freewvsdb | wordpress update | 2021-05-14 10:32:30 |
---|---|---|
misc | adapt wordpress helper script to json format, fix shellcheck issues | 2020-02-17 17:33:46 |
tests | use curly set syntax and remove unneeded r for open, warnings from pyupgrade | 2020-06-10 20:09:07 |
.gitignore | avoid committing pycache and python objects | 2019-12-12 18:28:04 |
.travis.yml | python 3.9 not yet supported by travis | 2020-09-11 20:37:14 |
CONTRIBUTIONS.md | put security in separate file to make github security policy happy | 2020-06-19 20:08:45 |
COPYING | License change to cc0 | 2012-07-12 12:34:02 |
ISSUES | initial commit | 2007-11-01 16:35:50 |
README.md | fix markdown linK | 2020-09-11 20:15:24 |
SECURITY.md | put security in separate file to make github security policy happy | 2020-06-19 20:08:45 |
freewvs | remove obsolete warning about old freewvs dirs | 2020-06-19 20:12:11 |
setup.py | update version | 2020-07-06 13:15:03 |
update-freewvsdb | use curly set syntax and remove unneeded r for open, warnings from pyupgrade | 2020-06-10 20:09:07 |
A local web vulnerability scanner.
freewvs is a tool to search webroots for know vulnerable versions of web applications.
It scans your webroot for known vulnerable versions of popular web applications.
Output looks like this:
Joomla-3 3.9.11 (3.9.13) CVE-2019-18674 /home/joe/websites/joessite/
This says that in /home/joe/websites/joessite/, there's a Joomla installation of version 3.9.11. This version is vulnerable to CVE-2019-18674 and you should update to version 3.9.13.
No, as freewvs only checks for the latest vulnerabilities. There may be other vulnerabilities in your version not listed by freewvs. The only way to be sure is to check the upstream changelog.
It means your web application has not released a security update. Often this means the software is no longer developed.
See CONTRIBUTIONS.md.
freewvs was developed by schokokeks.org hosting.
It's licensed as CC0.