What This Vulnerability Research Portfolio Represents
Discoveries That Matter
Our vulnerability research team reverse engineers your enterprise software to find the 0-days that threaten your infrastructure - before attackers do.


Enterprise Focus
The vulnerabilities below affect systems organizations use: SAP. IBM. Check Point. F5. BMC. Microsoft. Rapid7. Cyberark.


Current Research
We identified a wide range of CVEs across various industries - each of the vulnerabilities have been assigned a threat level ranging from critical to low. We pride ourselves in beating others to identify critical CVEs in large infrastructure for orgasations such as IBM and Microsoft.

Stored cross-site scripting in Kofax Capture software allows persistent malicious script injection





Reflected cross-site scripting in SAS 9.4 allows attackers to execute scripts via crafted URLs




Admin+ stored XSS in Easy Forms for Mailchimp WordPress plugin allows administrators to inject persistent scripts




.webp)
Remote code execution via insecure deserialization in IBM i Access Client Solutions allows attackers to execute arbitrary code




.webp)
Decryption key disclosure in IBM i Access Client Solutions allows local attackers to obtain encryption keys via improper authority checks




.webp)
Weak password encryption in IBM i Access Client Solutions allows attackers to decrypt stored passwords and access connected systems




.png)
Cross-site scripting in Spipu HTML2PDF example files allows script execution via crafted input





Denial of service in F5 BIG-IQ iControl SOAP daemon - attackers with guest privileges can crash the service





Reflected cross-site scripting in F5 BIG-IP Configuration utility allows script execution via crafted requests





Path traversal in elFinder PHP LocalVolumeDriver connector allows reading/writing files outside webroot





Windows Kernel elevation of privilege allows local attackers to escalate from user to SYSTEM level access (CVSS 7.8)




.webp)
Stored cross-site scripting in IBM Cognos Analytics via malicious SVG files in Custom Visualizations





Unauthenticated path traversal in Hummingbird WordPress plugin allows reading arbitrary files from the server





SQL injection in Sparx Systems Enterprise Architect allows attackers to execute arbitrary SQL queries




.webp)
DLL hijacking in IBM i Access Client Solutions on Windows allows local code execution via malicious DLLs




We map your systems before testing how they break.
That's why critical findings usually show up outside the original scope - attackers don't respect scope documents.
Security Assessment Services FAQ
Questions enterprise security teams ask before partnering with AFINE for security assessments.



