Our Vulnerability Research

Common Vulnerabilities and Exposures

SAP security alert for CVE-2025-24870 indicating a critical threat level for insecure secrets management exposing plaintext credentials and access to banking transactions and enterprise data.

What This Vulnerability Research Portfolio Represents

Discoveries That Matter

Our vulnerability research team reverse engineers your enterprise software to find the 0-days that threaten your infrastructure - before attackers do.

Enterprise Focus

The vulnerabilities below affect systems organizations use: SAP. IBM. Check Point. F5. BMC. Microsoft. Rapid7. Cyberark.

Logos of five technology companies: IBM, Check Point, Microsoft, SAP, and CyberArk on a black background.

Current Research

We identified a wide range of CVEs across various industries - each of the vulnerabilities have been assigned a threat level ranging from critical to low. We pride ourselves in beating others to identify critical CVEs in large infrastructure for orgasations such as IBM and Microsoft.

Sorty by Threat level
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CVE-2025-9190
Threat level
High

TCC bypass via misconfigured Node fuses in Cursor AI code editor allows unauthorized access to protected macOS resources

CVE-2025-8700
Threat level
High

Privilege escalation via get-task-allow entitlement in Invoice Ninja allows attackers to debug and manipulate the application process on macOS

CVE-2025-8672
Threat level
High

TCC bypass via inherited permissions in bundled Python interpreter in GIMP.app allows scripts to access protected resources

CVE-2025-8597
Threat level
High

Privilege escalation via get-task-allow entitlement in MacVim allows attackers to debug and inject code into the application process

CVE-2025-8533
Threat level
High

Incorrect authorization of XPC Service in Fantastical.app allows unauthorized inter-process communication leading to privilege escalation

CVE-2025-5963
Threat level
High

TCC bypass via dylib injection in Postbox email client allows malicious code to access protected macOS resources

CVE-2025-53813
Threat level
High

TCC bypass via misconfigured Electron Node fuses in Nozbe allows malicious apps to access protected resources like camera, microphone, and files

CVE-2025-53811
Threat level
High

TCC bypass via misconfigured Node fuses in Mosh-Pro allows applications to access protected user data without explicit consent

CVE-2025-5255
Threat level
High

TCC bypass via dylib injection in Phoenix Code editor allows unauthorized access to protected user data on macOS

CVE-2025-4951
Threat level
Medium

Stored cross-site scripting in Rapid7 AppSpider Pro allows authenticated attackers to inject persistent malicious scripts

CVE-2025-4412
Threat level
High

TCC bypass via dylib loading in Viscosity VPN client allows malicious code to access protected macOS resources

CVE-2025-42979
Threat level
High

Insecure key and secret management in SAP GUI stores sensitive credentials in recoverable format, allowing local attackers to obtain passwords

CVE-2025-42945
Threat level
Medium

HTML Injection vulnerability in SAP NetWeaver Application Server ABAP allows attackers to inject malicious HTML content into web pages viewed by other users

CVE-2025-42943
Threat level
High

NTLM hash hijacking via UNC paths in SAP GUI allows attackers to capture authentication credentials when users interact with malicious content

CVE-2025-4280
Threat level
High

TCC bypass via inherited permissions in bundled Python interpreter in Poedit allows scripts to access protected resources

We map your systems before testing how they break.

That's why critical findings usually show up outside the original scope - attackers don't respect scope documents.

Security Assessment Services FAQ

Questions enterprise security teams ask before partnering with AFINE for security assessments.

Is AFINE ISO 27001 certified and what compliance frameworks do you support?

Yes, AFINE is ISO 27001 certified. Beyond certification, we maintain operational security excellence built through 10 years of enterprise work. Our security assessment services support DORA, PCI DSS, SOC 2, ISO 27001, TIBER-EU, NESA, and FCA compliance. We've conducted hundreds of assessments for regulated institutions like PKO BP, ING Bank, and BGK.

What certifications and specialized expertise does AFINE team hold?

Every team member holds minimum OSCP or eWPTX certification. Our researchers average 7-10 years offensive security experience with OSCE, OSWE, OSED, OSEP, CRTO, CSSA, CISSP, CISA, and BSCP certifications. We've published CVEs in SAP, Microsoft, CyberArk, Palo Alto, F5, IBM, and other enterprise software.

What makes AFINE different from other penetration testing vendors?

We've published 150+ CVEs in enterprise software and understand how attackers exploit complex systems beyond automated scanning. Our manual testing finds business logic flaws and attack chains others miss. Isabel Group confirmed we "keep finding critical issues where other pentesters have not found them." Our 10-year exclusive focus on banking, critical infrastructure, and healthcare environments means we understand compliance and production system safety.