Our Vulnerability Research

Common Vulnerabilities and Exposures

SAP security alert for CVE-2025-24870 indicating a critical threat level for insecure secrets management exposing plaintext credentials and access to banking transactions and enterprise data.

What This Vulnerability Research Portfolio Represents

Discoveries That Matter

Our vulnerability research team reverse engineers your enterprise software to find the 0-days that threaten your infrastructure - before attackers do.

Enterprise Focus

The vulnerabilities below affect systems organizations use: SAP. IBM. Check Point. F5. BMC. Microsoft. Rapid7. Cyberark.

Logos of five technology companies: IBM, Check Point, Microsoft, SAP, and CyberArk on a black background.

Current Research

We identified a wide range of CVEs across various industries - each of the vulnerabilities have been assigned a threat level ranging from critical to low. We pride ourselves in beating others to identify critical CVEs in large infrastructure for orgasations such as IBM and Microsoft.

Sorty by Threat level
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
CVE-2024-52887
Threat level
Medium

Cross-site scripting in Check Point Mobile Access portal SNX bookmarks allows attackers to inject malicious scripts via bookmark parameters

CVE-2024-52885
Threat level
Medium

Directory traversal in Check Point Mobile Access File Share allows authenticated attackers to access files outside intended directories

CVE-2024-50312
Threat level
Medium

Information disclosure via GraphQL introspection in OpenShift exposes API schema and internal structure to attackers

CVE-2024-50311
Threat level
Medium

Denial of service vulnerability in OpenShift container platform allows attackers to disrupt cluster operations

CVE-2024-49709
Threat level
Medium

Session fixation in SoftCOM iKSORIS Internet Starter Module allows attackers to hijack user sessions

CVE-2024-49708
Threat level
Medium

Stored cross-site scripting in SoftCOM iKSORIS Internet Starter Module allows persistent malicious script storage

CVE-2024-49707
Threat level
Medium

Reflected cross-site scripting in SoftCOM iKSORIS Internet Starter Module via additional vulnerable parameter

CVE-2024-49706
Threat level
Medium

Open redirect in SoftCOM iKSORIS Internet Starter Module allows attackers to redirect users to malicious websites

CVE-2024-49705
Threat level
Low

Client-side denial of service in SoftCOM iKSORIS Internet Starter Module causes browser to become unresponsive

CVE-2024-41955
Threat level
Medium

Open redirect in MobSF login allows attackers to redirect authenticated users to malicious websites

CVE-2024-3461
Threat level
Medium

PIN brute force vulnerability in KioWare for Windows due to missing rate limiting on PIN entry

CVE-2024-3460
Threat level
High

Security control bypass in KioWare for Windows allows circumvention of kiosk restrictions

CVE-2024-3459
Threat level
High

Kiosk environment escape in KioWare for Windows allows users to break out of restricted kiosk mode

CVE-2024-33510
Threat level
Medium

Text injection vulnerability in Fortinet SSL VPN web UI allows attackers to inject arbitrary text content into the login page

CVE-2024-3050
Threat level
Medium

IP spoofing vulnerability in Site Reviews WordPress plugin allows attackers to bypass IP-based restrictions

We map your systems before testing how they break.

That's why critical findings usually show up outside the original scope - attackers don't respect scope documents.

Security Assessment Services FAQ

Questions enterprise security teams ask before partnering with AFINE for security assessments.

Is AFINE ISO 27001 certified and what compliance frameworks do you support?

Yes, AFINE is ISO 27001 certified. Beyond certification, we maintain operational security excellence built through 10 years of enterprise work. Our security assessment services support DORA, PCI DSS, SOC 2, ISO 27001, TIBER-EU, NESA, and FCA compliance. We've conducted hundreds of assessments for regulated institutions like PKO BP, ING Bank, and BGK.

What certifications and specialized expertise does AFINE team hold?

Every team member holds minimum OSCP or eWPTX certification. Our researchers average 7-10 years offensive security experience with OSCE, OSWE, OSED, OSEP, CRTO, CSSA, CISSP, CISA, and BSCP certifications. We've published CVEs in SAP, Microsoft, CyberArk, Palo Alto, F5, IBM, and other enterprise software.

What makes AFINE different from other penetration testing vendors?

We've published 150+ CVEs in enterprise software and understand how attackers exploit complex systems beyond automated scanning. Our manual testing finds business logic flaws and attack chains others miss. Isabel Group confirmed we "keep finding critical issues where other pentesters have not found them." Our 10-year exclusive focus on banking, critical infrastructure, and healthcare environments means we understand compliance and production system safety.