FixVibe

// holofote de vulnerabilidades

Cada check que o FixVibe roda,
explicado.

69+ classes de vulnerabilidades que vêm com o FixVibe. Cada item roda até 35 sub-checks por scan e detalha como o bug funciona, o que um atacante ganha com isso, como testamos e o que é preciso para se defender.

01 / 07

HTTP & superfície

02 / 07

Segredos

03 / 07

Backend-as-a-Service

04 / 07

DNS

05 / 07

Descoberta

alto· CWE-1395

CVE Cross-Reference

Detected version + public CVE database = a list of attacks already documented.

Ler o holofote

alto· CWE-489

Debug & Admin Endpoints

/debug, /admin, /server-status — paths that should never be reachable from the internet.

Ler o holofote

alto· CWE-538

Exposed Files & Backup Directories

.env, .git, .DS_Store, backup.sql — files that should never be public, accidentally are.

Ler o holofote

alto· CWE-20

SPIP Template RCE Version Exposure

Public SPIP version banners can reveal an RCE-class patch gap.

Ler o holofote

médio· CWE-693

Cloudflare Origin & Proxy Posture

If your origin IP is discoverable, Cloudflare's WAF is bypassable.

Ler o holofote

médio· CWE-200

GraphQL Introspection Exposed

Introspection in production hands the attacker your full type system.

Ler o holofote

médio· CWE-693

Threat-Intel Cross-Reference

Spamhaus DBL, URLhaus — your domain's reputation, externally seen.

Ler o holofote

baixo· CWE-200

Exposed API Documentation

/swagger.json, /openapi.json, /docs — public API maps for both you and the attacker.

Ler o holofote

baixo· CWE-200

Netlify-Specific Exposure

Netlify deploy preview URLs, x-nf-* headers, _redirects mistakes.

Ler o holofote

baixo· CWE-281

Privacy & Cookie Compliance Markers

GDPR-required pages — present and linked, or you're at risk of a complaint.

Ler o holofote

baixo· CWE-200

Technology Fingerprinting

Knowing your stack is half the recon — outdated frameworks turn that into the other half.

Ler o holofote

baixo· CWE-200

Vercel-Specific Exposure

_next/static, x-vercel-* headers, preview URLs — Vercel-isms that leak more than they should.

Ler o holofote

06 / 07

Probas activas

crítico· CWE-639

Cross-Tenant Data Leaks

Multi-tenant SaaS without tenant ID enforcement leaks customer data across orgs.

Ler o holofote

crítico· CWE-345

JWT alg=none Acceptance

A decoded token is not an authenticated identity.

Ler o holofote

crítico· CWE-78

OS Command Injection

When user input becomes part of a shell command, the shell runs whatever the attacker writes.

Ler o holofote

crítico· CWE-94

Server-Side Template Injection (SSTI)

When a template engine treats user input as a template, the server treats user input as code.

Ler o holofote

crítico· CWE-89

SQL Injection

When user input becomes part of a query, the database stops being yours.

Ler o holofote

alto· CWE-287

Auth Flow Defects

Login, signup, and password reset are where most account takeovers actually happen.

Ler o holofote

alto· CWE-918

Blind SSRF (Out-of-Band)

If the server fetches user-supplied URLs, the user can make it fetch internal services.

Ler o holofote

alto· CWE-89

CKAN DataStore SQL Authorization Bypass

Public DataStore SQL access can turn open data APIs into private data exposure.

Ler o holofote

alto· CWE-942

CORS Misconfiguration

Permissive Access-Control-Allow-Origin plus credentials means your API is everyone's API.

Ler o holofote

alto· CWE-79

DOM-based XSS via URL Fragment

Modern SPAs read location.hash and write it into the DOM — attacker payloads ride along.

Ler o holofote

alto· CWE-434

File Upload Validation

User-uploaded files are arbitrary bytes — accepting them as 'images' without checking is asking for RCE.

Ler o holofote

alto· CWE-321

FUXA Hardcoded JWT Fallback Secret

Default token-signing secrets can turn an HMI login into a weak boundary.

Ler o holofote

alto· CWE-770

GraphQL Depth Bombing & Batch Bypass

GraphQL's flexibility is also its vulnerability — depth bombs, alias batching, and field-suggestion leaks.

Ler o holofote

alto· CWE-444

HTTP Request Smuggling

Front-end proxy and back-end disagree on where one request ends — attacker rides the seam.

Ler o holofote

alto· CWE-639

IDOR / BOLA

If your API trusts the client to send the correct ID, the client can send any ID.

Ler o holofote

alto· CWE-77

LLM Prompt Injection

If your AI feature trusts user input as instruction, the user can rewrite the system prompt.

Ler o holofote

alto· CWE-943

NoSQL Operator Injection

MongoDB-style operators in user-controlled JSON turn your query into a wildcard.

Ler o holofote

alto· CWE-79

Reflected Cross-Site Scripting (XSS)

The silent hijack: when a single unsanitized parameter executes attacker code in your users' browsers.

Ler o holofote

alto· CWE-611

XML External Entity (XXE)

If your XML parser resolves external entities, your server reads files for the attacker.

Ler o holofote

alto· CWE-200

ZoneMinder Directory Listing Exposure

A camera management UI should not publish its web root index.

Ler o holofote

médio· CWE-203

Account Enumeration

If your login responds differently when the email exists vs doesn't, attackers can build a customer list.

Ler o holofote

médio

Confirming Next.js middleware bypass exposure

Confirming Next.js middleware bypass exposure

Ler o holofote

médio· CWE-113

CRLF / Response Splitting

If user input lands in a response header, line breaks let the attacker write their own headers.

Ler o holofote

médio· CWE-352

CSRF Protection

If your state-changing endpoints don't require a CSRF token, third-party sites can act as your users.

Ler o holofote

médio· CWE-307

Missing Rate Limiting

Without rate limits on auth endpoints, the attacker can credential-stuff at line speed.

Ler o holofote

médio· CWE-693

Next.js Header Configuration Drift

Headers set on `/` do not always protect nested routes.

Ler o holofote

médio· CWE-601

Open Redirect

Your /redirect?url=… that doesn't validate the destination is a phishing kit.

Ler o holofote

07 / 07

Código fonte

crítico· CWE-89

Ghost Content API SQL Injection Advisory

A vulnerable Ghost dependency can put public content APIs on the database boundary.

Ler o holofote

crítico· CWE-78

LibreNMS Command Injection Advisory

A vulnerable monitoring stack can become an execution path inside the network.

Ler o holofote

crítico· CWE-89

LiteLLM SQL Injection Advisory

A vulnerable LiteLLM Proxy version can turn API-key verification into database exposure.

Ler o holofote

alto· CWE-798

Committed AI-Generated Secrets

AI snippets should not ship provider keys into git.

Ler o holofote

alto· CWE-77

electerm Install-Script Command Injection Advisory

A vulnerable terminal-client dependency can put build or developer hosts at install-time risk.

Ler o holofote

alto· CWE-611

OpenCms XXE Information-Disclosure Advisory

A vulnerable OpenCms dependency can put XML-processing routes on a file-read boundary.

Ler o holofote

alto· CWE-754

PDF.js JavaScript Execution Advisory

A vulnerable PDF viewer can turn a malicious document into script execution.

Ler o holofote

alto· CWE-94

Risky Source-Code Patterns

eval(), dangerouslySetInnerHTML, hard-coded secrets — the patterns SAST has been catching for 25 years.

Ler o holofote

alto· CWE-284

Supabase RLS in Migrations

A public table without RLS is a future data leak.

Ler o holofote

alto· CWE-1395

Vulnerable Dependencies

Your package-lock.json includes thousands of packages. Some have known CVEs.

Ler o holofote

alto· CWE-345

Webhook Signature Verification

If your webhook handler doesn't verify the signature, anyone can forge events.

Ler o holofote

médio· CWE-693

AI-Generated Code Guardrails

Fast AI-assisted changes need repo-level security rails.

Ler o holofote

médio· CWE-1357

Repo Security Hygiene

Branch protection, action pinning, secret hygiene — how your repo is run matters more than the code.

Ler o holofote

médio

Reviewing repo code against web app risk patterns

Reviewing repo code against web app risk patterns

Ler o holofote

Continuamos pesquisando as vulnerabilidades, checks e fixes mais recentes para você publicar com tranquilidade.

Executar análise
Foco en Vulnerabilidades — FixVibe · FixVibe