Publicly disclosed vulnerabilities discovered by or reported to Fluid Attacks

Search by term

Search filters

Discovered by

All

Severity

All

Our pentesters

Linkify 4.3.1 - Prototype Pollution & HTML Attribute Injection (XSS)

8.8

High

CVE-2025-8101

Published date:

Jul 25, 2025

Discovered by

Camilo Vera

Our pentesters

Calibre Web 0.6.24 - Blind Command Injection

5.9

Medium

CVE-2025-7404

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

Calibre Web 0.6.24 - ReDoS

8.7

High

CVE-2025-6998

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

XSS in Laundry allows to perform an Account Takeover

5.1

Medium

CVE-2025-52842

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our pentesters

CSRF in Laundry allows to perform an account takeover

8.5

High

CVE-2025-52841

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our scanner

A Capture Contact Form (and tab) - Insecure deserialization

1.7

Low

CVE-2025-31287

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

Click-to-Call for Twilio - Reflected XSS

4.8

Medium

CVE-2025-31288

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

AIO Cache and Performance - Reflected XSS

4.8

Medium

CVE-2025-31289

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Load more

Search by term

Search filters

Discovered by

All

Severity

All

Our pentesters

Linkify 4.3.1 - Prototype Pollution & HTML Attribute Injection (XSS)

8.8

High

CVE-2025-8101

Published date:

Jul 25, 2025

Discovered by

Camilo Vera

Our pentesters

Calibre Web 0.6.24 - Blind Command Injection

5.9

Medium

CVE-2025-7404

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

Calibre Web 0.6.24 - ReDoS

8.7

High

CVE-2025-6998

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

XSS in Laundry allows to perform an Account Takeover

5.1

Medium

CVE-2025-52842

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our pentesters

CSRF in Laundry allows to perform an account takeover

8.5

High

CVE-2025-52841

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our scanner

A Capture Contact Form (and tab) - Insecure deserialization

1.7

Low

CVE-2025-31287

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

Click-to-Call for Twilio - Reflected XSS

4.8

Medium

CVE-2025-31288

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

AIO Cache and Performance - Reflected XSS

4.8

Medium

CVE-2025-31289

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Load more

Search by term

Search filters

Discovered by

All

Severity

All

Our pentesters

Linkify 4.3.1 - Prototype Pollution & HTML Attribute Injection (XSS)

8.8

High

CVE-2025-8101

Published date:

Jul 25, 2025

Discovered by

Camilo Vera

Our pentesters

Calibre Web 0.6.24 - Blind Command Injection

5.9

Medium

CVE-2025-7404

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

Calibre Web 0.6.24 - ReDoS

8.7

High

CVE-2025-6998

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

XSS in Laundry allows to perform an Account Takeover

5.1

Medium

CVE-2025-52842

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our pentesters

CSRF in Laundry allows to perform an account takeover

8.5

High

CVE-2025-52841

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our scanner

A Capture Contact Form (and tab) - Insecure deserialization

1.7

Low

CVE-2025-31287

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

Click-to-Call for Twilio - Reflected XSS

4.8

Medium

CVE-2025-31288

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

AIO Cache and Performance - Reflected XSS

4.8

Medium

CVE-2025-31289

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Load more

Search by term

Search filters

Discovered by

All

Severity

All

Our pentesters

Linkify 4.3.1 - Prototype Pollution & HTML Attribute Injection (XSS)

8.8

High

CVE-2025-8101

Published date:

Jul 25, 2025

Discovered by

Camilo Vera

Our pentesters

Calibre Web 0.6.24 - Blind Command Injection

5.9

Medium

CVE-2025-7404

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

Calibre Web 0.6.24 - ReDoS

8.7

High

CVE-2025-6998

Published date:

Jul 24, 2025

Discovered by

Johan Giraldo

Our pentesters

XSS in Laundry allows to perform an Account Takeover

5.1

Medium

CVE-2025-52842

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our pentesters

CSRF in Laundry allows to perform an account takeover

8.5

High

CVE-2025-52841

Published date:

Jul 2, 2025

Discovered by

Carlos Bello

Our scanner

A Capture Contact Form (and tab) - Insecure deserialization

1.7

Low

CVE-2025-31287

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

Click-to-Call for Twilio - Reflected XSS

4.8

Medium

CVE-2025-31288

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Our scanner

AIO Cache and Performance - Reflected XSS

4.8

Medium

CVE-2025-31289

Published date:

Mar 14, 2025

Detected by

Fluid Attacks SAST Scanner,

disclosed by

Andres Roldan

Load more

Learn about our policy for disclosing advisories of vulnerabilities in third-party, open-source products.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.