summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorhanno <hanno@ada9452e-eb2d-45b7-bbe6-05a4ab45a870>2018-02-20 10:48:03 +0000
committerhanno <hanno@ada9452e-eb2d-45b7-bbe6-05a4ab45a870>2018-02-20 10:48:03 +0000
commit32fbe585b3cd84d91566825e23fcd9dd03d4fbb6 (patch)
tree9bfc8c271058d864a3fad802a57067e8dbbc8f56
parent5ca84ab2469d830ba7dc2a0686cc86820ffcc538 (diff)
remove old
git-svn-id: https://svn.schokokeks.org/repos/freewvs@871 ada9452e-eb2d-45b7-bbe6-05a4ab45a870
-rw-r--r--ISSUES14
-rwxr-xr-xfreewvs236
-rw-r--r--freewvsdb/bb.freewvs133
-rw-r--r--freewvsdb/blog.freewvs82
-rw-r--r--freewvsdb/cms.freewvs250
-rw-r--r--freewvsdb/crm.freewvs7
-rw-r--r--freewvsdb/gallery.freewvs65
-rw-r--r--freewvsdb/games.freewvs9
-rw-r--r--freewvsdb/groupware.freewvs33
-rw-r--r--freewvsdb/guestbook.freewvs17
-rw-r--r--freewvsdb/link.freewvs8
-rw-r--r--freewvsdb/misc.freewvs403
-rw-r--r--freewvsdb/plugins.freewvs199
-rw-r--r--freewvsdb/themes.freewvs8
-rw-r--r--freewvsdb/webshop.freewvs33
-rw-r--r--freewvsdb/wiki.freewvs72
-rw-r--r--i18n/de.mobin1108 -> 0 bytes
-rw-r--r--i18n/de.po43
-rw-r--r--i18n/freewvs.pot44
19 files changed, 0 insertions, 1656 deletions
diff --git a/ISSUES b/ISSUES
deleted file mode 100644
index efdee56..0000000
--- a/ISSUES
+++ /dev/null
@@ -1,14 +0,0 @@
-Some known issues:
-
-* phpBB-detection works only based on the CHANGELOG, which is part of the doc (and could be deleted in a live installation).
- Found no better way to do it, still is an ugly workaround. The other "method" of detection the versoin would be the SQL-files,
- but they're even more likely to be deleted in live installations. Only reliable method would probably be checking the database
- itself, but that's outside the scope of this tool.
-
-* phpnuke versions below 8.0 aren't detected.
-
-* drbguestbook only detected via README.
-
-* egroupware only detected via setup, may be missing in live installations.
-
-* tikiwiki only detected via README.
diff --git a/freewvs b/freewvs
deleted file mode 100755
index 06a8998..0000000
--- a/freewvs
+++ /dev/null
@@ -1,236 +0,0 @@
-#!/usr/bin/python -tO
-
-# freewvs 0.1 - the free web vulnerability scanner
-#
-# https://source.schokokeks.org/freewvs/
-#
-# Written 2007-2012 by schokokeks.org Hosting, https://schokokeks.org
-#
-# Contributions by
-# Hanno Boeck, https://hboeck.de/
-# Fabian Fingerle, https://fabian-fingerle.de/
-# Bernd Wurst, https://bwurst.org/
-#
-# To the extent possible under law, the author(s) have dedicated all copyright
-# and related and neighboring rights to this software to the public domain
-# worldwide. This software is distributed without any warranty.
-#
-# You should have received a copy of the CC0 Public Domain Dedication along
-# with this software. If not, see
-# https://creativecommons.org/publicdomain/zero/1.0/
-# Nevertheless, in case you use a significant part of this code, we ask (but
-# not require, see the license) that you keep the authors' names in place and
-# return your changes to the public. We would be especially happy if you tell
-# us what you're going to do with this code.
-
-try: # python3
- import configparser
-except ImportError: # python2
- import ConfigParser as configparser
- # overwrite default open() function
- # this one supports encoding='...'
- from codecs import open
-
-import os
-import glob
-import pprint
-import re
-import optparse
-import sys
-import gettext
-from xml.sax.saxutils import escape
-
-gettext.textdomain('freewvs')
-_ = gettext.gettext
-
-
-def versioncompare(safe_version, find_version):
- if safe_version == [""]:
- return True
- for i in range(min(len(find_version), len(safe_version))):
- if int(find_version[i]) < int(safe_version[i]):
- return True
- if int(find_version[i]) > int(safe_version[i]):
- return False
- return (len(find_version) < len(safe_version))
-
-
-def vulnprint(appname, version, safeversion, vuln, vfilename, subdir,
- style=None):
- appdir = '/'.join(os.path.abspath(vfilename).split('/')[:-1 - subdir])
- if not style:
- print("%(appname)s %(version)s (%(safeversion)s) %(vuln)s "
- "%(appdir)s" % vars())
- elif style == 'fancy':
- print(_("Directory: %(appdir)s") % vars())
- if safeversion != "ok":
- if safeversion != "":
- print(_("Vulnerable %(appname)s %(version)s found, please "
- "update to %(safeversion)s or above.") % vars())
- else:
- print(_("Vulnerable %(appname)s %(version)s found, no fixed "
- "version available.") % vars())
- if vuln[:3] == "CVE":
- print(_("https://cve.mitre.org/cgi-bin/cvename.cgi?name="
- "%(vuln)s") % vars())
- else:
- print(vuln)
- else:
- print(_("%(appname)s %(version)s found.") % vars())
- print("")
- elif style == 'xml':
- state = 'vulnerable'
- if safeversion == 'ok':
- state = 'ok'
- print(' <app state="%s">' % state)
- print(' <appname>%s</appname>' % escape(appname))
- print(' <version>%s</version>' % escape(version))
- print(' <directory>%s</directory>' % escape(appdir))
- if state == 'vulnerable':
- print(' <safeversion>%s</safeversion>' % escape(safeversion))
- print(' <vulninfo>%s</vulninfo>' % escape(vuln))
- print(' </app>')
-
-
-pp = pprint.PrettyPrinter(indent=4)
-
-# Command-line options
-parser = optparse.OptionParser(usage="usage: %prog [options] <path>"
- "[<path2> ...]")
-parser.add_option("-a", "--all", action="store_true", dest="ALL",
- help="Show all webapps found, not just vulnerable")
-parser.add_option("-d", "--debug", action="store_true", dest="DEBUG",
- help="Show lots of debugging output, mainly useful"
- "for development")
-parser.add_option("-f", "--fancy", action="store_const", dest="OUTPUT",
- const="fancy", help="Show more fancy output")
-parser.add_option("-x", "--xml", action="store_const", dest="OUTPUT",
- const="xml", help="Output results as XML")
-opts, args = parser.parse_args()
-
-# Parse vulnerability database
-config = configparser.ConfigParser()
-try:
- config.read(glob.glob('/usr/share/freewvs/*.freewvs'))
- config.read(glob.glob('/usr/local/share/freewvs/*.freewvs'))
- config.read(glob.glob(os.path.dirname(sys.argv[0]) + '/freewvsdb/*.freewvs'))
-except configparser.MissingSectionHeaderError as err:
- print("Error parsing config files: %s" % err)
-
-vdb = []
-for sect in config.sections():
- item = {}
-
- # base options
- item['name'] = sect
- item['safe'] = config.get(sect, 'safe')
- item['file'] = config.get(sect, 'file')
- item['vuln'] = config.get(sect, 'vuln')
- item['subdir'] = int(config.get(sect, 'subdir'))
-
- # match magic
- item['variable'] = []
- for var in config.get(sect, 'variable').split(","):
- item['variable'].append(re.compile(re.escape(var) +
- r"[^0-9\n\r]*[.]*([0-9.]*[0-9])[^0-9.]"))
-
- # optional options
- if config.has_option(sect, 'extra_match'):
- item['extra_match'] = config.get(sect, 'extra_match')
- else:
- item['extra_match'] = False
- if config.has_option(sect, 'extra_nomatch'):
- item['extra_nomatch'] = config.get(sect, 'extra_nomatch')
- else:
- item['extra_nomatch'] = False
- if config.has_option(sect, 'add_minor'):
- item['add_minor'] = config.get(sect, 'add_minor')
- else:
- item['add_minor'] = False
- if config.has_option(sect, 'old_safe'):
- item['old_safe'] = config.get(sect, 'old_safe').split(",")
- else:
- item['old_safe'] = []
-
- vdb.append(item)
-if opts.DEBUG:
- pp.pprint(vdb)
-
-if opts.OUTPUT == 'xml':
- print('<?xml version="1.0" ?>')
- print('<freewvs>')
-
-# start the search
-
-for fdir in args:
- for root, NULL, files in os.walk(fdir):
- for filename in files:
- for item in vdb:
- if filename == item['file']:
- mfile = os.path.join(root, filename)
- try:
- file = open(mfile)
- except Exception:
- continue
- filestr = file.read()
- file.close()
-
- if item['extra_match']:
- ematch = (filestr.find(item['extra_match']) != -1)
- elif item['extra_nomatch']:
- ematch = not (filestr.find(item['extra_nomatch']) != -1)
- else:
- ematch = True
-
- findversion = []
- for var in item['variable']:
- var = var.search(filestr)
- if not var:
- findversion = False
- break
- else:
- findversion.append(var.group(1))
-
- if findversion and ematch:
- findversion = '.'.join(findversion)
-
- # Very ugly phpbb workaround
- if item['add_minor']:
- findversion = findversion.split('.')
- findversion[-1] = str(int(findversion[-1]) +
- int(item['add_minor']))
- findversion = '.'.join(findversion)
-
- if not (versioncompare(item['safe'].split('.'),
- findversion.split('.'))) or \
- item['old_safe'].count(findversion) > 0:
- if opts.ALL:
- if opts.DEBUG:
- print("File " + mfile)
- vulnprint(item['name'], findversion,
- "ok", "", mfile, item['subdir'],
- opts.OUTPUT)
- else:
- if opts.DEBUG:
- print("File " + mfile)
- safev = "9999"
- for ver in item['old_safe']:
- if(versioncompare(ver.split('.'),
- findversion.split('.')) and
- not versioncompare(ver.split('.'),
- safev.split('.'))):
- safev = ver
- if safev == "9999":
- safev = item['safe']
-
- vulnprint(item['name'], findversion,
- safev, item['vuln'],
- mfile, item['subdir'], opts.OUTPUT)
-
- else:
- if opts.DEBUG:
- print("regexp failed for " +
- item['name'] + " on " + mfile)
-
-if opts.OUTPUT == 'xml':
- print('</freewvs>')
diff --git a/freewvsdb/bb.freewvs b/freewvsdb/bb.freewvs
deleted file mode 100644
index 372c22e..0000000
--- a/freewvsdb/bb.freewvs
+++ /dev/null
@@ -1,133 +0,0 @@
-[phpBB]
-url=http://www.phpbb.com
-safe=3.1.4
-old_safe=3.0.14
-vuln=https://www.phpbb.com/community/viewtopic.php?f=14&t=2313941
-file=CHANGELOG.html
-variable=Changes since
-add_minor=1
-subdir=1
-
-[DeluxeBB]
-url=http://www.deluxebb.com/
-safe=
-vuln=CVE-2010-4151
-file=header.php
-variable=$versionname
-subdir=0
-extra_match=DeluxeBB
-
-[PunBB]
-url=http://punbb.org/
-safe=1.4.1
-vuln=https://secunia.com/advisories/46864
-file=install.php
-variable=FORUM_VERSION
-subdir=0
-
-[PunBB12]
-url=http://punbb.org/
-safe=1.4.1
-vuln=https://secunia.com/advisories/46864
-file=install.php
-variable=$punbb_version
-subdir=0
-
-[UseBB]
-url=http://www.usebb.net/
-safe=1.0.12
-latest=1.0.16
-vuln=CVE-2011-3611
-file=common.php
-variable=USEBB_VERSION
-subdir=1
-
-[Vanilla]
-url=http://vanillaforums.com/
-safe=2.1.3
-vuln=http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release
-file=version.php
-variable=APPLICATION_VERSION
-subdir=1
-extra_match=define('APPLICATION', 'Vanilla');
-
-[Vanilla2]
-url=http://vanillaforums.com/
-safe=2.1.3
-vuln=http://vanillaforums.org/discussion/27822/vanilla-2-1-3-security-release
-file=index.php
-variable=APPLICATION_VERSION
-subdir=0
-extra_match=define('APPLICATION', 'Vanilla');
-
-[Simple_Machines_Forum]
-url=http://www.simplemachines.org/
-safe=2.0.5
-old_safe=1.1.16
-vuln=http://www.simplemachines.org/community/index.php?topic=509417.0
-file=index.php
-variable=$forum_version
-subdir=0
-extra_match=Simple Machines Forum
-
-[MyBB]
-url=http://www.mybboard.net/
-safe=1.8.3
-old_safe=1.6.16
-vuln=http://blog.mybb.com/2014/11/20/mybb-1-8-3-1-6-16-released-security-releases/
-file=class_core.php
-variable=$version
-subdir=1
-
-[Phorum]
-url=http://www.phorum.org/
-safe=5.2.19
-latest=5.2.19
-vuln=http://www.phorum.org/phorum5/read.php?64,151943
-file=common.php
-variable=define( "PHORUM"
-subdir=0
-
-[wBB]
-url=http://www.woltlab.com/
-safe=3.0.9
-vuln=http://www.securityfocus.com/archive/1/503867/30/60/threaded
-file=config.inc.php
-variable=define('PACKAGE_VERSION',
-subdir=0
-
-[WBBLite]
-url=http://wbblite.com/
-safe=2.1
-vuln=http://www.securityfocus.com/archive/1/503867/30/60/threaded
-file=package.xml
-variable=<version>
-extra_match=<packagename>WoltLab Burning Board Lite</packagename>
-subdir=0
-
-[FluxBB12]
-url=http://fluxbb.org/
-safe=1.4.7
-vuln=CVE-2011-3621
-file=install.php
-variable=$fluxbb_version
-subdir=1
-
-[FluxBB]
-url=http://fluxbb.org/
-safe=1.5.4
-old_safe=1.4.11
-vuln=http://fluxbb.org/forums/viewtopic.php?id=7217
-file=common.php
-variable=FORUM_VERSION
-extra_match=FORUM_DB_REVISION
-subdir=1
-
-[vBulletin]
-url=https://www.vbulletin.com/
-safe=4.2.2
-vuln=CVE-2013-6129
-file=class_core.php
-variable=define('FILE_VERSION'
-subdir=1
-extra_match=vBulletin
diff --git a/freewvsdb/blog.freewvs b/freewvsdb/blog.freewvs
deleted file mode 100644
index 8e21564..0000000
--- a/freewvsdb/blog.freewvs
+++ /dev/null
@@ -1,82 +0,0 @@
-[Serendipity]
-url=http://www.s9y.org/
-safe=2.0.5
-old_safe=1.7.9
-vuln=CVE-2016-9681
-file=serendipity_config.inc.php
-variable=$serendipity['version']
-subdir=0
-
-[Wordpress]
-url=http://www.wordpress.org/
-safe=4.9.4
-old_safe=4.8.6,4.8.5,4.7.10,4.7.9,4.6.11,4.6.10,4.5.14,4.5.13,4.4.15,4.4.14,4.3.16,4.3.15,4.2.20,4.2.19,4.1.23,4.1.22,4.0.23,4.0.22,3.9.24,3.9.23,3.8.26,3.8.25,3.7.26,3.7.25
-vuln=https://wordpress.org/news/2018/02/wordpress-4-9-4-maintenance-release/
-file=version.php
-variable=$wp_version
-subdir=1
-extra_match=The WordPress version string
-
-[SimplePHPBlog]
-url=http://www.simplephpblog.com/
-safe=0.5.1
-vuln=CVE-2007-5071
-file=sb_functions.php
-variable=$sb_info[ 'version' ]
-subdir=1
-
-[b2evolution]
-url=http://b2evolution.net/
-safe=1.9.2
-old_safe=1.8.7
-vuln=CVE-2007-0175
-file=_application.php
-variable=$app_version
-extra_match=This is b2evolution
-subdir=2
-
-[nucleuscms]
-url=http://www.nucleuscms.org/
-safe=3.40
-vuln=CVE-2009-0929
-file=globalfunctions.php
-variable=$nucleus['version']
-subdir=2
-
-[sBlog]
-url=http://sblog.se
-# Last release 0.7.3 since 2006-03-09
-safe=
-vuln=CVE-2007-1801
-file=version.ini
-variable=conf_current_version
-subdir=1
-extra_match=[sblog_version_info]
-
-[Movable_Type]
-url=http://www.movabletype.com/
-# movable type has a crazy versioning scheme, that makes it basically
-# impossible to really use freewvs properly, latest is 5.2.3
-safe=5.13
-old_safe=5.2.3,5.2.2,5.2.1
-vuln=CVE-2010-3921
-file=mt.php
-variable=VERSION_ID
-subdir=1
-
-[artmedic_weblog]
-url=http://www.artmedic-phpscripts.de/
-safe=
-# 1.0 as of 20080325
-vuln=CVE-2008-0798
-file=artmedic_index.php
-variable=# artmedic weblog
-subdir=0
-
-[DotClear]
-url=http://www.dotclear.net/
-safe=2.2.3
-vuln=CVE-2011-1584
-file=LISEZMOI.txt
-variable=DotClear
-subdir=0
diff --git a/freewvsdb/cms.freewvs b/freewvsdb/cms.freewvs
deleted file mode 100644
index 52e383a..0000000
--- a/freewvsdb/cms.freewvs
+++ /dev/null
@@ -1,250 +0,0 @@
-[WebsiteBaker]
-url=http://www.websitebaker.org/
-safe=2.8.4
-vuln=CVE-2015-0553
-file=version.php
-variable=VERSION
-extra_match=Website Baker Project
-subdir=3
-
-[WebsiteBaker28]
-url=http://www.websitebaker.org/
-safe=2.8.4
-vuln=CVE-2015-0553
-file=info.php
-variable=$template_platform
-extra_match=wb_theme
-subdir=3
-
-[toendaCMS]
-url=http://www.toendacms.com/
-safe=
-vuln=CVE-2007-1872
-file=tcms_version.xml
-variable=release
-subdir=2
-
-[Drupal6]
-url=http://www.drupal.org/
-safe=7.56
-latest=7.56
-vuln=CVE-2017-6921
-file=system.module
-variable=define('VERSION'
-subdir=2
-
-[Drupal7]
-url=http://www.drupal.org/
-safe=7.56
-latest=7.56
-vuln=CVE-2017-6921
-file=bootstrap.inc
-variable=define('VERSION'
-subdir=1
-
-[Drupal8]
-url=http://www.drupal.org/
-safe=8.3.4
-latest=8.3.4
-vuln=CVE-2017-6921
-file=Drupal.php
-variable=const VERSION
-subdir=2
-
-[PHPNuke]
-url=http://phpnuke.org/
-# I'm not really sure about that, but 8.0 is at least vulnerable
-# Versions pre 8.0 aren't easily detectable
-safe=8.1
-vuln=CVE-2007-1519
-file=version.php
-variable=$version_number
-extra_match=PHP-Nuke $version_number
-subdir=2
-
-[Typo3]
-url=http://typo3.org/
-safe=8.1.1
-old_safe=7.6.10,7.6.9,7.6.8,6.2.26,6.2.25,6.2.24
-vuln=https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-013/
-file=config_default.php
-variable=$TYPO_VERSION
-subdir=1
-
-[typo3-6]
-url=http://typo3.org/
-safe=7.0.2
-old_safe=6.2.9,4.5.39
-vuln=https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-002/
-file=SystemEnvironmentBuilder.php
-variable=define('TYPO3_version
-subdir=4
-
-[Joomla-1]
-url=http://www.joomla.org/
-safe=3.8.4
-vuln=CVE-2018-6379
-file=version.php
-variable=var $RELEASE,var $DEV_LEVEL
-extra_match=@package Joomla
-subdir=1
-
-# 1.5 has changed identification
-[Joomla-1_5]
-url=http://www.joomla.org/
-safe=3.8.4
-vuln=CVE-2018-6379
-file=version.php
-variable=var $RELEASE,var $DEV_LEVEL
-extra_match=@package Joomla.Framework
-subdir=2
-
-[Joomla-3]
-url=http://www.joomla.org/
-safe=3.8.4
-vuln=CVE-2018-6379
-file=joomla.xml
-variable=<version>
-#extra_match=@package Joomla.Framework
-extra_match=<name>files_joomla</name>
-subdir=0
-
-[Mambo]
-url=http://www.source.mambo-foundation.org/
-safe=
-vuln=CVE-2008-2905
-file=version.php
-variable=var $RELEASE,var $DEV_LEVEL
-extra_match=@package Mambo
-subdir=1
-
-[w-Agora]
-url=http://www.w-agora.net/
-# last release 4.2.1 in 2006-07-12
-safe=
-vuln=CVE-2007-0607
-file=misc_func.php
-variable=$v =
-subdir=1
-extra_match=w-agora version $v
-
-[MODx]
-url=http://www.modxcms.com/
-safe=1.0.15
-vuln=http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection
-file=version.inc.php
-variable=$version
-subdir=2
-extra_match=$full_appname = 'MODx'
-
-[MODX-1.x]
-url=http://www.modxcms.com/
-safe=1.0.15
-vuln=http://forums.modx.com/thread/94952/multiple-vulnerabilities-xss-remote-command-injection
-file=version.inc.php
-variable=$modx_version
-subdir=2
-
-[MODX-2.x]
-url=http://www.modxcms.com/
-safe=2.2.11
-vuln=http://modx.com/blog/2014/07/15/revolution-2.2.15/
-file=changelog.txt
-variable=MODX Revolution
-subdir=2
-extra_match=MODX
-
-[PostNuke]
-# This one is a hell to detect, not sure for how many versions this works
-url=http://www.postnuke.com
-# 0.764 last stable in 2006-11-20, 0.8.0.0 rcs available
-safe=
-vuln=CVE-2007-0385
-file=global.php
-variable=_MESSAGE_00_a
-subdir=2
-extra_match=http://www.pn-cms.de
-
-[Contenido]
-url=http://www.contenido.org/
-safe=4.8.15
-latest=4.8.15
-vuln=http://www.contenido.org/de/front_content.php?idcat=107&idart=1789&client=6&lang=3
-file=config.misc.php
-variable=$cfg['version']
-subdir=1
-extra_match=Contenido Misc Configurations
-
-[SilverStripe]
-url=http://www.silverstripe.com
-safe=2.4.7
-vuln=CVE-2012-0976
-file=silverstripe_version
-variable=/open/modules/cms/
-subdir=1
-extra_match=/open/modules/cms/
-
-[CMSMadeSimple]
-url=http://www.cmsmadesimple.org/
-safe=1.11.13
-vuln=http://www.cmsmadesimple.org/2015/02/Announcing-CMS-Made-Simple-1-11-13-Security-Release/
-file=version.php
-variable=$CMS_VERSION
-subdir=0
-
-[e107]
-url=http://e107.org/
-safe=1.0.0
-vuln=CVE-2011-4920
-file=ver.php
-variable=$e107info['e107_version']
-subdir=0
-
-[SPIP]
-url=http://www.spip.net/
-safe=2.1.13
-old_safe=2.0.18
-vuln=http://archives.rezo.net/archives/spip-en.mbox/U5QUZ6WJRAJC7H5BR7W5SQG6WCD3PXL7/
-file=inc_version.php
-variable=$spip_version_branche
-subdir=1
-
-[contao]
-url=http://contao.org/
-safe=3.2.5
-old_safe=2.11.14
-vuln=CVE-2014-1860
-latest=3.2.5
-file=CHANGELOG.md
-variable=Version
-extra_match=Contao Open Source CMS
-subdir=0
-
-[contao-old]
-url=http://contao.org/
-safe=3.2.5
-old_safe=2.11.14
-vuln=CVE-2014-1860
-latest=3.2.5
-file=CHANGELOG.txt
-variable=Version
-extra_match=Contao Open Source CMS Changelog
-subdir=0
-
-[redaxo]
-url=http://www.redaxo.org/
-safe=4.5
-vuln=CVE-2012-3869
-latest=4.5
-file=en_gb.lang
-variable=setup_037
-subdir=3
-
-[textpattern]
-url=https://textpattern.com/
-safe=4.5.7
-vuln=CVE-2014-4737
-latest=4.6.2
-file=index.php
-subdir=1
-variable=$thisversion
diff --git a/freewvsdb/crm.freewvs b/freewvsdb/crm.freewvs
deleted file mode 100644
index 0d942b1..0000000
--- a/freewvsdb/crm.freewvs
+++ /dev/null
@@ -1,7 +0,0 @@
-[vtigerCRM]
-url=http://www.vtiger.de
-safe=5.3.0
-vuln=CVE-2011-4670
-file=vtigerversion.php
-variable=$vtiger_current_version
-subdir=0
diff --git a/freewvsdb/gallery.freewvs b/freewvsdb/gallery.freewvs
deleted file mode 100644
index 1644a9a..0000000
--- a/freewvsdb/gallery.freewvs
+++ /dev/null
@@ -1,65 +0,0 @@
-[Phormer]
-url=http://p.horm.org/er/
-safe=
-vuln=CVE-2007-5013
-file=funcs.php
-variable=PHORMER_VERSION
-subdir=0
-
-[Gallery2]
-url=http://gallery.menalto.com/
-safe=2.3.2
-vuln=CVE-2012-1113
-file=module.inc
-variable=setGalleryVersion
-subdir=2
-
-[Gallery3]
-url=http://gallery.menalto.com/
-safe=3.0.9
-vuln=http://galleryproject.org/gallery_3_0_9
-file=gallery.php
-variable=const VERSION
-subdir=3
-
-[Coppermine]
-url=http://coppermine-gallery.net/
-safe=1.5.28
-vuln=CVE-2014-4612
-file=versioncheck.php
-variable=Coppermine version
-subdir=0
-
-[Piwigo/PhpWebGallery]
-url=http://www.phpwebgallery.net/
-safe=2.6.3
-vuln=CVE-2014-4648
-file=constants.php
-variable=PHPWG_VERSION
-subdir=1
-
-[LinPHA]
-url=http://linpha.sourceforge.net
-safe=1.3.4
-vuln=CVE-2008-1856
-file=upgrade.php
-variable=$version
-subdir=1
-extra_match=$inst_linpha_not_work_correctly
-
-[mig]
-url=http://mig.sourceforge.net/
-safe=1.5.0
-vuln=CVE-2005-2603
-file=index.php
-variable=$version
-subdir=0
-extra_match=Mig - A general purpose photo gallery management system.
-
-[zenphoto]
-url=http://www.zenphoto.org/
-safe=1.4.5.4
-vuln=CVE-2013-7242
-file=version.php
-variable=define('ZENPHOTO_VERSION'
-subdir=1
diff --git a/freewvsdb/games.freewvs b/freewvsdb/games.freewvs
deleted file mode 100644
index 76a7321..0000000
--- a/freewvsdb/games.freewvs
+++ /dev/null
@@ -1,9 +0,0 @@
-[NetRisk]
-url=http://phprisk.org/
-safe=
-# 1.9.7 as of 20080205
-vuln=CVE-2008-0144
-file=install.php
-variable=$version
-subdir=0
-extra_match=NetRisk - Setup
diff --git a/freewvsdb/groupware.freewvs b/freewvsdb/groupware.freewvs
deleted file mode 100644
index c2eecc0..0000000
--- a/freewvsdb/groupware.freewvs
+++ /dev/null
@@ -1,33 +0,0 @@
-[Horde-groupware]
-url=http://www.horde.org/
-file=bundle.php
-variable=BUNDLE_VERSION
-extra_match='Horde Groupware'
-safe=1.2.5
-vuln=CVE-2009-3701
-subdir=1
-
-[eGroupWare]
-url=http://www.egroupware.org/
-safe=1.8.006
-vuln=CVE-2014-2027
-file=setup.inc.php
-variable=$setup_info['phpgwapi']['version']
-subdir=2
-
-[more.groupware]
-url=http://www.moregroupware.com/
-safe=
-vuln=CVE-2006-4906
-file=version.inc.php
-variable=$gwversion_number
-subdir=1
-
-[SimpleGroupware]
-url=http://www.simple-groupware.de/
-safe=0.607
-latest=0.724
-vuln=http://www.simple-groupware.de/cms/Release-0-607
-file=setup.php
-variable=define("CORE_VERSION_STRING"
-subdir=2
diff --git a/freewvsdb/guestbook.freewvs b/freewvsdb/guestbook.freewvs
deleted file mode 100644
index 2863e7c..0000000
--- a/freewvsdb/guestbook.freewvs
+++ /dev/null
@@ -1,17 +0,0 @@
-[DRBGuestbook]
-url=http://www.dbscripts.net/guestbook/
-safe=1.1.14
-vuln=CVE-2007-5218
-file=README.txt
-variable=Version
-extra_match=DRBGuestbook
-subdir=0
-
-[SimpGB]
-url=http://www.boesch-it.de/
-safe=1.47.0
-vuln=CVE-2007-5127
-file=global.inc.php
-variable=$version
-subdir=1
-extra_match=$path_simpgb
diff --git a/freewvsdb/link.freewvs b/freewvsdb/link.freewvs
deleted file mode 100644
index 4ee8a9c..0000000
--- a/freewvsdb/link.freewvs
+++ /dev/null
@@ -1,8 +0,0 @@
-[cpDynaLinks]
-url=http://www.cplinks.com/cpdynalinks/
-# last release 1.02 on 2004-10-25
-safe=
-vuln=CVE-2007-5408
-file=version.php
-variable=$cplinks_version
-subdir=0
diff --git a/freewvsdb/misc.freewvs b/freewvsdb/misc.freewvs
deleted file mode 100644
index 84244fd..0000000
--- a/freewvsdb/misc.freewvs
+++ /dev/null
@@ -1,403 +0,0 @@
-[phpMyAdmin-old]
-url=http://www.phpmyadmin.net/
-safe=4.7.7
-vuln=https://www.phpmyadmin.net/security/PMASA-2017-8/
-file=Config.class.php
-variable=PMA_VERSION
-subdir=1
-
-[phpMyAdmin]
-url=http://www.phpmyadmin.net/
-safe=4.7.7
-vuln=https://www.phpmyadmin.net/security/PMASA-2017-8/
-file=Config.php
-variable=PMA_VERSION
-subdir=1
-
-[SquirrelMail]
-url=http://www.squirrelmail.org/
-safe=1.4.22
-vuln=CVE-2010-4554
-file=strings.php
-variable=$version
-extra_match=SquirrelMail version number
-subdir=1
-
-# old mantis versions behave different
-[Mantis-deprecated]
-url=https://mantisbt.org/
-safe=2.5.2
-old_safe=1.3.12
-vuln=CVE-2017-12061
-file=config_defaults_inc.php
-variable=$g_mantis_version
-subdir=0
-
-[Mantis]
-url=https://mantisbt.org/
-safe=2.5.2
-old_safe=1.3.12
-vuln=CVE-2017-12061
-file=constant_inc.php
-variable=MANTIS_VERSION
-subdir=1
-
-[Bugzilla3]
-url=http://www.bugzilla.org/
-safe=4.4.7
-old_safe=4.2.12,4.0.16
-vuln=CVE-2011-2379
-file=Constants.pm
-variable=BUGZILLA_VERSION
-subdir=1
-
-[Bugzilla2]
-url=http://www.bugzilla.org/
-safe=4.4.7
-old_safe=4.2.12,4.0.16
-vuln=CVE-2011-2379
-file=Config.pm
-variable=$Bugzilla::Config::VERSION
-subdir=1
-
-[SimpNews]
-url=http://www.boesch-it.de
-safe=2.48
-vuln=CVE-2010-2858
-file=global.inc.php
-variable=$version
-subdir=1
-extra_match=$path_simpnews
-
-[calendarix]
-url=http://www.calendarix.com/
-safe=
-vuln=CVE-2007-3183
-file=cal_config.inc.php
-variable=$version
-subdir=0
-
-[myEvent]
-url=http://mywebland.com/
-safe=
-vuln=CVE-2007-0690
-file=config.php
-variable=$version
-extra_match=$eventbgcolor
-subdir=0
-
-[php-stats]
-url=http://php-stats.com/
-safe=
-vuln=CVE-2007-5453
-file=update.php
-variable=$version
-extra_match=http://php-stats.com/
-subdir=0
-
-[Ampache]
-url=http://ampache.org/
-safe=3.5.3
-vuln=http://ampache.org/2009/12/20/3-5-3-security-release/
-file=init.php
-variable=$results['version']
-subdir=1
-extra_match=$ampache_path
-
-[SiteBar]
-url=http://sitebar.org/
-safe=3.3.9
-vuln=CVE-2007-5492
-file=database.inc.php
-variable=SB_CURRENT_RELEASE
-subdir=1
-
-[phpPgAdmin]
-url=http://phppgadmin.sourceforge.net/
-safe=5.0.4
-vuln=CVE-2012-1600
-file=lib.inc.php
-variable=$appVersion
-subdir=1
-extra_match=phpPgAdmin
-
-[FTP Admin]
-url=http://ftpadmin.sourceforge.net/
-safe=
-vuln=CVE-2007-6234
-file=session_start.php
-variable=VERSION
-subdir=0
-extra_match=define("TITLE", "FTP Admin");
-
-[RoundCube-deprecated]
-url=http://roundcube.net
-safe=1.3.3
-vuln=CVE-2017-16651
-file=index.php
-variable=RCMAIL_VERSION
-subdir=0
-
-[RoundCube]
-url=http://roundcube.net
-safe=1.3.3
-vuln=CVE-2017-16651
-file=iniset.php
-variable=RCMAIL_VERSION
-subdir=2
-
-[Moodle]
-url=http://www.moodle.org/
-safe=3.2.2
-old_safe=3.1.5,3.0.9,2.7.19
-vuln=CVE-2017-2641
-file=version.php
-variable=$release
-subdir=0
-extra_match=MOODLE VERSION INFORMATION
-
-[cacti]
-url=http://www.cacti.net/
-safe=0.8.7
-vuln=CVE-2007-6035
-file=global.php
-variable=$config["cacti_version"]
-subdir=1
-
-[gnopaste]
-url=http://gnopaste.sf.net/
-safe=0.5.4
-vuln=CVE-2006-2834
-file=install.php
-variable=$_SESSION['page_title'] = 'gnopaste
-subdir=0
-
-[Flyspray]
-url=http://www.flyspray.org/
-safe=0.9.9.7
-vuln=CVE-2012-1058
-file=class.flyspray.php
-variable=var $version
-subdir=1
-
-[phpMyID]
-url=http://siege.org/projects/phpMyID
-safe=
-vuln=CVE-2008-4730
-file=MyID.php
-variable=@version
-subdir=0
-
-[phplist-old]
-url=http://www.phplist.com/
-safe=3.2.7
-vuln=CVE-2016-10045
-file=connect.php
-variable=define("VERSION"
-subdir=1
-
-[phplist]
-url=http://www.phplist.com/
-safe=3.2.7
-vuln=CVE-2016-10045
-file=init.php
-variable=define("VERSION"
-subdir=1
-
-[Piwik]
-url=http://piwik.org/
-safe=3.0.3
-vuln=https://piwik.org/changelog/piwik-3-0-3/
-file=Version.php
-variable=const VERSION
-subdir=1
-extra_match=@link http://piwik.org
-
-[phpWishlist]
-url=http://phpwishlist.sourceforge.net/
-safe=0.1.15
-vuln=CVE-2005-2203
-file=header.inc.php
-variable=$version
-subdir=1
-extra_match=* Wishlist -
-
-[awstats]
-url=http://awstats.sourceforge.net/
-safe=7.1
-vuln=CVE-2012-4547
-file=awstats.pl
-variable=$VERSION =
-subdir=0
-
-[phpMyFAQ]
-url=http://www.phpmyfaq.de/
-safe=2.5.5
-vuln=http://www.phpmyfaq.de/advisory_2009-12-01.php
-file=phpmyfaq.spec
-variable=version
-subdir=1
-
-[Horde-webmail]
-url=http://www.horde.org/
-file=bundle.php
-variable=BUNDLE_VERSION
-extra_match='Horde Groupware Webmail Edition'
-safe=1.2.7
-vuln=http://secunia.com/advisories/39860
-subdir=1
-
-[ResourceSpace]
-url=http://www.resourcespace.org/
-file=version.php
-variable=$productname='ResourceSpace';$productversion
-safe=4.2.2833
-latest=4.3.2912
-vuln=CVE-2011-4311
-subdir=1
-
-[apc.php]
-url=http://pecl.php.net/package/APC
-file=apc.php
-# this does not contain it's "real" version number, using the CVS id
-# instead - there's been an XSS pre 3.1.4.
-variable=$VERSION='$Id: apc.php
-safe=301867
-vuln=CVE-2010-3294
-subdir=0
-
-[webtrees]
-url=http://webtrees.net/
-file=session.php
-variable=define('WT_VERSION'
-safe=1.2.4
-latest=1.2.4
-vuln=http://webtrees.net/en/forums/2-open-discussion/16423-webtrees-124
-subdir=1
-
-[PhpGedView]
-url=http://phpgedview.sourceforge.net/
-file=session.php
-variable=define('PGV_VERSION'
-safe=
-vuln=2011-0405
-subdir=1
-
-[status.net]
-url=http://status.net
-file=common.php
-variable=define('STATUSNET_BASE_VERSION'
-safe=0.9.9
-vuln=CVE-2011-3370
-subdir=1
-
-[limesurvey18]
-url=http://www.limesurvey.org/
-file=common.php
-variable=$versionnumber
-extra_match=LimeSurvey
-safe=2.07
-vuln=CVE-2015-5078
-subdir=0
-
-[limesurvey19]
-url=http://www.limesurvey.org/
-file=version.php
-variable=$versionnumber
-extra_match=$dbversionnumber
-safe=2.07
-vuln=CVE-2015-5078
-subdir=0
-
-[limesurvey]
-url=http://www.limesurvey.org/
-file=version.php
-variable=$config['versionnumber']
-extra_match=LimeSurvey
-safe=2.07
-vuln=CVE-2015-5078
-subdir=2
-
-[webcalendar]
-url=http://www.k5n.us/webcalendar.php
-file=config.php
-variable=$PROGRAM_VERSION
-extra_match=@package WebCalendar
-safe=1.2.7
-vuln=CVE-2013-1422
-subdir=1
-
-[nextcloud]
-url=https://nextcloud.com
-file=version.php
-variable=$OC_VersionString
-vuln=CVE-2017-0891
-safe=11.0.3
-old_safe=10.0.5,9.0.58
-subdir=0
-extra_match=$vendor = 'nextcloud';
-
-[owncloud]
-url=http://owncloud.org/
-file=version.php
-variable=$OC_VersionString
-vuln=https://owncloud.org/security/advisory/?id=oc-sa-2017-003
-safe=9.1.3
-old_safe=9.0.8,8.2.10,8.1.12
-subdir=0
-extra_nomatch=nextcloud
-
-[owncloud5]
-url=http://owncloud.org/
-file=util.php
-variable=return '
-subdir=1
-extra_match=class OC_Util
-vuln=https://owncloud.org/security/advisory/?id=oc-sa-2017-003
-safe=9.1.3
-old_safe=9.0.8,8.2.10,8.1.12
-
-[videodb]
-url=http://www.videodb.net/
-file=constants.php
-variable=('VERSION',
-extra_match=TBL_
-safe=4.0
-vuln=http://www.exploit-db.com/exploits/17660/
-subdir=1
-
-[OpenX]
-url=http://www.openx.com/
-file=constants.php
-variable=OA_VERSION
-extra_match=OpenX
-safe=
-vuln=http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/
-subdir=0
-
-[revive]
-url=http://www.revive-adserver.com/
-file=constants.php
-variable=VERSION
-extra_match=Revive Adserver
-safe=3.0.5
-vuln=CVE-2013-5954
-subdir=0
-
-[osTicket]
-url=http://osticket.com/
-file=bootstrap.php
-variable=define('THIS_VERSION',
-safe=1.8.12
-latest=1.9.12
-vuln=https://github.com/osTicket/osTicket-1.8/releases/tag/v1.8.12
-subdir=0
-
-[Gitlist]
-url=http://gitlist.org/
-file=footer.twig
-variable=Powered by
-safe=0.5.0
-latest=0.6.0
-vuln=CVE-2014-4511
-subdir=3
diff --git a/freewvsdb/plugins.freewvs b/freewvsdb/plugins.freewvs
deleted file mode 100644
index 5a7b202..0000000
--- a/freewvsdb/plugins.freewvs
+++ /dev/null
@@ -1,199 +0,0 @@
-[Serendipity-mycalendar]
-url=http://www.s9y.org
-safe=0.13
-vuln=CVE-2007-6390
-file=serendipity_event_mycalendar.php
-variable=$propbag->add('version'
-subdir=0
-
-[Serendipity-freetag]
-url=http://www.s9y.org
-safe=3.30
-vuln=CVE-2011-3610
-file=serendipity_event_freetag.php
-variable=$propbag->add('version'
-subdir=0
-
-[SquirrelMail-gpg]
-url=http://www.squirrelmail.org/plugin_view.php?id=153
-safe=2.1
-vuln=CVE-2007-3779
-file=gpg_pref_functions.php
-variable=$GPG_VERSION
-subdir=0
-
-[Drupal-Views]
-url=http://drupal.org/project/views
-safe=2.13
-vuln=CVE-2011-4113
-file=views.info
-variable=version = "6.x
-subdir=0
-
-[Wordpress-timthumb]
-url=http://code.google.com/p/timthumb/
-safe=2.0
-vuln=CVE-2011-4106
-file=timthumb.php
-variable=('VERSION',
-extra_match=TimThumb
-subdir=0
-
-[Wordpress-timthumb_renamed]
-url=http://code.google.com/p/timthumb/
-safe=2.0
-vuln=CVE-2011-4106
-file=thumb.php
-variable=('VERSION',
-extra_match=TimThumb
-subdir=0
-
-[Wordpress-timthumb-renamed]
-url=http://code.google.com/p/timthumb/
-safe=2.0
-vuln=CVE-2011-4106
-file=thumb.php
-variable=define ('VERSION',
-extra_match="TimThumb"
-subdir=0
-
-[Joomla-JCE]
-url=http://www.joomlacontenteditor.net/
-safe=2.1
-vuln=CVE-2012-2902
-file=editor.php
-variable=$_version
-extra_match=JCE class
-subdir=3
-
-[WP Super Cache]
-url=http://wordpress.org/extend/plugins/wp-super-cache/
-safe=1.4.9
-latest=1.4.9
-vuln=https://wptavern.com/wp-super-cache-1-4-9-patches-multiple-xss-vulnerabilities
-file=wp-cache.php
-variable=Version:
-extra_match=Plugin Name: WP Super Cache
-subdir=0
-
-[W3 Total Cache]
-url=http://wordpress.org/extend/plugins/w3-total-cache/
-safe=0.9.5
-vuln=https://secupress.me/w3-total-cache-vulnerable-xss-high-risk/
-file=w3-total-cache.php
-variable=Version:
-extra_match=Plugin Name: W3 Total Cache
-subdir=0
-
-[phpThumb]
-url=http://phpthumb.sourceforge.net/
-safe=1.7.10
-vuln=CVE-2010-1598
-file=phpthumb.class.php
-variable=$phpthumb_version
-subdir=0
-
-[Wordpress-Jetpack]
-url=http://jetpack.me/
-safe=4.0.4
-vuln=https://jetpack.com/2016/06/20/jetpack-4-0-4-bug-fixes/
-file=jetpack.php
-variable=JETPACK__VERSION
-subdir=0
-
-[Wordpress-MailPoet]
-url=http://www.mailpoet.com/
-safe=2.6.8
-vuln=CVE-2014-4726
-file=base.php
-variable=static $version
-extra_match=WYSIJA_object
-subdir=0
-
-[Wordpress-CustomContact]
-url=https://wordpress.org/plugins/custom-contact-forms/
-safe=5.1.0.4
-vuln=http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html
-file=custom-contact-forms.php
-variable=Version
-subdir=0
-
-[Wordpress-SliderRevolution]
-url=http://themepunch.com/revolution/
-safe=4.2.0
-vuln=http://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
-file=revslider.php
-variable=$revSliderVersion
-subdir=0
-
-[Wordpress-NextGEN]
-url=https://wordpress.org/plugins/nextgen-gallery/
-safe=2.1.79
-vuln=https://blog.sucuri.net/2017/02/sql-injection-vulnerability-nextgen-gallery-wordpress.html
-file=nggallery.php
-variable=NGG_PLUGIN_VERSION
-subdir=0
-
-[Wordpress-Akismet]
-url=https://wordpress.org/plugins/akismet/
-safe=3.1.5
-vuln=https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-akismet-wordpress-plugin.html
-file=akismet.php
-variable=AKISMET_VERSION
-subdir=0
-
-[Wordpress-AllInOneSEO]
-url=http://semperfiwebdesign.com/blog/all-in-one-seo-pack/all-in-one-seo-pack-release-history/
-safe=2.3.8
-vuln=https://www.wordfence.com/blog/2016/07/new-xss-vulnerability-all-in-one-seo-pack/
-file=all_in_one_seo_pack.php
-variable=define( 'AIOSEOP_VERSION'
-subdir=0
-
-[Wordpress-DownloadManager]
-url=https://wordpress.org/plugins/download-manager/
-safe=2.7.5
-vuln=http://blog.sucuri.net/2014/12/security-advisory-high-severity-wordpress-download-manager.html
-file=download-manager.php
-variable=define('WPDM_Version'
-subdir=0
-
-[Wordpress-Fancybox]
-url=https://wordpress.org/plugins/fancybox-for-wordpress/
-safe=3.0.4
-vuln=CVE-2015-1494
-file=fancybox.php
-variable=FBFW_VERSION
-subdir=0
-
-[Joomla-Googlemaps]
-url=http://joomlacode.org/gf/project/mambot_google1/
-safe=3.1
-vuln=http://joomlacode.org/gf/project/mambot_google1/news/?id=4119
-file=plugin_googlemap3.perm
-variable=<version>
-subdir=0
-
-[Wordpress-SEObyYoast]
-url=https://wpvulndb.com/vulnerabilities/7841https://wordpress.org/plugins/fancybox-for-wordpress/
-safe=2.2
-vuln=https://inventropy.us/blog/yoast-seo-plugin-cross-site-scripting-vulnerability/
-file=wp-seo-main.php
-variable=WPSEO_VERSION
-subdir=0
-
-[Wordpress-GoogleAnalyticsbyMonsterInsights]
-url=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
-safe=5.4.5
-vuln=https://wordpress.org/plugins/google-analytics-for-wordpress/changelog/
-file=googleanalytics.php
-variable=GAWP_VERSION
-subdir=0
-
-[Wordpress-Captcha]
-url=https://de.wordpress.org/plugins/captcha/
-safe=4.4.5
-vuln=https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/
-file=captcha.php
-variable=Version:
-subdir=0
diff --git a/freewvsdb/themes.freewvs b/freewvsdb/themes.freewvs
deleted file mode 100644
index 60d245e..0000000
--- a/freewvsdb/themes.freewvs
+++ /dev/null
@@ -1,8 +0,0 @@
-[Wordpress-Theme-Twentyfifteen]
-url=http://www.wordpress.org
-safe=1.2
-vuln=https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss.html
-file=style.css
-variable=Version:
-extra_match=Theme Name: Twenty Fifteen
-subdir=0
diff --git a/freewvsdb/webshop.freewvs b/freewvsdb/webshop.freewvs
deleted file mode 100644
index f402966..0000000
--- a/freewvsdb/webshop.freewvs
+++ /dev/null
@@ -1,33 +0,0 @@
-[FreeWebshop]
-url=http://www.freewebshop.org/
-safe=2.2.7
-vuln=CVE-2007-6711
-file=subs.inc.php
-variable=$version
-subdir=1
-
-[Magento-old]
-url=http://www.magentocommerce.com/
-safe=1.9.2.2
-vuln=CVE-2015-5161
-file=Mage.php
-variable=return '
-subdir=1
-
-[Magento]
-url=http://www.magentocommerce.com/
-safe=1.9.2.2
-vuln=CVE-2015-5161
-# This does not reliably give correct version numbers,
-# but it works for the latest versions
-file=RELEASE_NOTES.txt
-variable=====
-subdir=0
-
-[zencart]
-url=http://www.zen-cart.com/
-safe=1.3.9
-vuln=CVE-2009-2254
-file=paypaldp.php
-variable=$this->codeVersion
-subdir=3
diff --git a/freewvsdb/wiki.freewvs b/freewvsdb/wiki.freewvs
deleted file mode 100644
index fe85f90..0000000
--- a/freewvsdb/wiki.freewvs
+++ /dev/null
@@ -1,72 +0,0 @@
-[MediaWiki]
-url=https://www.mediawiki.org/
-safe=1.29.2
-old_safe=1.28.3,1.27.4
-latest=1.29.2
-vuln=CVE-2017-8809
-file=DefaultSettings.php
-variable=$wgVersion
-subdir=1
-upgradeinstructions=https://www.mediawiki.org/wiki/Manual:Upgrading
-
-[TWiki]
-url=http://twiki.org/
-safe=5.0.1
-vuln=CVE-2010-3841
-file=TWiki.pm
-variable=$RELEASE
-subdir=1
-
-[PmWiki]
-url=http://www.pmwiki.org/
-safe=2.2.96
-vuln=http://www.pmwiki.org/wiki/PmWiki/ChangeLog
-file=version.php
-variable=$Version
-extra_match=pmwiki
-subdir=1
-
-[TikiWiki]
-url=http://tikiwiki.org/
-safe=5.3
-old_safe=3.8
-vuln=CVE-2010-4239
-file=twversion.class.php
-variable=$this->version
-subdir=2
-
-[TikiWiki-old]
-url=http://tikiwiki.org/
-safe=5.3
-old_safe=3.8
-vuln=CVE-2010-4239
-file=README
-variable=version
-extra_match=Tiki! The wiki
-subdir=0
-
-[phpwiki]
-url=http://phpwiki.sourceforge.net/
-safe=1.3.14
-vuln=CVE-2007-3193
-file=prepend.php
-variable=PHPWIKI_VERSION
-subdir=1
-
-[phpwiki-legacy]
-url=http://phpwiki.sourceforge.net/
-safe=1.3.14
-vuln=CVE-2007-3193
-file=config.php
-variable=PHPWIKI_VERSION
-subdir=1
-
-[etherpad-lite]
-url=http://etherpad.org/
-# not really, 1.1.3 is safe, but 1.1.3/1.1.4 contain wrong version string
-safe=1.1.2
-vuln=http://etherpad.org/
-file=package.json
-variable=version
-extra_match=https://github.com/Pita/etherpad-lite
-subdir=0
diff --git a/i18n/de.mo b/i18n/de.mo
deleted file mode 100644
index 79e819b..0000000
--- a/i18n/de.mo
+++ /dev/null
Binary files differ
diff --git a/i18n/de.po b/i18n/de.po
deleted file mode 100644
index 3e8acab..0000000
--- a/i18n/de.po
+++ /dev/null
@@ -1,43 +0,0 @@
-# German translations for freewvs package.
-# Copyright (C) 2008 Hanno Boeck
-# This file is distributed under the CC0.
-# Hanno Boeck <hanno@hboeck.de>, 2008.
-#
-msgid ""
-msgstr ""
-"Project-Id-Version: freewvs 0.2\n"
-"Report-Msgid-Bugs-To: hanno@hboeck.de\n"
-"POT-Creation-Date: 2008-07-14 10:32+0200\n"
-"PO-Revision-Date: 2008-07-14 10:34+0100\n"
-"Last-Translator: Hanno Böck <hanno@hboeck.de>\n"
-"Language-Team: German\n"
-"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
-"Content-Transfer-Encoding: 8bit\n"
-"Plural-Forms: nplurals=2; plural=(n != 1);\n"
-
-#: freewvs:43
-#, python-format
-msgid "Directory: %(appdir)s"
-msgstr "Verzeichnis: %(appdir)s"
-
-#: freewvs:46
-#, python-format
-msgid "Vulnerable %(appname)s %(version)s found, please update to %(safeversion)s or above."
-msgstr "Verwundbares Programm %(appname)s %(version)s gefunden, bitte auf %(safeversion)s oder höher aktualisieren."
-
-#: freewvs:49
-#, python-format
-msgid "Vulnerable %(appname)s %(version)s found, no fixed version available."
-msgstr "Verwundbares Programm %(appname)s %(version)s gefunden, keine nicht verwundbare Version verfügbar."
-
-#: freewvs:52
-#, python-format
-msgid "http://cve.mitre.org/cgi-bin/cvename.cgi?name=%(vuln)s"
-msgstr "http://cve.mitre.org/cgi-bin/cvename.cgi?name=%(vuln)s"
-
-#: freewvs:57
-#, python-format
-msgid "%(appname)s %(version)s found."
-msgstr "%(appname)s %(version)s gefunden."
-
diff --git a/i18n/freewvs.pot b/i18n/freewvs.pot
deleted file mode 100644
index 5dd4683..0000000
--- a/i18n/freewvs.pot
+++ /dev/null
@@ -1,44 +0,0 @@
-# SOME DESCRIPTIVE TITLE.
-# Copyright (C) YEAR THE PACKAGE'S COPYRIGHT HOLDER
-# This file is distributed under the same license as the PACKAGE package.
-# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
-#
-#, fuzzy
-msgid ""
-msgstr ""
-"Project-Id-Version: PACKAGE VERSION\n"
-"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2008-07-14 10:32+0200\n"
-"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
-"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
-"Language-Team: LANGUAGE <LL@li.org>\n"
-"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
-"Content-Transfer-Encoding: 8bit\n"
-
-#: freewvs:43
-#, python-format
-msgid "Directory: %(appdir)s"
-msgstr ""
-
-#: freewvs:46
-#, python-format
-msgid ""
-"Vulnerable %(appname)s %(version)s found, please update to %(safeversion)s "
-"or above."
-msgstr ""
-
-#: freewvs:49
-#, python-format
-msgid "Vulnerable %(appname)s %(version)s found, no fixed version available."
-msgstr ""
-
-#: freewvs:52
-#, python-format
-msgid "http://cve.mitre.org/cgi-bin/cvename.cgi?name=%(vuln)s"
-msgstr ""
-
-#: freewvs:57
-#, python-format
-msgid "%(appname)s %(version)s found."
-msgstr ""