We understand that it can be very difficult to find managed IT services and support company that covers Apple support, Windows support and Linux support.We use Microsoft Windows, Apple Mac OSX and Various Linux distributions on our own network....

Scanyoursecurity uses vulnerability scanning tools, both commercial and proprietary, as a part of our application assessment process. Vulnerability scanning is one part of our hybrid approach to application assessment. Combined with code review and security testing....

Your security team log many events -- more and more of them all the time. Unfortunately, they don't make much use of these logs except the oldest days when trying to understand something long after it happened.Firewall logs provide threats and traffic behaviour on the network....

Scanyoursecurity Firewall/Router Audit thoroughly evaluates the rule base for known security risks and policy violations. Firewalls and Routers must be implemented and maintained properly. Our Firewall/Router Audit provides a detailed analysis that reduces risks and increases perimeter security....


Scanyoursecurity is a consultancy responsible for protecting businesses from cyber threats, cyber-attacks, internal threats and business outages. Our technical experts have years of experience in recommending, specifying and implementing IT Security Solutions.

Port scanning is usually done in the initial phase of a penetration test in order to discover all network entry points into the target system. Port scanning is done differently for TCP ports and for UDP ports, which is why we have different tools. Before report, created result would have been completed with False Positive elimination accordingly.

Penetration Testing is to identify the presence of points where a threat (defined by the hacker) can be arranged with existing risks to achieve penetration. Scanyoursecurity helps to prevent penetration by identifying these points and providing effective methods for optimization before they are exploited by malicious hackers.


Up to Date

  • [webapps] Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting
  • [webapps] Alcatel-Lucent Omnivista 8770 - Remote Code Execution
  • [webapps] Yachtcontrol Webapplication 1.0 - Unauthenticated Remote Code Execution
  • [local] SpotAuditor 5.3.2 - 'Base64' Local Buffer Overflow (SEH)
  • [webapps] PRO-7070 Hazır Profesyonel Web Sitesi 1.0 - Authentication Bypass
  • [dos] Omron PLC 1.0.0 - Denial of Service (PoC)
  • [webapps] Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting
  • [local] Microsoft Windows 10 - 'WSReset' UAC Protection Bypass (propsys.dll)
  • [local] Microsoft Windows - 'WSReset' UAC Protection Bypass (Registry)
  • [local] Microsoft Windows - Multiple UAC Protection Bypasses
  • [local] Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
  • [local] Trend Micro Deep Security Agent 11 - Arbitrary File Overwrite
  • [remote] Integard Pro NoJs - Remote Buffer Overflow
  • [webapps] Verot 2.0.3 - Remote Code Execution
  • [webapps] Broadcom CA Privilged Access Manager 2.8.2 - Remote Command Execution
  • [local] Amiti Antivirus 25.0.640 - Unquoted Service Path
  • [local] NETGATE Data Backup 3.0.620 - 'NGDatBckpSrv' Unquoted Service Path
  • [webapps] OwnCloud 8.1.8 - Username Disclosure
  • [webapps] Cisco WLC 2504 8.9 - Denial of Service (PoC)
  • [local] Microsoft Visual Basic 2010 Express - XML External Entity Injection
  • [webapps] Online Clinic Management System 2.2 - HTML Injection
  • [local] Microsoft Windows Media Center 2002 - XML External Entity MotW Bypass
  • [webapps] Revive Adserver 4.2 - Remote Code Execution
  • [webapps] Intelbras Router RF1200 1.1.3 - Cross-Site Request Forgery
  • [webapps] Online Invoicing System 2.6 - 'description' Persistent Cross-Site Scripting
  • [local] Microsoft Excel 2016 1901 - XML External Entity Injection
  • [local] Anviz CrossChex 4.3.12 - Local Buffer Overflow
  • [local] Max Secure Anti Virus Plus - Insecure File Permissions
  • [dos] Nsauditor - 'Key' Denial of Service (PoC)
  • [webapps] Dokuwiki 2018-04-22b - Username Enumeration
  • [webapps] SmartHouse Webapp 6.5.33 - Cross-Site Request Forgery
  • [local] Visual Studio 2008 - XML External Entity Injection
  • [dos] Nsauditor - 'Name' Denial of Service (PoC)
  • [dos] SpotAuditor 5.3.2 - 'Name' Denial of Service
  • [local] Bash 5.0 Patch 11 - SUID Priv Drop Exploit
  • [webapps] Online Inventory Manager 3.2 - Persistent Cross-Site Scripting
  • [local] TexasSoft CyberPlanet 6.4.131 - 'CCSrvProxy' Unquoted Service Path
  • [dos] SpotAuditor 5.3.2 - 'Key' Denial of Service
  • [webapps] Mersive Solstice 2.8.0 - Remote Code Execution
  • [dos] GHIA CamIP 1.2 for iOS - 'Password' Denial of Service (PoC)
  • [webapps] Wordpress 5.3 - User Disclosure
  • [dos] SpotAuditor 5.3.2 - 'Base64' Denial Of Service (PoC)
  • [dos] Microsoft DirectX SDK 2010 - '.PIXrun' Denial Of Service (PoC)
  • [dos] InduSoft Web Studio 8.1 SP1 - "Atributos" Denial of Service (PoC)
  • [dos] iNetTools for iOS 8.20 - 'Whois' Denial of Service (PoC)
  • [local] VMware WorkStation 12.5.3 - Virtual Machine Escape
  • [local] VMware WorkStation 12.5.5 - Virtual Machine Escape
  • [local] Microsoft Windows AppXsvc Deployment Extension - Privilege Escalation
  • [local] Easy-Hide-IP - 'EasyRedirect' Unquoted Service Path
  • [dos] InTouch Machine Edition 8.1 SP1 - 'Atributos' Denial of Service (PoC)