An open API service indexing awesome lists of open source software.

https://github.com/jenderal92/cve-2024-8856

This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.
https://github.com/jenderal92/cve-2024-8856

cve-2024-8856 cve-scanner plugin-vulnerability security-tools vulnerability wordpress wordpress-plugin-scanner wordpress-security wp-time-capsule

Last synced: about 1 month ago
JSON representation

This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.

Awesome Lists containing this project

README

        

# CVE-2024-8856

This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.
It identifies plugin versions below "1.22.22" as vulnerable and logs results to "vuln.txt".
Simple and efficient, it helps security researchers and admins detect and address risks quickly.

## Features


  • Scans a list of URLs to detect vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.

  • Identifies plugin versions below 1.22.22 as vulnerable (e.g., 1.22.21, 1.22.20).

  • Uses Python libraries such as "requests" to send HTTP requests and check for plugin versions.

  • Supports multithreading to speed up the scanning process across multiple sites simultaneously.

  • Displays scan results with the vulnerability status: vulnerable or not vulnerable based on the version.

  • The found vulnerable sites are saved to a result file ("vuln.txt")

## Buy Coffee :


  • Bitcoin $: 14nXhmRiQx5joCXFTdR8ydm3T8et7MFDXC

  • Saweria $: https://saweria.co/Shin403

  • Trakteer $: https://trakteer.id/shin403

  • Buymeacoffee $: https://www.buymeacoffee.com/shin.code

  • Ko-Fi $: https://ko-fi.com/shincode403

![Jenderal92 CVE-2024-8856](https://github.com/user-attachments/assets/39ae4cfb-fa89-4f8f-a80e-d7ec2534fce7)

## How To Run?


  • Download and install Python from the official Python website: https://www.python.org.

  • Install the required modules using the command: pip install requests.

  • Run the script with: python file.py.

  • Provide a list of sites (e.g., url.txt) as input.

## Disclaimer !!!

I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!