We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [dos] Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation
  • [dos] Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory Creation
  • [webapps] GrandNode 4.40 - Path Traversal / Arbitrary File Download
  • [dos] GSearch 1.0.1.0 - Denial of Service (PoC)
  • [shellcode] Linux/x86_64 - Reverse(0.0.0.0:4444/TCP) Shell (/bin/sh) Shellcode
  • [webapps] SeedDMS < 5.1.11 - 'out.GroupMgr.php' Cross-Site Scripting
  • [webapps] SeedDMS < 5.1.11 - 'out.UsrMgr.php' Cross-Site Scripting
  • [webapps] SeedDMS versions < 5.1.11 - Remote Command Execution
  • [webapps] dotProject 2.1.9 - SQL Injection
  • [papers] Sony PlayStation Vita (PS Vita) - Trinity: PSP Emulator Escape
  • [remote] EA Origin < 10.5.38 - Remote Code Execution
  • [papers] Threat Hunting - Hunter or Hunted
  • [local] Cisco Prime Infrastructure - Runrshell Privilege Escalation (Metasploit)
  • [remote] Cisco Prime Infrastructure Health Monitor - TarArchive Directory Traversal (Metasploit)
  • [dos] Linux - Use-After-Free via race Between modify_ldt() and #BR Exception
  • [webapps] BlogEngine.NET 3.3.6/3.3.7 - XML External Entity Injection
  • [webapps] WebERP 4.15 - SQL injection
  • [local] Tuneclone 2.20 - Local SEH Buffer Overflow
  • [webapps] BlogEngine.NET 3.3.6/3.3.7 - 'theme Cookie' Directory Traversal / Remote Code Execution
  • [webapps] BlogEngine.NET 3.3.6/3.3.7 - 'dirPath' Directory Traversal / Remote Code Execution
  • [local] Serv-U FTP Server < 15.1.7 - Local Privilege Escalation
  • [shellcode] Linux/x86_64 - execve(/bin/sh) Shellcode (22 bytes)
  • [webapps] Sahi pro 8.x - Cross-Site Scripting
  • [webapps] Sahi pro 8.x - SQL Injection
  • [webapps] Sahi pro 7.x/8.x - Directory Traversal
  • [dos] Thunderbird ESR < 60.7.XXX - 'icalrecur_add_bydayrules' Stack-Based Buffer Overflow
  • [dos] Thunderbird ESR < 60.7.XXX - 'parser_get_next_char' Heap-Based Buffer Overflow
  • [dos] Thunderbird ESR < 60.7.XXX - 'icalmemorystrdupanddequote' Heap-Based Buffer Overflow
  • [dos] Thunderbird ESR < 60.7.XXX - Type Confusion
  • [webapps] Spring Security OAuth - Open Redirector
  • [remote] AROX School-ERP Pro - Unauthenticated Remote Command Execution (Metasploit)
  • [local] Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (PowerShell)
  • [dos] Netperf 2.6.0 - Stack-Based Buffer Overflow
  • [local] Exim 4.87 - 4.91 - Local Privilege Escalation
  • [dos] HC10 HC.Server Service 10.14 - Remote Invalid Pointer Write
  • [shellcode] Linux/x86 - Reposition + INC encoder with execve(/bin/sh) Shellcode (66 bytes)
  • [webapps] CleverDog Smart Camera DOG-2W / DOG-2W-V4 - Multiple Vulnerabilities
  • [webapps] RedwoodHQ 2.5.5 - Authentication Bypass
  • [local] Aida64 6.00.5100 - 'Log to CSV File' Local SEH Buffer Overflow
  • [papers] Active Directory Enumeration with PowerShell
  • [local] CentOS 7.6 - 'ptrace_scope' Privilege Escalation
  • [local] Pronestor Health Monitoring < 8.1.11.0 - Privilege Escalation
  • [webapps] Sitecore 8.x - Deserialization Remote Code Execution
  • [papers] LDAP Swiss Army Knife
  • [webapps] FusionPBX 4.4.3 - Remote Command Execution
  • [remote] Webmin 1.910 - 'Package Updates' Remote Command Execution (Metasploit)
  • [webapps] Liferay Portal 7.1 CE GA=3 / SimpleCaptcha API - Cross-Site Scripting
  • [webapps] phpMyAdmin 4.8 - Cross-Site Request Forgery
  • [webapps] WordPress Plugin Insert or Embed Articulate Content into WordPress - Remote Code Execution
  • [local] ProShow 9.0.3797 - Local Privilege Escalation