Examine the evidence of exploitability
Attention users: Our platform is getting a fresh new look! Soon, you'll enjoy an updated interface designed to enhance your experience. Stay tuned for the unveiling, and get ready to explore the improved Fluid Attacks platform!![](https://static.zohocdn.com/zoho-desk-editor/static/images/caution.png)
Due to the above, some of the content of this article may undergo modifications.
The
Evidence section provides supporting proof of the existence and exploitation of a particular vulnerability. To go there, enter your group, click on a type of vulnerability and select
Evidence from the tabs. In this section, Fluid Attacks' security analysts present evidence in pictures (with
.png and
.jpg extensions) and videos (with
WebM extension), helping you identify this
type of vulnerability in your system when reported for the first time. The evidence presented may change whenever a
reattack is performed to check the presence of this type of vulnerability.
![Evidence](https://res.cloudinary.com/fluid-attacks/image/upload/v1674061382/docs/web/vulnerabilities/management/evidence_tab.png)
The number of evidence items is limited to seven. These items can be updated according to the analyst's or your request in the Consulting section.
Free trial