We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [webapps] FlightPath < 4.8.2 / < 5.0-rc2 - Local File Inclusion
  • [dos] Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
  • [dos] Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write
  • [webapps] CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities
  • [webapps] NETGEAR WiFi Router JWNR2010v5 / R6080 - Authentication Bypass
  • [local] Streamripper 2.6 - 'Song Pattern' Buffer Overflow
  • [local] Microsoft Windows 10.0.17134.648 - HTTP -> SMB NTLM Reflection Leads to Privilege Elevation
  • [remote] Xymon 4.3.25 - useradm Command Execution (Metasploit)
  • [dos] Microsoft Font Subsetting - DLL Heap Corruption in ComputeFormat4CmapData
  • [webapps] Citrix SD-WAN Appliance 10.2.2 - Authentication Bypass / Remote Command Execution
  • [webapps] Jenkins Dependency Graph View Plugin 0.13 - Persistent Cross-Site Scripting
  • [webapps] Sahi Pro 8.0.0 - Remote Command Execution
  • [webapps] MyT Project Management 1.5.1 - User[username] Persistent Cross-Site Scripting
  • [webapps] Tenda D301 v2 Modem Router - Persistent Cross-Site Scripting
  • [webapps] Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting
  • [local] SNMPc Enterprise Edition 9/10 - Mapping Filename Buffer Overflow
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType Font Handling Due to Empty ROS Strings
  • [dos] Microsoft DirectWrite / AFDKO - NULL Pointer Dereferences in OpenType Font Handling While Accessing Empty dynarrays
  • [dos] Microsoft DirectWrite / AFDKO - Multiple Bugs in OpenType Font Handling Related to the "post" Table
  • [dos] Microsoft DirectWrite / AFDKO - Out-of-Bounds Read in OpenType Font Handling Due to Undefined FontName Index
  • [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling While Processing CFF Blend DICT Operator
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readStrings
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType Font Handling Due to Unbounded iFD
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow Due to Integer Overflow in readTTCDirectory
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readCharset
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readFDSelect
  • [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Handling in readEncoding
  • [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due to Incorrect Handling of blendArray
  • [dos] Microsoft DirectWrite / AFDKO - Interpreter Stack Underflow in OpenType Font Handling Due to Missing CHKUFLOW
  • [dos] Microsoft DirectWrite / AFDKO - Use of Uninitialized Memory While Freeing Resources in var_loadavar
  • [dos] Microsoft DirectWrite / AFDKO - Stack-Based Buffer Overflow in do_set_weight_vector_cube for Large nAxes
  • [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due to Negative nAxes
  • [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due to Negative cubeStackDepth
  • [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling due to Out-of-Bounds cubeStackDepth
  • [dos] Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access
  • [dos] Microsoft Windows - Font Subsetting DLL Heap-Based Out-of-Bounds Read in MergeFonts
  • [remote] Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow (2)
  • [dos] Firefox 67.0.4 - Denial of Service
  • [webapps] WordPress Plugin Like Button 1.6.0 - Authentication Bypass
  • [webapps] Karenderia Multiple Restaurant System 5.3 - SQL Injection
  • [remote] Microsoft Exchange 2003 - base64-MIME Remote Code Execution
  • [webapps] Karenderia Multiple Restaurant System 5.3 - Local File Inclusion
  • [remote] Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (Metasploit)
  • [local] Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit)
  • [webapps] Symantec DLP 15.5 MP1 - Cross-Site Scripting
  • [local] Mac OS X TimeMachine - 'tmdiagnose' Command Injection Privilege Escalation (Metasploit)
  • [webapps] Centreon 19.04 - Remote Code Execution
  • [remote] FaceSentry Access Control System 6.4.8 - Remote SSH Root
  • [webapps] FaceSentry Access Control System 6.4.8 - Remote Root Exploit
  • [webapps] FaceSentry Access Control System 6.4.8 - Cross-Site Request Forgery