We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [webapps] Nimble Streamer 3.0.2-2 < 3.5.4-9 - Directory Traversal
  • [remote] LibreOffice < 6.2.6 Macro - Python Code Execution (Metasploit)
  • [webapps] Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (Metasploit)
  • [webapps] WordPress Add Mime Types Plugin 2.2.1 - Cross-Site Request Forgery
  • [webapps] YouPHPTube 7.2 - 'userCreate.json.php' SQL Injection
  • [webapps] Webmin 1.920 - Remote Code Execution
  • [webapps] Neo Billing 3.5 - Persistent Cross-Site Scripting
  • [webapps] FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure
  • [webapps] FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure (Metasploit)
  • [webapps] Kimai 2 - Persistent Cross-Site Scripting
  • [dos] RAR Password Recovery 1.80 - 'User Name and Registration Code' Denial of Service
  • [webapps] Web Wiz Forums 12.01 - 'PF' SQL Injection
  • [webapps] Integria IMS 5.0.86 - Arbitrary File Upload
  • [dos] GetGo Download Manager 6.2.2.3300 - Denial of Service
  • [webapps] Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion
  • [webapps] EyesOfNetwork 5.1 - Authenticated Remote Command Execution
  • [dos] Adobe Acrobat Reader DC for Windows - Double Free due to Malformed JP2 Stream
  • [dos] Adobe Acrobat Reader DC for Windows - free() of Uninitialized Pointer due to Malformed JBIG2Globals Stream
  • [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malformed JP2 Stream
  • [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Memory Corruption due to Malformed TTF Font
  • [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow in CoolType.dll
  • [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malformed Font Stream
  • [dos] Adobe Acrobat Reader DC for Windows - Static Buffer Overflow due to Malformed Font Stream
  • [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow While Processing Malformed PDF
  • [dos] Adobe Acrobat Reader DC for Windows - Use-After-Free due to Malformed JP2 Stream
  • [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Out-of-Bounds read due to Malformed JP2 Stream
  • [dos] Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in FixSbitSubTableFormat1
  • [dos] Microsoft Font Subsetting - DLL Heap Corruption in MakeFormat12MergedGlyphList
  • [dos] Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in WriteTableFromStructure
  • [dos] Microsoft Font Subsetting - DLL Heap Corruption in ReadAllocFormat12CharGlyphMapList
  • [dos] Microsoft Font Subsetting - DLL Heap Corruption in ReadTableIntoStructure
  • [dos] Microsoft Font Subsetting - DLL Heap Corruption in FixSbitSubTables
  • [dos] Microsoft Font Subsetting - DLL Double Free in MergeFormat12Cmap / MakeFormat12MergedGlyphList
  • [dos] Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in GetGlyphIdx
  • [dos] Microsoft Font Subsetting - DLL Returning a Dangling Pointer via MergeFontPackage
  • [dos] Adobe Acrobat CoolType (AFDKO) - Call from Uninitialized Memory due to Empty FDArray in Type 1 Fonts
  • [dos] Adobe Acrobat CoolType (AFDKO) - Memory Corruption in the Handling of Type 1 Font load/store Operators
  • [local] Microsoft Windows Text Services Framework MSCTF - Multiple Vulnerabilities
  • [dos] NSKeyedUnarchiver - Info Leak in Decoding SGBigUTF8String
  • [remote] Agent Tesla Botnet - Arbitrary Code Execution (Metasploit)
  • [webapps] ManageEngine opManager 12.3.150 - Authenticated Code Execution
  • [dos] ABC2MTEX 1.6.1 - Command Line Stack Overflow
  • [local] Microsoft Windows 10 AppXSvc Deployment Service - Arbitrary File Deletion
  • [webapps] TortoiseSVN 1.12.1 - Remote Code Execution
  • [webapps] WordPress Plugin Download Manager 2.5 - Cross-Site Request Forgery
  • [webapps] D-Link DIR-600M - Authentication Bypass (Metasploit)
  • [webapps] Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'customfields.php' SQL Injection
  • [dos] Windows PowerShell - Unsanitized Filename Command Execution
  • [webapps] SugarCRM Enterprise 9.0.0 - Cross-Site Scripting
  • [remote] AZORult Botnet - SQL Injection