We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [local] Check Point ZoneAlarm 8.8.1.110 - Local Privilege Escalation
  • [local] Microsoft Windows CONTACT - Remote Code Execution
  • [webapps] Oracle Reports Developer Component 12.2.1.3 - Cross-site Scripting
  • [local] blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
  • [local] Microsoft Windows 10 - XmlDocument Insecure Sharing Privilege Escalation
  • [dos] Microsoft Windows 10 - 'RestrictedErrorInfo' Unmarshal Section Handle Use-After-Free
  • [dos] WebKit JSC JIT - GetIndexedPropertyStorage Use-After-Free
  • [webapps] Blueimp's jQuery File Upload 9.22.0 - Arbitrary File Upload Exploit
  • [dos] Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory in Invalid Array Length
  • [webapps] Coship Wireless Router 4.0.0.48 / 4.0.0.40 / 5.0.0.54 / 5.0.0.55 / 10.0.0.49 - Unauthenticated Admin Password Reset
  • [webapps] GL-AR300M-Lite 2.27 - Authenticated Command Injection / Arbitrary File Download / Directory Traversal
  • [dos] NTPsec 1.1.2 - 'config' Authenticated Out-of-Bounds Write Denial of Service (PoC)
  • [dos] NTPsec 1.1.2 - 'ntp_control' Authenticated NULL Pointer Dereference (PoC)
  • [dos] NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
  • [dos] NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
  • [webapps] ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution
  • [webapps] doorGets CMS 7.0 - Arbitrary File Download
  • [webapps] Roxy Fileman 1.4.5 - Arbitrary File Download
  • [webapps] FortiGate FortiOS < 6.0.3 - LDAP Credential Disclosure
  • [dos] Spotify 1.0.96.181 - 'Proxy configuration' Denial of Service (PoC)
  • [papers] Windows Debugging 101
  • [webapps] ownDMS 4.7 - SQL Injection
  • [local] Microsoft Windows VCF - Remote Code Execution
  • [shellcode] Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
  • [dos] 1Password < 7.0 - Denial of Service
  • [webapps] AudioCode 400HD - Command Injection
  • [webapps] Portier Vision 4.4.4.2 / 4.4.4.6 - SQL Injection
  • [local] Microsoft Windows 10 - COM Desktop Broker Privilege Escalation
  • [local] Microsoft Windows 10 - Browser Broker Cross Session Privilege Escalation
  • [local] Microsoft Windows 10 - DSSVC MoveFileInheritSecurity Privilege Escalation
  • [local] Microsoft Windows 10 - DSSVC CanonicalAndValidateFilePath Security Feature Bypass
  • [local] Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Delete Privilege Escalation
  • [local] Microsoft Windows 10 - DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation
  • [local] Microsoft Windows 10 - SSPI Network Authentication Session 0 Privilege Escalation
  • [local] Dokany 1.2.0.1000 - Stack-Based Buffer Overflow Privilege Escalation
  • [webapps] Bigcart - Ecommerce Multivendor System 1.0 - SQL Injection
  • [webapps] Umbraco CMS 7.12.4 - Authenticated Remote Code Execution
  • [webapps] Job Portal Platform 1.0 - SQL Injection
  • [webapps] Real Estate Custom Script 2.0 - SQL Injection
  • [webapps] ThinkPHP 5.X - Remote Command Execution
  • [webapps] Hucart CMS 5.7.4 - Cross-Site Request Forgery (Add Administrator Account)
  • [webapps] HealthNode Hospital Management System 1.0 - SQL Injection
  • [webapps] Lenovo R2105 - Cross-Site Request Forgery (Command Execution)
  • [webapps] Cleanto 5.0 - SQL Injection
  • [webapps] Find a Place CMS Directory 1.5 - SQL Injection
  • [webapps] Craigs Classified Ads CMS Theme 1.0.2 - SQL Injection
  • [remote] Hootoo HT-05 - Remote Code Execution (Metasploit)
  • [local] xorg-x11-server < 1.20.3 - Local Privilege Escalation (Solaris 11 inittab)
  • [webapps] Live Call Support Widget 1.5 - Remote Code Execution / SQL Injection
  • [webapps] Live Call Support Widget 1.5 - Cross-Site Request Forgery (Add Admin)