We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....

SCANYOURSECURITY work

Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.

Last EXPLOITS

Up to Date

  • [webapps] vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution
  • [webapps] CMS Made Simple 2.2.14 - Authenticated Arbitrary File Upload
  • [webapps] Fuel CMS 1.4.7 - 'col' SQL Injection (Authenticated)
  • [local] BarcodeOCR 19.3.6 - 'BarcodeOCR' Unquoted Service Path
  • [webapps] ManageEngine ADSelfService Build prior to 6003 - Remote Code Execution (Unauthenticated)
  • [webapps] Warehouse Inventory System 1.0 - Cross-Site Request Forgery (Change Admin Password)
  • [webapps] Daily Expenses Management System 1.0 - 'item' SQL Injection
  • [webapps] All-Dynamics Digital Signage System 2.0.2 - Cross-Site Request Forgery (Add Admin)
  • [local] CodeMeter 6.60 - 'CodeMeter.exe' Unquoted Service Path
  • [webapps] Victor CMS 1.0 - 'Search' SQL Injection
  • [webapps] Stock Management System 1.0 - Authentication Bypass
  • [dos] QlikView 12.50.20000.0 - 'FTP Server Address' Denial of Service (PoC)
  • [dos] ACTi NVR3 Standard or Professional Server 3.0.12.42 - Denial of Service (PoC)
  • [webapps] Daily Expenses Management System 1.0 - 'username' SQL Injection
  • [dos] RTSP for iOS 1.0 - 'IP Address' Denial of Service (PoC)
  • [dos] Mocha Telnet Lite for iOS 4.2 - 'User' Denial of Service (PoC)
  • [webapps] Pi-hole 4.3.2 - Remote Code Execution (Authenticated)
  • [webapps] Online Shopping Alphaware 1.0 - Authentication Bypass
  • [webapps] Wordpress Plugin Maintenance Mode by SeedProd 5.1.1 - Persistent Cross-Site Scripting
  • [webapps] Cisco Adaptive Security Appliance Software 9.7 - Unauthenticated Arbitrary File Deletion
  • [webapps] Cisco Adaptive Security Appliance Software 9.11 - Local File Inclusion
  • [webapps] eGroupWare 1.14 - 'spellchecker.php' Remote Command Execution
  • [local] docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter)
  • [webapps] Rails 5.0.1 - Remote Code Execution
  • [webapps] Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting
  • [webapps] pfSense 2.4.4-p3 - Cross-Site Request Forgery
  • [webapps] Socket.io-file 2.0.31 - Arbitrary File Upload
  • [webapps] Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)
  • [webapps] F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion
  • [webapps] Webtareas 2.1p - Arbitrary File Upload (Authenticated)
  • [webapps] Bio Star 2.8.2 - Local File Inclusion
  • [webapps] PandoraFMS 7.0 NG 746 - Persistent Cross-Site Scripting
  • [webapps] Koken CMS 0.22.24 - Arbitrary File Upload (Authenticated)
  • [webapps] elaniin CMS - Authentication Bypass
  • [webapps] Online Course Registration 1.0 - Unauthenticated Remote Code Execution
  • [webapps] LibreHealth 2.0.0 - Authenticated Remote Code Execution
  • [webapps] Bludit 3.9.2 - Directory Traversal
  • [webapps] WordPress Plugin Email Subscribers & Newsletters 4.2.2 - 'hash' SQL Injection (Unauthenticated)
  • [webapps] WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download
  • [dos] Calavera UpLoader 3.5 - 'FTP Logi' Denial of Service (PoC + SEH Overwrite)
  • [local] Free MP3 CD Ripper 2.8 - Stack Buffer Overflow (SEH + Egghunter)
  • [local] Port Forwarding Wizard 4.8.0 - Buffer Overflow (SEH)
  • [webapps] UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin)
  • [webapps] INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution
  • [webapps] ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection
  • [local] Socusoft Photo to Video Converter Professional 8.07 - 'Output Folder' Buffer Overflow (SEH Egghunter)
  • [webapps] GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated)
  • [local] DiskBoss 7.7.14 - 'Reports and Data Directory' Buffer Overflow (SEH Egghunter)
  • [local] Frigate Professional 3.36.0.9 - 'Pack File' Buffer Overflow (SEH Egghunter)
  • [local] Nidesoft DVD Ripper 5.2.18 - Local Buffer Overflow (SEH)