FixVibe

// прожектор уязвимостей

Каждая проверка FixVibe,
разобранная по полочкам.

69+ классов уязвимостей в комплекте FixVibe. Каждая запись запускает до 35 под-проверок за скан и разбирает, как работает баг, что получает атакующий, как мы его проверяем и что нужно для защиты.

01 / 07

HTTP и поверхность

02 / 07

Секреты

03 / 07

Backend-as-a-Service

04 / 07

DNS

05 / 07

Discovery

высокий· CWE-1395

CVE Cross-Reference

Detected version + public CVE database = a list of attacks already documented.

Читать прожектор

высокий· CWE-489

Debug & Admin Endpoints

/debug, /admin, /server-status — paths that should never be reachable from the internet.

Читать прожектор

высокий· CWE-538

Exposed Files & Backup Directories

.env, .git, .DS_Store, backup.sql — files that should never be public, accidentally are.

Читать прожектор

высокий· CWE-20

SPIP Template RCE Version Exposure

Public SPIP version banners can reveal an RCE-class patch gap.

Читать прожектор

средний· CWE-693

Cloudflare Origin & Proxy Posture

If your origin IP is discoverable, Cloudflare's WAF is bypassable.

Читать прожектор

средний· CWE-200

GraphQL Introspection Exposed

Introspection in production hands the attacker your full type system.

Читать прожектор

средний· CWE-693

Threat-Intel Cross-Reference

Spamhaus DBL, URLhaus — your domain's reputation, externally seen.

Читать прожектор

низкий· CWE-200

Exposed API Documentation

/swagger.json, /openapi.json, /docs — public API maps for both you and the attacker.

Читать прожектор

низкий· CWE-200

Netlify-Specific Exposure

Netlify deploy preview URLs, x-nf-* headers, _redirects mistakes.

Читать прожектор

низкий· CWE-281

Privacy & Cookie Compliance Markers

GDPR-required pages — present and linked, or you're at risk of a complaint.

Читать прожектор

низкий· CWE-200

Technology Fingerprinting

Knowing your stack is half the recon — outdated frameworks turn that into the other half.

Читать прожектор

низкий· CWE-200

Vercel-Specific Exposure

_next/static, x-vercel-* headers, preview URLs — Vercel-isms that leak more than they should.

Читать прожектор

06 / 07

Активные пробы

критический· CWE-639

Cross-Tenant Data Leaks

Multi-tenant SaaS without tenant ID enforcement leaks customer data across orgs.

Читать прожектор

критический· CWE-345

JWT alg=none Acceptance

A decoded token is not an authenticated identity.

Читать прожектор

критический· CWE-78

OS Command Injection

When user input becomes part of a shell command, the shell runs whatever the attacker writes.

Читать прожектор

критический· CWE-94

Server-Side Template Injection (SSTI)

When a template engine treats user input as a template, the server treats user input as code.

Читать прожектор

критический· CWE-89

SQL Injection

When user input becomes part of a query, the database stops being yours.

Читать прожектор

высокий· CWE-287

Auth Flow Defects

Login, signup, and password reset are where most account takeovers actually happen.

Читать прожектор

высокий· CWE-918

Blind SSRF (Out-of-Band)

If the server fetches user-supplied URLs, the user can make it fetch internal services.

Читать прожектор

высокий· CWE-89

CKAN DataStore SQL Authorization Bypass

Public DataStore SQL access can turn open data APIs into private data exposure.

Читать прожектор

высокий· CWE-942

CORS Misconfiguration

Permissive Access-Control-Allow-Origin plus credentials means your API is everyone's API.

Читать прожектор

высокий· CWE-79

DOM-based XSS via URL Fragment

Modern SPAs read location.hash and write it into the DOM — attacker payloads ride along.

Читать прожектор

высокий· CWE-434

File Upload Validation

User-uploaded files are arbitrary bytes — accepting them as 'images' without checking is asking for RCE.

Читать прожектор

высокий· CWE-321

FUXA Hardcoded JWT Fallback Secret

Default token-signing secrets can turn an HMI login into a weak boundary.

Читать прожектор

высокий· CWE-770

GraphQL Depth Bombing & Batch Bypass

GraphQL's flexibility is also its vulnerability — depth bombs, alias batching, and field-suggestion leaks.

Читать прожектор

высокий· CWE-444

HTTP Request Smuggling

Front-end proxy and back-end disagree on where one request ends — attacker rides the seam.

Читать прожектор

высокий· CWE-639

IDOR / BOLA

If your API trusts the client to send the correct ID, the client can send any ID.

Читать прожектор

высокий· CWE-77

LLM Prompt Injection

If your AI feature trusts user input as instruction, the user can rewrite the system prompt.

Читать прожектор

высокий· CWE-943

NoSQL Operator Injection

MongoDB-style operators in user-controlled JSON turn your query into a wildcard.

Читать прожектор

высокий· CWE-79

Reflected Cross-Site Scripting (XSS)

The silent hijack: when a single unsanitized parameter executes attacker code in your users' browsers.

Читать прожектор

высокий· CWE-611

XML External Entity (XXE)

If your XML parser resolves external entities, your server reads files for the attacker.

Читать прожектор

высокий· CWE-200

ZoneMinder Directory Listing Exposure

A camera management UI should not publish its web root index.

Читать прожектор

средний· CWE-203

Account Enumeration

If your login responds differently when the email exists vs doesn't, attackers can build a customer list.

Читать прожектор

средний

Confirming Next.js middleware bypass exposure

Confirming Next.js middleware bypass exposure

Читать прожектор

средний· CWE-113

CRLF / Response Splitting

If user input lands in a response header, line breaks let the attacker write their own headers.

Читать прожектор

средний· CWE-352

CSRF Protection

If your state-changing endpoints don't require a CSRF token, third-party sites can act as your users.

Читать прожектор

средний· CWE-307

Missing Rate Limiting

Without rate limits on auth endpoints, the attacker can credential-stuff at line speed.

Читать прожектор

средний· CWE-693

Next.js Header Configuration Drift

Headers set on `/` do not always protect nested routes.

Читать прожектор

средний· CWE-601

Open Redirect

Your /redirect?url=… that doesn't validate the destination is a phishing kit.

Читать прожектор

07 / 07

Исходный код

критический· CWE-89

Ghost Content API SQL Injection Advisory

A vulnerable Ghost dependency can put public content APIs on the database boundary.

Читать прожектор

критический· CWE-78

LibreNMS Command Injection Advisory

A vulnerable monitoring stack can become an execution path inside the network.

Читать прожектор

критический· CWE-89

LiteLLM SQL Injection Advisory

A vulnerable LiteLLM Proxy version can turn API-key verification into database exposure.

Читать прожектор

высокий· CWE-798

Committed AI-Generated Secrets

AI snippets should not ship provider keys into git.

Читать прожектор

высокий· CWE-77

electerm Install-Script Command Injection Advisory

A vulnerable terminal-client dependency can put build or developer hosts at install-time risk.

Читать прожектор

высокий· CWE-611

OpenCms XXE Information-Disclosure Advisory

A vulnerable OpenCms dependency can put XML-processing routes on a file-read boundary.

Читать прожектор

высокий· CWE-754

PDF.js JavaScript Execution Advisory

A vulnerable PDF viewer can turn a malicious document into script execution.

Читать прожектор

высокий· CWE-94

Risky Source-Code Patterns

eval(), dangerouslySetInnerHTML, hard-coded secrets — the patterns SAST has been catching for 25 years.

Читать прожектор

высокий· CWE-284

Supabase RLS in Migrations

A public table without RLS is a future data leak.

Читать прожектор

высокий· CWE-1395

Vulnerable Dependencies

Your package-lock.json includes thousands of packages. Some have known CVEs.

Читать прожектор

высокий· CWE-345

Webhook Signature Verification

If your webhook handler doesn't verify the signature, anyone can forge events.

Читать прожектор

средний· CWE-693

AI-Generated Code Guardrails

Fast AI-assisted changes need repo-level security rails.

Читать прожектор

средний· CWE-1357

Repo Security Hygiene

Branch protection, action pinning, secret hygiene — how your repo is run matters more than the code.

Читать прожектор

средний

Reviewing repo code against web app risk patterns

Reviewing repo code against web app risk patterns

Читать прожектор

Мы постоянно исследуем свежие проверки уязвимостей и способы исправления, чтобы ты мог выпускать продукт спокойнее.

Запусціць сканаванне
Агляд уразлівасцей — FixVibe · FixVibe