![Photo by Fotis Fotopoulos on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1700587805/blog/lfr-via-blind-ssrf-book-stack/cover_bookstack.webp)
Carlos Bello
Beware of insecure-by-default libraries!
Here we present in detail a vulnerability we discovered in BookStack v23.10.2, along with the steps to follow to replicate the exploit.
![Photo by Yeshi Kangrang on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1690245566/blog/rce-in-papercut-mf-ng-via-csrf/cover_rce_in_papercut_mf_ng_via_csrf.webp)
Carlos Bello
What is invisible to some hackers is visible to others
Here we present in detail a vulnerability we discovered in PaperCut MF/NG v22.0.10, along with the steps to follow to replicate the exploit.
![Photo by sebastiaan stam on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1673554228/blog/uxss-to-account-takeover-rushbet/cover_rushbet.webp)
Carlos Bello
Injecting JS into one site is harmful, into all, lethal
In this blog post, we present in detail a vulnerability we discovered in Rushbet v2022.23.1-b490616d, along with the steps to follow to replicate the exploit.
![Photo by Nahel Abdul Hadi on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1669164815/blog/account-takeover-kayak/cover_account_takeover_kayak.webp)
Carlos Bello
So it's the app itself that delivers the cookie to me?
In this blog post, I present in detail a zero-day vulnerability I discovered in KAYAK v161.1, along with the steps to follow to replicate the exploit.