Publicly disclosed vulnerabilities discovered by or reported to Fluid Attacks

Search by term

Search filters

Discovered by

All

Severity

All

Our scanner

Frappe Framework v16.10.0 - Stored DOM XSS in Multiple Field Formatters

4.6

Medium

CVE-2026-3837

Published date:

Apr 21, 2026

Detected by

Fluid Attacks AI SAST Scanner,

disclosed by

Oscar Uribe

Our scanner

Frappe Framework 16.10.0 - Stored DOM XSS in Tag Pill Renderer

4.6

Medium

CVE-2026-3673

Published date:

Apr 21, 2026

Detected by

Fluid Attacks AI SAST Scanner,

disclosed by

Oscar Uribe

Our pentesters

DOMPurify mXSS via Re-Contextualization

5.3

Medium

CVE-2026-0540

Published date:

Mar 24, 2026

Discovered by

Camilo Vera, Cristian Vargas and Scott Moore

External pentesters

Actual Sync Server 26.2.1 - Authenticated Path Traversal

5.3

Medium

CVE-2026-3089

Published date:

Mar 9, 2026

Discovered by

Juan Patarroyo

Our pentesters

iBoysoft NTFS for Mac 8.0.0 - Local Privilege Escalation

8.5

High

CVE-2026-2637

Published date:

Mar 3, 2026

Discovered by

Oscar Uribe

Our pentesters

NestJS 11.1.13 - Lack of data validation allowing authentication/authorization bypass

8.2

High

CVE-2026-2293

Published date:

Feb 27, 2026

Discovered by

Cristian Vargas

Our pentesters

Fastify middie 9.1.0 - Improper path normalization

8.2

High

CVE-2026-2880

Published date:

Feb 27, 2026

Discovered by

Cristian Vargas

Our pentesters

BuhoCleaner 1.15.2 - Local Privilege Escalation via PID reuse attack

7.3

High

CVE-2026-0924

Published date:

Feb 2, 2026

Discovered by

Oscar Uribe

Load more

Search by term

Search filters

Discovered by

All

Severity

All

Our scanner

Frappe Framework v16.10.0 - Stored DOM XSS in Multiple Field Formatters

4.6

Medium

CVE-2026-3837

Published date:

Apr 21, 2026

Detected by

Fluid Attacks AI SAST Scanner,

disclosed by

Oscar Uribe

Our scanner

Frappe Framework 16.10.0 - Stored DOM XSS in Tag Pill Renderer

4.6

Medium

CVE-2026-3673

Published date:

Apr 21, 2026

Detected by

Fluid Attacks AI SAST Scanner,

disclosed by

Oscar Uribe

Our pentesters

DOMPurify mXSS via Re-Contextualization

5.3

Medium

CVE-2026-0540

Published date:

Mar 24, 2026

Discovered by

Camilo Vera, Cristian Vargas and Scott Moore

External pentesters

Actual Sync Server 26.2.1 - Authenticated Path Traversal

5.3

Medium

CVE-2026-3089

Published date:

Mar 9, 2026

Discovered by

Juan Patarroyo

Our pentesters

iBoysoft NTFS for Mac 8.0.0 - Local Privilege Escalation

8.5

High

CVE-2026-2637

Published date:

Mar 3, 2026

Discovered by

Oscar Uribe

Our pentesters

NestJS 11.1.13 - Lack of data validation allowing authentication/authorization bypass

8.2

High

CVE-2026-2293

Published date:

Feb 27, 2026

Discovered by

Cristian Vargas

Our pentesters

Fastify middie 9.1.0 - Improper path normalization

8.2

High

CVE-2026-2880

Published date:

Feb 27, 2026

Discovered by

Cristian Vargas

Our pentesters

BuhoCleaner 1.15.2 - Local Privilege Escalation via PID reuse attack

7.3

High

CVE-2026-0924

Published date:

Feb 2, 2026

Discovered by

Oscar Uribe

Load more

Search by term

Search filters

Discovered by

All

Severity

All

Our scanner

Frappe Framework v16.10.0 - Stored DOM XSS in Multiple Field Formatters

4.6

Medium

CVE-2026-3837

Published date:

Apr 21, 2026

Discovered by

Oscar Uribe

Detected by

Fluid Attacks AI SAST Scanner,

disclosed by

Oscar Uribe

Our scanner

Frappe Framework 16.10.0 - Stored DOM XSS in Tag Pill Renderer

4.6

Medium

CVE-2026-3673

Published date:

Apr 21, 2026

Discovered by

Oscar Uribe

Detected by

Fluid Attacks AI SAST Scanner,

disclosed by

Oscar Uribe

Our pentesters

DOMPurify mXSS via Re-Contextualization

5.3

Medium

CVE-2026-0540

Published date:

Mar 24, 2026

Discovered by

Camilo Vera, Cristian Vargas and Scott Moore

External pentesters

Actual Sync Server 26.2.1 - Authenticated Path Traversal

5.3

Medium

CVE-2026-3089

Published date:

Mar 9, 2026

Discovered by

Juan Patarroyo

Our pentesters

iBoysoft NTFS for Mac 8.0.0 - Local Privilege Escalation

8.5

High

CVE-2026-2637

Published date:

Mar 3, 2026

Discovered by

Oscar Uribe

Our pentesters

NestJS 11.1.13 - Lack of data validation allowing authentication/authorization bypass

8.2

High

CVE-2026-2293

Published date:

Feb 27, 2026

Discovered by

Cristian Vargas

Our pentesters

Fastify middie 9.1.0 - Improper path normalization

8.2

High

CVE-2026-2880

Published date:

Feb 27, 2026

Discovered by

Cristian Vargas

Our pentesters

BuhoCleaner 1.15.2 - Local Privilege Escalation via PID reuse attack

7.3

High

CVE-2026-0924

Published date:

Feb 2, 2026

Discovered by

Oscar Uribe

Load more

Learn about our policy for disclosing advisories of vulnerabilities in third-party, open-source products.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Get an AI summary of Fluid Attacks

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

Get an AI summary of Fluid Attacks

© 2026 Fluid Attacks. We hack your software.