f

Baldur
Security

Research-driven security consultancy that helps you discover and remediate vulnerabilities before attackers abuse them.

LET US HELP YOU WITH PENETRATION TESTING TODAY →

What Differentiates Us

We can find vulnerabilities in just about anything. Browsers? Phones? Web Applications? Hardware? - Don’t take our word for it. Our track record of responsible disclosures includes vulnerabilities in some of the world’s most widely used software - even browsers used by billions of people.

CVE-2025-59922
HIGH
Fortinet Forticlient
Remote Code Execution
CVE-2025-11208
MEDIUM
Google Chrome
Spoofing Vulnerability in Media Component
CVE-2025-32017
HIGH
Umbraco CMS
Authenticated Remote Code Execution
CVE-2024-31963
CRITICAL
Mitel IP Phone
Unauthenticated Remote Code Execution
CVE-2024-31964
HIGH
Mitel IP Phone
Authentication Bypass
CVE-2023-32782
HIGH
PRTG Network Monitor
Remote Code Execution as SYSTEM in Dicom Query Sensor
CVE-2023-32781
HIGH
PRTG Network Monitor
Remote Code Execution as SYSTEM in HL7 Sensor
CVE-2023-31452
HIGH
PRTG Network Monitor
CSRF Credential Leakage
CVE-2023-31451
MEDIUM
PRTG Network Monitor
Sensitive File Disclosure via Regex
CVE-2023-31450
MEDIUM
PRTG Network Monitor
Path Traversal in SQL Sensor
CVE-2023-31449
MEDIUM
PRTG Network Monitor
Path Traversal in WMI Sensor
CVE-2023-31448
MEDIUM
PRTG Network Monitor
Path Traversal Vulnerability
CVE-2023-24037
HIGH
Nagios Monitoring System
Authentication Bypass
CVE-2023-24036
HIGH
Nagios Monitoring System
Open Redirect Vulnerability
CVE-2023-24035
HIGH
Nagios Monitoring System
Timing-Based Authentication Bypass
CVE-2022-45871
HIGH
WithSecure
Unauthenticated Memory Corruption in fsicapd
CVE-2022-38165
HIGH
F-Secure Policy Manager
Unauthenticated Arbitrary File Write
CVE-2022-38162
MEDIUM
F-Secure Policy Manager
Multiple Cross-Site Scripting
CVE-2022-28885
MEDIUM
F-Secure Policy Manager
Memory Corruption DoS
CVE-2020-12480
MEDIUM
Play Framework
Global CSRF Bypass
CVE-2019-XXXXX
CRITICAL
F-Secure Internet Gatekeeper
Heap Buffer Overflow to RCE
CVE-2018-9193
HIGH
Fortinet FortiClient
Local Privilege Escalation to SYSTEM
CVE-2018-9191
HIGH
Fortinet FortiClient
Local Privilege Escalation to SYSTEM

Our certifications

While real-world expertise is our foundation, we back it up with industry-leading certifications that validate our capabilities

OFFENSIVE SECURITY
OSCE
Offensive Security Certified Expert represents the pinnacle of penetration testing expertise. This advanced certification validates mastery of exploit development, advanced web application attacks, and sophisticated penetration testing methodologies that go beyond standard assessments.
PENETRATION TESTING
OSCP
Offensive Security Certified Professional is the gold standard in ethical hacking certifications. This hands-on, practical exam validates real-world penetration testing skills and is recognized globally as proof of technical expertise in identifying and exploiting security vulnerabilities.

Our Services

We offer a wide range of services within consulting. Even if you have a requirement that might fall out of this category, we might be able to help you either way.

Web App Assessment

In depth assessments of your web applications. We're seasoned in most tech stacks and won't hesitate on doing a code review.

Assume Breach

Test the scenario of a breached employee and see how far an skilled adversary can go in your network, and help mitigate the threats afterwards.

Cloud Security

Whether you have a AWS, Google or Azure cloud we can assist you in the best practices around securing these technologies.

Source Code Audit

Our preferred testing methodology for testing applications is dynamic testing combined with source code audits. This maximises the amount of vulnerabilites located.

DevSecOps

We can aid the process of ensuring your development security operations is up to the newest standards and aid with any automation that the platform might require.

Binary Exploitation

Testing binary applications using state of the art fuzzers, and manual instrumentation to maximise the coverage. Furthermore we can help you assess the exploitability of a given issue.