Vulnerability

Entries with this tag address the finding, existence or (sometimes controlled) exploitation of specific security flaws or misconfigurations in systems.

Photo by sebastiaan stam on Unsplash

Carlos Bello


Injecting JS into one site is harmful, into all, lethal

In this blog post, we present in detail a vulnerability we discovered in Rushbet v2022.23.1-b490616d, along with the steps to follow to replicate the exploit.

Photo by Nahel Abdul Hadi on Unsplash

Carlos Bello


So it's the app itself that delivers the cookie to me?

In this blog post, I present in detail a zero-day vulnerability I discovered in KAYAK v161.1, along with the steps to follow to replicate the exploit.

Photo by Axel Ruffini on Unsplash

Andres Roldan


A Black Hat talk follow up

We will take a brief understanding at DirectX, a new attack surface on Hyper-V

Photo by Lucrezia Carnelos on Unsplash

Felipe Ruiz


Chances are you're vulnerable with Microsoft Office

In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.

Photo by Lenny Kuhne on Unsplash

Andres Roldan


Cross-process memory patching with Python

We will take AMSI bypass to another level by using cross-process memory injection.

Photo by Alexander Aguero on Unsplash

Felipe Ruiz


Conti gang relentlessly lashes their vulnerable systems

It's been almost two weeks since the beginning of the Conti gang's new wave of cyberattacks against Costa Rican organizations. Find out here what has happened.

Photo by Chris Briggs on Unsplash

Felipe Ruiz


Three strikes already for this web browser in 2022

In this blog post, you can learn about three zero-day vulnerabilities of at least high severity in Google Chrome that have been exploited this year.

Photo by Bank Phrom on Unsplash

Jason Chavarría


What you should know about our security advisories

In this blog post we explain what our Advisories are and, in the process, share some information on how the Fluid Attacks Research Team works.

Photo by Bruno Kelzer on Unsplash

Felipe Ruiz


A very brief introduction

Our blog needed a basic post about ethical hacking. It can be helpful as an introduction for those who don't know and want to learn about it.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.