Coffee :
- Bitcoin $: 14nXhmRiQx5joCXFTdR8ydm3T8et7MFDXC
- Saweria $: https://saweria.co/Shin403
- Trakteer $: https://trakteer.id/shin403
- Buymeacoffee $: https://www.buymeacoffee.com/shin.code
- Ko-Fi $: https://ko-fi.com/shincode403

## How To Run?
- Download and install Python from the official Python website: https://www.python.org.
- Install the required modules using the command:
pip install requests
. - Run the script with:
python file.py
. - Provide a list of sites (e.g., url.txt) as input.
## Disclaimer !!!
I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!