A local web vulnerability scanner.
freewvs is a tool to search webroots for known vulnerable versions of web applications.
You can install freewvs via pip:
pip install freewvs
Alternatively, you can run freewvs directly from the git source.
If you install via pip, you need to update the freewvs database first:
update-freewvsdb
Just run freewvs with a path, e.g.:
freewvs /var/www
The output will be something like this:
Joomla 3.9.11 (3.9.14) CVE-2019-19846 /var/www/example.org
nextcloud 14.0.1 (14.0.5) CVE-2019-5449 /var/www/cloud.example.org
MediaWiki 1.31.1 (1.31.6) CVE-2019-19709 /var/www/wiki.example.org
It scans your webroot for known vulnerable versions of popular web applications.
The output looks like this:
Joomla-3 3.9.11 (3.9.13) CVE-2019-18674 /home/joe/websites/joessite/
This says that in /home/joe/websites/joessite/, there's a Joomla installation of version 3.9.11. This version is vulnerable to CVE-2019-18674, and you should update it to version 3.9.13.
No, as freewvs only checks for the latest vulnerabilities. There may be other vulnerabilities in your version not listed by freewvs. The only way to be sure is to check the upstream changelog.
It means your web application has not released a security update. Often, this means the software is no longer developed.
See CONTRIBUTIONS.md.
freewvs was developed by schokokeks.org hosting.
It's licensed under the 0BSD license.