We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [dos] Core FTP Lite 1.3 - Denial of Service (PoC)
  • [webapps] Easy2Pilot 7 - Cross-Site Request Forgery (Add User)
  • [webapps] Nanometrics Centaur 4.3.23 - Unauthenticated Remote Memory Leak
  • [webapps] DBPower C300 HD Camera - Remote Configuration Disclosure
  • [webapps] Virtual Freer 1.58 - Remote Command Execution
  • [remote] Anviz CrossChex - Buffer Overflow (Metasploit)
  • [webapps] LabVantage 8.3 - Information Disclosure
  • [webapps] SOPlanning 1.45 - 'users' SQL Injection
  • [local] Cuckoo Clock v5.0 - Buffer Overflow
  • [webapps] SOPlanning 1.45 - Cross-Site Request Forgery (Add User)
  • [local] TFTP Turbo 4.6.1273 - 'TFTP Turbo 4' Unquoted Service Path
  • [webapps] WordPress Theme Fruitful 3.8 - Persistent Cross-Site Scripting
  • [webapps] Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User)
  • [local] DHCP Turbo 4.61298 - 'DHCP Turbo 4' Unquoted Service Path
  • [local] MSI Packages Symbolic Links Processing - Windows 10 Privilege Escalation
  • [local] BOOTP Turbo 2.0.1214 - 'BOOTP Turbo' Unquoted Service Path
  • [webapps] Avaya Aura Communication Manager 5.2 - Remote Code Execution
  • [webapps] Wordpress Plugin Strong Testimonials 2.40.1 - Persistent Cross-Site Scripting
  • [local] HP System Event 1.2.9.0 - 'HPWMISVC' Unquoted Service Path
  • [webapps] SOPlanning 1.45 - 'by' SQL Injection
  • [local] PHP 7.0 < 7.4 (Unix) - 'debug_backtrace' disable_functions Bypass
  • [local] Windows Kernel - Information Disclosure
  • [local] SprintWork 2.3.1 - Local Privilege Escalation
  • [local] EPSON EasyMP Network Projection 2.81 - 'EMP_NSWLSV' Unquoted Service Path
  • [local] HomeGuard Pro 9.3.1 - Insecure Folder Permissions
  • [webapps] phpMyChat Plus 1.98 - 'pmc_username' SQL Injection
  • [webapps] PANDORAFMS 7.0 - Authenticated Remote Code Execution
  • [local] OpenTFTP 1.66 - Local Privilege Escalation
  • [local] HP System Event Utility - Local Privilege Escalation
  • [local] MyVideoConverter Pro 3.14 - 'TVSeries' Buffer Overflow
  • [local] MyVideoConverter Pro 3.14 - 'Output Folder' Buffer Overflow
  • [local] MyVideoConverter Pro 3.14 - 'Movie' Buffer Overflow
  • [remote] Microsoft SharePoint - Deserialization Remote Code Execution
  • [local] Sudo 1.8.25p - 'pwfeedback' Buffer Overflow
  • [remote] OpenSMTPD 6.4.0 < 6.6.1 - Local Privilege Escalation + Remote Code Execution
  • [local] Wedding Slideshow Studio 1.36 - 'Name' Buffer Overflow
  • [local] Disk Savvy Enterprise 12.3.18 - Unquoted Service Path
  • [local] Disk Sorter Enterprise 12.4.16 - 'Disk Sorter Enterprise' Unquoted Service Path
  • [webapps] WordPress InfiniteWP - Client Authentication Bypass (Metasploit)
  • [local] DVD Photo Slideshow Professional 8.07 - 'Name' Buffer Overflow
  • [local] Sync Breeze Enterprise 12.4.18 - 'Sync Breeze Enterprise' Unquoted Service Path
  • [local] FreeSSHd 1.3.1 - 'FreeSSHDService' Unquoted Service Path
  • [local] freeFTPd v1.0.13 - 'freeFTPdService' Unquoted Service Path
  • [webapps] Vanilla Forums 2.6.3 - Persistent Cross-Site Scripting
  • [local] DVD Photo Slideshow Professional 8.07 - 'Key' Buffer Overflow
  • [webapps] CHIYU BF430 TCP IP Converter - Stored Cross-Site Scripting
  • [local] Torrent iPod Video Converter 1.51 - Stack Overflow
  • [remote] OpenSMTPD - MAIL FROM Remote Code Execution (Metasploit)
  • [remote] D-Link Devices - Unauthenticated Remote Command Execution in ssdpcgi (Metasploit)
  • [local] Ricoh Driver - Privilege Escalation (Metasploit)