Install Scanner

Detect vulnerabilities in OS packages

Scanner program to detect vulnerabilities in the actual device

If you have a server to scan at hand, install the scanner program on the target server. The installation is completed by executing a single command.

Vulnerability detection without scanner program

If you want to try a quick screen operation without using a scanner or if you do not have a server at hand, try the paste scan mode, which can be easily registered only by screen operations. Paste scan allows you to detect CVEs by copy-pasting a list of packages on the FutureVuls screen and registering them. It supports vulnerability management in offline environments with no Internet connection or in production environments where the scanner program cannot be installed.

  • PasteScan Linux

    Sample data to paste on screen

    Item Value to paste
    OS Family Amazon Linux
    Version 2
    Kernel Release 5.11.15
    Command Execution Result curl 0 7.76.1 4.amzn2.0.1 x86_64 @amzn2-core
    glibc 0 2.26 48.amzn2 x86_64 @amzn2-core
  • Paste Scan Windows

    Sample data to paste on screen

    Item Value to Paste
    OS Family Windows
    Edition windows Windows 10 Version 20H2 for x64-based Systems
    Command Execution Result KB5012117

Detect vulnerabilities in non-OS packages

FutureVuls supports vulnerability detection outside of OS packages.

  • Scanning application dependency libraries (e.g. Java)
  • Application frameworks (e.g. Ruby on Rails)
  • Docker Image
  • Middleware (e.g. Tomcat)
  • Compiled and installed by yourself
  • NW equipment (Cisco IOS, etc.)
  • WordPress plugins and themes

See Scanning Method Options and Features for more information on scanning methods.

Also see Supported Environmentsfor a list of supported scanning targets.