Our consultants spend a lot of their time looking for vulnerabilities in commercial software, open source software, hardware and firmware. We provide this service free of charge to the companies involved, and assist them with fixing the vulnerabilities found if they so require. All vulnerability disclosures are handled in a responsible way in above and beyond industry standards, giving ample time to the companies involved to fix these flaws.

In addition, our consultants regularly participate in world renowned hacking competitions such as Pwn2Own, where they have uncovered dozens of vulnerabilities, won hundreds of thousands of dollars in prizes and outclassed teams from multinational corporations competing in the same events.

Since the founding of Agile Information Security, our consultants have made public over 200 vulnerabilities in well known and widely used software such as:

  • Several enterprise and consumer network devices from Cisco, Netgear, Dlink, Asus and others
  • Various SCADA / Industrial Control Software products
  • Cisco Enterprise Management software
  • IBM Enterprise Management software
  • HPE / Micro Focus Enterprise Management software
  • Adobe Acrobat Reader
  • SysAid Help Desk
  • Novell ZenWorks Configuration Management
  • Kaseya Virtual System Administrator
  • ManageEngine ServiceDesk, OpManager, Desktop Manager and other products
  • International Components for Unicode (ICU) library (used in Android, Google Chrome and hundreds of other products)
  • BMC Track-It! Service Desk
  • VLC Media Player
  • Poppler PDF library (widely used in Linux desktops)
  • Apple QuickTime Player
  • X.Org display server
  • Several Content Management Systems (CMS)

And many others. The full list of vulnerabilities found by our consultants can be consulted from GitHub.

All these vulnerabilities were found using a combination of hacking techniques on which we base our services on.

Contact us today to find out how we can help you.