Publicly disclosed vulnerabilities discovered by or reported to Fluid Attacks
Our pentesters
DOMPurify mXSS via Re-Contextualization
5.3
Medium
CVE-2026-0540
Published date:
Mar 24, 2026
Discovered by
Camilo Vera, Cristian Vargas and Scott Moore
External pentesters
Actual Sync Server 26.2.1 - Authenticated Path Traversal
5.3
Medium
CVE-2026-3089
Published date:
Mar 9, 2026
Discovered by
Juan Patarroyo
Our pentesters
iBoysoft NTFS for Mac 8.0.0 - Local Privilege Escalation
8.5
High
CVE-2026-2637
Published date:
Mar 3, 2026
Discovered by
Oscar Uribe
Our pentesters
NestJS 11.1.13 - Lack of data validation allowing authentication/authorization bypass
8.2
High
CVE-2026-2293
Published date:
Feb 27, 2026
Discovered by
Cristian Vargas
Our pentesters
Fastify middie 9.1.0 - Improper path normalization
8.2
High
CVE-2026-2880
Published date:
Feb 27, 2026
Discovered by
Cristian Vargas
Our pentesters
BuhoCleaner 1.15.2 - Local Privilege Escalation via PID reuse attack
7.3
High
CVE-2026-0924
Published date:
Feb 2, 2026
Discovered by
Oscar Uribe
External pentesters
Askbot 0.12.2 - Insecure Direct Object Reference (IDOR)
5.3
Medium
CVE-2026-1213
Published date:
Jan 27, 2026
Discovered by
Daniel Esteban Celis
Our pentesters
Svelte 5.46.0 - Hydratable Key Script-Breakout XSS (SSR)
5.3
Medium
CVE-2025-15265
Published date:
Jan 15, 2026
Discovered by
Camilo Vera
Load more
Our pentesters
DOMPurify mXSS via Re-Contextualization
5.3
Medium
CVE-2026-0540
Published date:
Mar 24, 2026
Discovered by
Camilo Vera, Cristian Vargas and Scott Moore
External pentesters
Actual Sync Server 26.2.1 - Authenticated Path Traversal
5.3
Medium
CVE-2026-3089
Published date:
Mar 9, 2026
Discovered by
Juan Patarroyo
Our pentesters
iBoysoft NTFS for Mac 8.0.0 - Local Privilege Escalation
8.5
High
CVE-2026-2637
Published date:
Mar 3, 2026
Discovered by
Oscar Uribe
Our pentesters
NestJS 11.1.13 - Lack of data validation allowing authentication/authorization bypass
8.2
High
CVE-2026-2293
Published date:
Feb 27, 2026
Discovered by
Cristian Vargas
Our pentesters
Fastify middie 9.1.0 - Improper path normalization
8.2
High
CVE-2026-2880
Published date:
Feb 27, 2026
Discovered by
Cristian Vargas
Our pentesters
BuhoCleaner 1.15.2 - Local Privilege Escalation via PID reuse attack
7.3
High
CVE-2026-0924
Published date:
Feb 2, 2026
Discovered by
Oscar Uribe
External pentesters
Askbot 0.12.2 - Insecure Direct Object Reference (IDOR)
5.3
Medium
CVE-2026-1213
Published date:
Jan 27, 2026
Discovered by
Daniel Esteban Celis
Our pentesters
Svelte 5.46.0 - Hydratable Key Script-Breakout XSS (SSR)
5.3
Medium
CVE-2025-15265
Published date:
Jan 15, 2026
Discovered by
Camilo Vera
Load more
Our pentesters
DOMPurify mXSS via Re-Contextualization
5.3
Medium
CVE-2026-0540
Published date:
Mar 24, 2026
Discovered by
Camilo Vera, Cristian Vargas and Scott Moore
External pentesters
Actual Sync Server 26.2.1 - Authenticated Path Traversal
5.3
Medium
CVE-2026-3089
Published date:
Mar 9, 2026
Discovered by
Juan Patarroyo
Our pentesters
iBoysoft NTFS for Mac 8.0.0 - Local Privilege Escalation
8.5
High
CVE-2026-2637
Published date:
Mar 3, 2026
Discovered by
Oscar Uribe
Our pentesters
NestJS 11.1.13 - Lack of data validation allowing authentication/authorization bypass
8.2
High
CVE-2026-2293
Published date:
Feb 27, 2026
Discovered by
Cristian Vargas
Our pentesters
Fastify middie 9.1.0 - Improper path normalization
8.2
High
CVE-2026-2880
Published date:
Feb 27, 2026
Discovered by
Cristian Vargas
Our pentesters
BuhoCleaner 1.15.2 - Local Privilege Escalation via PID reuse attack
7.3
High
CVE-2026-0924
Published date:
Feb 2, 2026
Discovered by
Oscar Uribe
External pentesters
Askbot 0.12.2 - Insecure Direct Object Reference (IDOR)
5.3
Medium
CVE-2026-1213
Published date:
Jan 27, 2026
Discovered by
Daniel Esteban Celis
Our pentesters
Svelte 5.46.0 - Hydratable Key Script-Breakout XSS (SSR)
5.3
Medium
CVE-2025-15265
Published date:
Jan 15, 2026
Discovered by
Camilo Vera
Load more


Learn about our policy for disclosing advisories of vulnerabilities in third-party, open-source products.


Start your 21-day free trial
Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.


Start your 21-day free trial
Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.


Start your 21-day free trial
Discover the benefits of our Continuous Hacking solution, which organizations of all sizes are already enjoying.


Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2026 Fluid Attacks. We hack your software.





