We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [webapps] Joomla! 3.4.6 - Remote Code Execution
  • [local] WorkgroupMail 7.5.1 - 'WorkgroupMail' Unquoted Service Path
  • [local] Web Companion versions 5.1.1035.1047 - 'WCAssistantService' Unquoted Service Path
  • [local] BlackMoon FTP Server 3.1.2.1731 - 'BMFTP-RELEASE' Unquoted Serive Path
  • [webapps] Restaurant Management System 1.0 - Remote Code Execution
  • [remote] ThinVNC 1.0b1 - Authentication Bypass
  • [webapps] Wordpress Popup Builder 3.49 - Persistent Cross-Site Scripting
  • [webapps] Wordpress Soliloquy Lite 2.5.6 - Persistent Cross-Site Scripting
  • [webapps] Wordpress FooGallery 1.8.12 - Persistent Cross-Site Scripting
  • [remote] Whatsapp 2.19.216 - Remote Code Execution
  • [webapps] CyberArk Password Vault 10.6 - Authentication Bypass
  • [local] Mikogo 5.2.2.150317 - 'Mikogo-Service' Unquoted Serive Path
  • [local] Solaris xscreensaver 11.4 - Privilege Escalation
  • [local] LiteManager 4.5.0 - 'romservice' Unquoted Serive Path
  • [local] X.Org X Server 1.20.4 - Local Stack Overflow
  • [local] Zilab Remote Console Server 3.2.9 - 'zrcs' Unquoted Service Path
  • [webapps] Accounts Accounting 7.02 - Persistent Cross-Site Scripting
  • [local] Lavasoft 2.3.4.7 - 'LavasoftTcpService' Unquoted Service Path
  • [local] ActiveFax Server 6.92 Build 0316 - 'ActiveFaxServiceNT' Unquoted Service Path
  • [local] sudo 1.2.27 - Security Bypass
  • [webapps] Bolt CMS 3.6.10 - Cross-Site Request Forgery
  • [remote] Podman & Varlink 1.5.1 - Remote Code Execution
  • [webapps] Kirona-DRS 5.5.3.5 - Information Disclosure
  • [webapps] Ajenti 2.1.31 - Remote Code Execution
  • [webapps] Express Invoice 7.12 - 'Customer' Persistent Cross-Site Scripting
  • [dos] ActiveFax Server 6.92 Build 0316 - 'POP3 Server' Denial of Service
  • [dos] SpotAuditor 5.3.1.0 - Denial of Service
  • [local] Uplay 92.0.0.6280 - Local Privilege Escalation
  • [webapps] WordPress Arforms 3.7.1 - Directory Traversal
  • [webapps] Intelbras Router WRN150 1.0.18 - Persistent Cross-Site Scripting
  • [local] National Instruments Circuit Design Suite 14.0 - Local Privilege Escalation
  • [dos] Windows Kernel - Out-of-Bounds Read in nt!MiRelocateImage While Parsing Malformed PE File
  • [dos] Windows Kernel - Out-of-Bounds Read in CI!HashKComputeFirstPageHash While Parsing Malformed PE File
  • [dos] Windows Kernel - Out-of-Bounds Read in nt!MiParseImageLoadConfig While Parsing Malformed PE File
  • [dos] Windows Kernel - Out-of-Bounds Read in CI!CipFixImageType While Parsing Malformed PE File
  • [dos] Windows Kernel - NULL Pointer Dereference in nt!MiOffsetToProtos While Parsing Malformed PE File
  • [dos] Windows Kernel - win32k.sys TTF Font Processing Pool Corruption in win32k!ulClearTypeFilter
  • [webapps] TP-Link TL-WR1043ND 2 - Authentication Bypass
  • [local] ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (Metasploit, DEP Bypass)
  • [webapps] SMA Solar Technology AG Sunny WebBox device - 1.6 - Cross-Site Request Forgery
  • [dos] XNU - Remote Double-Free via Data Race in IPComp Input Path
  • [dos] Foscam Video Management System 1.1.6.6 - 'UID' Denial of Service (PoC)
  • [local] DeviceViewer 3.12.0.1 - 'add user' Local Buffer Overflow (DEP Bypass)
  • [webapps] vBulletin 5.0 < 5.5.4 - 'updateAvatar' Authenticated Remote Code Execution
  • [webapps] Zabbix 4.4 - Authentication Bypass
  • [remote] freeFTP 1.0.8 - 'PASS' Remote Buffer Overflow
  • [local] CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
  • [webapps] IBM Bigfix Platform 9.5.9.62 - Arbitrary File Upload
  • [webapps] Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
  • [local] ASX to MP3 converter 3.1.3.7 - '.asx' Local Stack Overflow (DEP)