We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [dos] Linux - 'page->_refcount' Overflow via FUSE
  • [dos] Linux - Missing Locking in Siemens R3964 Line Discipline Race Condition
  • [dos] systemd - Lack of Seat Verification in PAM Module Permits Spoofing Active Session to polkit
  • [local] Ross Video DashBoard 8.5.1 - Insecure Permissions
  • [webapps] UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting
  • [remote] ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)
  • [webapps] Msvod 10 - Cross-Site Request Forgery (Change User Information)
  • [webapps] 74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User)
  • [local] LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)
  • [shellcode] Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
  • [dos] Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)
  • [webapps] WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion
  • [dos] QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service
  • [dos] Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC)
  • [remote] Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)
  • [local] SystemTap 1.3 - MODPROBE_OPTIONS Privilege Escalation (Metasploit)
  • [webapps] Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection
  • [webapps] Oracle Business Intelligence 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - Directory Traversal
  • [local] LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)
  • [dos] Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC)
  • [remote] ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit)
  • [local] Evernote 7.9 - Code Execution via Path Traversal
  • [dos] Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in GlyphIterator::setCurrGlyphID
  • [dos] Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in sc_FindExtrema4
  • [dos] DHCP Server 2.5.2 - Denial of Service (PoC)
  • [dos] ASUS HG100 - Denial of Service
  • [remote] MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow
  • [local] Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation
  • [local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation
  • [local] Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass
  • [local] Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation
  • [local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation
  • [local] Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation
  • [local] Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation
  • [dos] AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC)
  • [webapps] Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion
  • [dos] PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC)
  • [dos] PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC)
  • [local] Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation
  • [webapps] Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting
  • [remote] Cisco RV130W Routers - Management Interface Remote Command Execution (Metasploit)
  • [shellcode] Linux/x86 - Cat File Encode to base64 and post via curl to Webserver Shellcode (125 bytes)
  • [dos] UltraVNC Launcher 1.2.2.4 - 'Path' Denial of Service (PoC)
  • [dos] UltraVNC Viewer 1.2.2.4 - 'VNC Server' Denial of Service (PoC)
  • [remote] MailCarrier 2.51 - POP3 'TOP' SEH Buffer Overflow
  • [remote] MailCarrier 2.51 - POP3 'LIST' SEH Buffer Overflow
  • [remote] MailCarrier 2.51 - POP3 'USER' Buffer Overflow
  • [remote] CuteNews 2.1.2 - 'avatar' Remote Code Execution (Metasploit)
  • [remote] RemoteMouse 3.008 - Arbitrary Remote Command Execution
  • [shellcode] Linux/x86 - MMX-PUNPCKLBW Encoder Shellcode (61 bytes)