What This Vulnerability Research Portfolio Represents
Discoveries That Matter
Our vulnerability research team reverse engineers your enterprise software to find the 0-days that threaten your infrastructure - before attackers do.


Enterprise Focus
The vulnerabilities below affect systems organizations use: SAP. IBM. Check Point. F5. BMC. Microsoft. Rapid7. Cyberark.


Current Research
We identified a wide range of CVEs across various industries - each of the vulnerabilities have been assigned a threat level ranging from critical to low. We pride ourselves in beating others to identify critical CVEs in large infrastructure for orgasations such as IBM and Microsoft.

Stored cross-site scripting in comment functionality in Amasty Blog Pro for Magento 2




.webp)
Cross-site scripting in IBM InfoSphere Information Server allows script injection via crafted input





Server-side remote code execution in Foreman allows authenticated attackers to execute arbitrary commands on the server





Open redirect in OurUmbraco allows attackers to redirect users to malicious external websites





Authenticated stored XSS in Autoptimize WordPress plugin allows administrators to inject persistent scripts





Race condition leading to remote code execution in Autoptimize WordPress plugin allows arbitrary file writes





Arbitrary file upload in Autoptimize WordPress plugin allows uploading and executing malicious PHP files





Security vulnerability in Dell EMC NetWorker allows privilege escalation or unauthorized access





Security vulnerability in Dell EMC NetWorker allows privilege escalation or unauthorized access (second issue)





Windows Print Spooler elevation of privilege (PrintNightmare) - allows remote code execution and local privilege escalation





XML External Entity (XXE) injection in JOC Cockpit/Jobscheduler allows reading server files and SSRF





Denial of service in JOC Cockpit/Jobscheduler allows attackers to crash the job scheduling service





Multiple stored cross-site scripting vulnerabilities in JOC Cockpit/Jobscheduler allow persistent script injection





SQL injection in F5 BIG-IP AFM (Advanced Firewall Manager) allows database attacks on security appliance





TMOS Shell privilege escalation in F5 BIG-IP allows users to gain elevated privileges




We map your systems before testing how they break.
That's why critical findings usually show up outside the original scope - attackers don't respect scope documents.
Security Assessment Services FAQ
Questions enterprise security teams ask before partnering with AFINE for security assessments.



