@zerothreatai/vulnerability-registry 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.d.ts +8 -0
- package/dist/categories/authentication.js +375 -0
- package/dist/categories/configuration.d.ts +8 -0
- package/dist/categories/configuration.js +903 -0
- package/dist/categories/injection.d.ts +8 -0
- package/dist/categories/injection.js +747 -0
- package/dist/categories/sensitive-paths.d.ts +9 -0
- package/dist/categories/sensitive-paths.js +1788 -0
- package/dist/categories/ssrf.d.ts +8 -0
- package/dist/categories/ssrf.js +247 -0
- package/dist/categories/xss.d.ts +7 -0
- package/dist/categories/xss.js +325 -0
- package/dist/error-codes.d.ts +242 -0
- package/dist/error-codes.js +312 -0
- package/dist/index.d.ts +60 -0
- package/dist/index.js +92 -0
- package/dist/types.d.ts +86 -0
- package/dist/types.js +6 -0
- package/dist-cjs/categories/authentication.js +378 -0
- package/dist-cjs/categories/configuration.js +906 -0
- package/dist-cjs/categories/injection.js +750 -0
- package/dist-cjs/categories/sensitive-paths.js +1791 -0
- package/dist-cjs/categories/ssrf.js +250 -0
- package/dist-cjs/categories/xss.js +328 -0
- package/dist-cjs/error-codes.js +315 -0
- package/dist-cjs/index.js +107 -0
- package/dist-cjs/types.js +7 -0
- package/package.json +35 -0
- package/src/categories/authentication.d.ts +8 -0
- package/src/categories/authentication.d.ts.map +1 -0
- package/src/categories/authentication.js +378 -0
- package/src/categories/authentication.js.map +1 -0
- package/src/categories/authentication.ts +395 -0
- package/src/categories/configuration.d.ts +8 -0
- package/src/categories/configuration.d.ts.map +1 -0
- package/src/categories/configuration.js +906 -0
- package/src/categories/configuration.js.map +1 -0
- package/src/categories/configuration.ts +948 -0
- package/src/categories/injection.d.ts +8 -0
- package/src/categories/injection.d.ts.map +1 -0
- package/src/categories/injection.js +750 -0
- package/src/categories/injection.js.map +1 -0
- package/src/categories/injection.ts +785 -0
- package/src/categories/sensitive-paths.d.ts +9 -0
- package/src/categories/sensitive-paths.d.ts.map +1 -0
- package/src/categories/sensitive-paths.js +1791 -0
- package/src/categories/sensitive-paths.js.map +1 -0
- package/src/categories/sensitive-paths.ts +1875 -0
- package/src/categories/ssrf.d.ts +8 -0
- package/src/categories/ssrf.d.ts.map +1 -0
- package/src/categories/ssrf.js +250 -0
- package/src/categories/ssrf.js.map +1 -0
- package/src/categories/ssrf.ts +261 -0
- package/src/categories/xss.d.ts +7 -0
- package/src/categories/xss.d.ts.map +1 -0
- package/src/categories/xss.js +328 -0
- package/src/categories/xss.js.map +1 -0
- package/src/categories/xss.ts +342 -0
- package/src/error-codes.d.ts +242 -0
- package/src/error-codes.d.ts.map +1 -0
- package/src/error-codes.js +315 -0
- package/src/error-codes.js.map +1 -0
- package/src/error-codes.ts +334 -0
- package/src/index.d.ts +60 -0
- package/src/index.d.ts.map +1 -0
- package/src/index.js +107 -0
- package/src/index.js.map +1 -0
- package/src/index.ts +126 -0
- package/src/types.d.ts +86 -0
- package/src/types.d.ts.map +1 -0
- package/src/types.js +7 -0
- package/src/types.js.map +1 -0
- package/src/types.ts +109 -0
- package/tsconfig.cjs.json +8 -0
- package/tsconfig.json +21 -0
- package/vulnerability-registry.zip +0 -0
|
@@ -0,0 +1,315 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vulnerability Registry - Error Codes
|
|
4
|
+
*
|
|
5
|
+
* Central enum containing all vulnerability error codes across all scanners.
|
|
6
|
+
* Each code maps to a complete VulnerabilityDefinition.
|
|
7
|
+
*/
|
|
8
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
+
exports.VulnerabilityCode = void 0;
|
|
10
|
+
var VulnerabilityCode;
|
|
11
|
+
(function (VulnerabilityCode) {
|
|
12
|
+
// ========================================
|
|
13
|
+
// SQL INJECTION (SQLI_*)
|
|
14
|
+
// ========================================
|
|
15
|
+
VulnerabilityCode["SQLI_ERROR_BASED"] = "SQLI_ERROR_BASED";
|
|
16
|
+
VulnerabilityCode["SQLI_BOOLEAN_BASED"] = "SQLI_BOOLEAN_BASED";
|
|
17
|
+
VulnerabilityCode["SQLI_TIME_BASED"] = "SQLI_TIME_BASED";
|
|
18
|
+
VulnerabilityCode["SQLI_STACK_BASED"] = "SQLI_STACK_BASED";
|
|
19
|
+
VulnerabilityCode["SQLI_UNION_BASED"] = "SQLI_UNION_BASED";
|
|
20
|
+
// ========================================
|
|
21
|
+
// CROSS-SITE SCRIPTING (XSS_*)
|
|
22
|
+
// ========================================
|
|
23
|
+
VulnerabilityCode["XSS_REFLECTED"] = "XSS_REFLECTED";
|
|
24
|
+
VulnerabilityCode["XSS_STORED"] = "XSS_STORED";
|
|
25
|
+
VulnerabilityCode["XSS_DOM_BASED"] = "XSS_DOM_BASED";
|
|
26
|
+
VulnerabilityCode["XSS_SVG_INJECTION"] = "XSS_SVG_INJECTION";
|
|
27
|
+
VulnerabilityCode["XSS_CSTI_ANGULAR"] = "XSS_CSTI_ANGULAR";
|
|
28
|
+
VulnerabilityCode["XSS_CSTI_VUE"] = "XSS_CSTI_VUE";
|
|
29
|
+
VulnerabilityCode["XSS_EVENT_HANDLER"] = "XSS_EVENT_HANDLER";
|
|
30
|
+
VulnerabilityCode["XSS_SCRIPT_INJECTION"] = "XSS_SCRIPT_INJECTION";
|
|
31
|
+
VulnerabilityCode["XSS_HTML_INJECTION"] = "XSS_HTML_INJECTION";
|
|
32
|
+
VulnerabilityCode["XSS_ATTRIBUTE_INJECTION"] = "XSS_ATTRIBUTE_INJECTION";
|
|
33
|
+
VulnerabilityCode["XSS_JS_CONTEXT"] = "XSS_JS_CONTEXT";
|
|
34
|
+
VulnerabilityCode["XSS_CSS_INJECTION"] = "XSS_CSS_INJECTION";
|
|
35
|
+
VulnerabilityCode["XSS_CSP_BYPASS"] = "XSS_CSP_BYPASS";
|
|
36
|
+
VulnerabilityCode["XSS_TEMPLATE_LITERAL"] = "XSS_TEMPLATE_LITERAL";
|
|
37
|
+
VulnerabilityCode["XSS_MUTATION_BASED"] = "XSS_MUTATION_BASED";
|
|
38
|
+
// ========================================
|
|
39
|
+
// COMMAND INJECTION (CMDI_*)
|
|
40
|
+
// ========================================
|
|
41
|
+
VulnerabilityCode["CMDI_OOB_CONFIRMED"] = "CMDI_OOB_CONFIRMED";
|
|
42
|
+
VulnerabilityCode["CMDI_REFLECTED"] = "CMDI_REFLECTED";
|
|
43
|
+
VulnerabilityCode["CMDI_TIME_BASED"] = "CMDI_TIME_BASED";
|
|
44
|
+
VulnerabilityCode["CMDI_ERROR_BASED"] = "CMDI_ERROR_BASED";
|
|
45
|
+
// ========================================
|
|
46
|
+
// SERVER-SIDE REQUEST FORGERY (SSRF_*)
|
|
47
|
+
// ========================================
|
|
48
|
+
VulnerabilityCode["SSRF_CLOUD_METADATA"] = "SSRF_CLOUD_METADATA";
|
|
49
|
+
VulnerabilityCode["SSRF_INTERNAL_SERVICE"] = "SSRF_INTERNAL_SERVICE";
|
|
50
|
+
VulnerabilityCode["SSRF_PROTOCOL_SMUGGLING"] = "SSRF_PROTOCOL_SMUGGLING";
|
|
51
|
+
VulnerabilityCode["SSRF_BLIND_OOB"] = "SSRF_BLIND_OOB";
|
|
52
|
+
VulnerabilityCode["SSRF_FILTER_BYPASS"] = "SSRF_FILTER_BYPASS";
|
|
53
|
+
// ========================================
|
|
54
|
+
// SERVER-SIDE TEMPLATE INJECTION (SSTI_*)
|
|
55
|
+
// ========================================
|
|
56
|
+
VulnerabilityCode["SSTI_JINJA2"] = "SSTI_JINJA2";
|
|
57
|
+
VulnerabilityCode["SSTI_TWIG"] = "SSTI_TWIG";
|
|
58
|
+
VulnerabilityCode["SSTI_FREEMARKER"] = "SSTI_FREEMARKER";
|
|
59
|
+
VulnerabilityCode["SSTI_VELOCITY"] = "SSTI_VELOCITY";
|
|
60
|
+
VulnerabilityCode["SSTI_THYMELEAF"] = "SSTI_THYMELEAF";
|
|
61
|
+
VulnerabilityCode["SSTI_ERB"] = "SSTI_ERB";
|
|
62
|
+
VulnerabilityCode["SSTI_EJS"] = "SSTI_EJS";
|
|
63
|
+
VulnerabilityCode["SSTI_PUG"] = "SSTI_PUG";
|
|
64
|
+
VulnerabilityCode["SSTI_SMARTY"] = "SSTI_SMARTY";
|
|
65
|
+
VulnerabilityCode["SSTI_MAKO"] = "SSTI_MAKO";
|
|
66
|
+
VulnerabilityCode["SSTI_GENERIC"] = "SSTI_GENERIC";
|
|
67
|
+
// ========================================
|
|
68
|
+
// XML EXTERNAL ENTITY (XXE_*)
|
|
69
|
+
// ========================================
|
|
70
|
+
VulnerabilityCode["XXE_CLASSIC"] = "XXE_CLASSIC";
|
|
71
|
+
VulnerabilityCode["XXE_BLIND"] = "XXE_BLIND";
|
|
72
|
+
VulnerabilityCode["XXE_OOB"] = "XXE_OOB";
|
|
73
|
+
VulnerabilityCode["XXE_ERROR_BASED"] = "XXE_ERROR_BASED";
|
|
74
|
+
VulnerabilityCode["XXE_PARAMETER_ENTITY"] = "XXE_PARAMETER_ENTITY";
|
|
75
|
+
// ========================================
|
|
76
|
+
// XPATH INJECTION (XPATH_*)
|
|
77
|
+
// ========================================
|
|
78
|
+
VulnerabilityCode["XPATH_AUTH_BYPASS"] = "XPATH_AUTH_BYPASS";
|
|
79
|
+
VulnerabilityCode["XPATH_DATA_EXTRACTION"] = "XPATH_DATA_EXTRACTION";
|
|
80
|
+
VulnerabilityCode["XPATH_BLIND"] = "XPATH_BLIND";
|
|
81
|
+
VulnerabilityCode["XPATH_ERROR_BASED"] = "XPATH_ERROR_BASED";
|
|
82
|
+
// ========================================
|
|
83
|
+
// LOCAL FILE INCLUSION (LFI_*)
|
|
84
|
+
// ========================================
|
|
85
|
+
VulnerabilityCode["LFI_PATH_TRAVERSAL"] = "LFI_PATH_TRAVERSAL";
|
|
86
|
+
VulnerabilityCode["LFI_FILTER_BYPASS"] = "LFI_FILTER_BYPASS";
|
|
87
|
+
VulnerabilityCode["LFI_SOURCE_DISCLOSURE"] = "LFI_SOURCE_DISCLOSURE";
|
|
88
|
+
VulnerabilityCode["LFI_WRAPPER_PROTOCOL"] = "LFI_WRAPPER_PROTOCOL";
|
|
89
|
+
VulnerabilityCode["LFI_PROC_DISCLOSURE"] = "LFI_PROC_DISCLOSURE";
|
|
90
|
+
// ========================================
|
|
91
|
+
// JWT VULNERABILITIES (JWT_*)
|
|
92
|
+
// ========================================
|
|
93
|
+
VulnerabilityCode["JWT_NONE_ALGORITHM"] = "JWT_NONE_ALGORITHM";
|
|
94
|
+
VulnerabilityCode["JWT_WEAK_SECRET"] = "JWT_WEAK_SECRET";
|
|
95
|
+
VulnerabilityCode["JWT_KEY_CONFUSION"] = "JWT_KEY_CONFUSION";
|
|
96
|
+
VulnerabilityCode["JWT_EXPIRED_TOKEN"] = "JWT_EXPIRED_TOKEN";
|
|
97
|
+
VulnerabilityCode["JWT_MISSING_CLAIMS"] = "JWT_MISSING_CLAIMS";
|
|
98
|
+
VulnerabilityCode["JWT_CLAIM_TAMPERING"] = "JWT_CLAIM_TAMPERING";
|
|
99
|
+
VulnerabilityCode["JWT_KID_INJECTION"] = "JWT_KID_INJECTION";
|
|
100
|
+
VulnerabilityCode["JWT_JKU_INJECTION"] = "JWT_JKU_INJECTION";
|
|
101
|
+
VulnerabilityCode["JWT_EMBEDDED_JWK"] = "JWT_EMBEDDED_JWK";
|
|
102
|
+
VulnerabilityCode["JWT_X5C_INJECTION"] = "JWT_X5C_INJECTION";
|
|
103
|
+
// ========================================
|
|
104
|
+
// OPEN REDIRECT (REDIRECT_*)
|
|
105
|
+
// ========================================
|
|
106
|
+
VulnerabilityCode["REDIRECT_HEADER_INJECTION"] = "REDIRECT_HEADER_INJECTION";
|
|
107
|
+
VulnerabilityCode["REDIRECT_META_REFRESH"] = "REDIRECT_META_REFRESH";
|
|
108
|
+
VulnerabilityCode["REDIRECT_JS_NAVIGATION"] = "REDIRECT_JS_NAVIGATION";
|
|
109
|
+
// ========================================
|
|
110
|
+
// BROKEN ACCESS CONTROL (BAC_*)
|
|
111
|
+
// ========================================
|
|
112
|
+
VulnerabilityCode["BAC_ANONYMOUS_ACCESS"] = "BAC_ANONYMOUS_ACCESS";
|
|
113
|
+
VulnerabilityCode["BAC_HORIZONTAL_PRIVILEGE"] = "BAC_HORIZONTAL_PRIVILEGE";
|
|
114
|
+
VulnerabilityCode["BAC_VERTICAL_PRIVILEGE"] = "BAC_VERTICAL_PRIVILEGE";
|
|
115
|
+
VulnerabilityCode["BAC_IDOR"] = "BAC_IDOR";
|
|
116
|
+
// ========================================
|
|
117
|
+
// SECURITY HEADERS (HEADER_*)
|
|
118
|
+
// ========================================
|
|
119
|
+
VulnerabilityCode["HEADER_MISSING_CSP"] = "HEADER_MISSING_CSP";
|
|
120
|
+
VulnerabilityCode["HEADER_MISSING_HSTS"] = "HEADER_MISSING_HSTS";
|
|
121
|
+
VulnerabilityCode["HEADER_MISSING_XFRAME"] = "HEADER_MISSING_XFRAME";
|
|
122
|
+
VulnerabilityCode["HEADER_MISSING_XCONTENT_TYPE"] = "HEADER_MISSING_XCONTENT_TYPE";
|
|
123
|
+
VulnerabilityCode["HEADER_MISSING_XSS_PROTECTION"] = "HEADER_MISSING_XSS_PROTECTION";
|
|
124
|
+
VulnerabilityCode["HEADER_MISSING_REFERRER_POLICY"] = "HEADER_MISSING_REFERRER_POLICY";
|
|
125
|
+
VulnerabilityCode["HEADER_MISSING_PERMISSIONS_POLICY"] = "HEADER_MISSING_PERMISSIONS_POLICY";
|
|
126
|
+
VulnerabilityCode["HEADER_WEAK_CSP"] = "HEADER_WEAK_CSP";
|
|
127
|
+
VulnerabilityCode["HEADER_CORS_MISCONFIGURED"] = "HEADER_CORS_MISCONFIGURED";
|
|
128
|
+
VulnerabilityCode["HEADER_COEP_WITHOUT_COOP"] = "HEADER_COEP_WITHOUT_COOP";
|
|
129
|
+
VulnerabilityCode["HEADER_CORP_UNUSUAL"] = "HEADER_CORP_UNUSUAL";
|
|
130
|
+
VulnerabilityCode["HEADER_EXPECT_CT_PRESENT"] = "HEADER_EXPECT_CT_PRESENT";
|
|
131
|
+
VulnerabilityCode["HEADER_SERVER_HEADER_PRESENT"] = "HEADER_SERVER_HEADER_PRESENT";
|
|
132
|
+
VulnerabilityCode["HEADER_X_POWERED_BY_PRESENT"] = "HEADER_X_POWERED_BY_PRESENT";
|
|
133
|
+
VulnerabilityCode["HEADER_X_XSS_PROTECTION_ENABLED"] = "HEADER_X_XSS_PROTECTION_ENABLED";
|
|
134
|
+
VulnerabilityCode["COOKIE_SAMESITE_NONE_WITHOUT_SECURE"] = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE";
|
|
135
|
+
VulnerabilityCode["COOKIE_SESSION_MISSING_SECURE"] = "COOKIE_SESSION_MISSING_SECURE";
|
|
136
|
+
VulnerabilityCode["COOKIE_MISSING_SECURE"] = "COOKIE_MISSING_SECURE";
|
|
137
|
+
VulnerabilityCode["COOKIE_SESSION_MISSING_HTTPONLY"] = "COOKIE_SESSION_MISSING_HTTPONLY";
|
|
138
|
+
VulnerabilityCode["COOKIE_MISSING_HTTPONLY"] = "COOKIE_MISSING_HTTPONLY";
|
|
139
|
+
VulnerabilityCode["COOKIE_MISSING_SAMESITE"] = "COOKIE_MISSING_SAMESITE";
|
|
140
|
+
VulnerabilityCode["COOKIE_HOST_PREFIX_INVALID"] = "COOKIE_HOST_PREFIX_INVALID";
|
|
141
|
+
VulnerabilityCode["COOKIE_SECURE_PREFIX_INVALID"] = "COOKIE_SECURE_PREFIX_INVALID";
|
|
142
|
+
VulnerabilityCode["HEADER_DRIFT_CSP"] = "HEADER_DRIFT_CSP";
|
|
143
|
+
VulnerabilityCode["HEADER_DRIFT_HSTS"] = "HEADER_DRIFT_HSTS";
|
|
144
|
+
VulnerabilityCode["HEADER_DRIFT_XCONTENT_TYPE"] = "HEADER_DRIFT_XCONTENT_TYPE";
|
|
145
|
+
VulnerabilityCode["HEADER_DRIFT_REFERRER_POLICY"] = "HEADER_DRIFT_REFERRER_POLICY";
|
|
146
|
+
VulnerabilityCode["HEADER_DRIFT_XFRAME"] = "HEADER_DRIFT_XFRAME";
|
|
147
|
+
VulnerabilityCode["HEADER_DRIFT_PERMISSIONS_POLICY"] = "HEADER_DRIFT_PERMISSIONS_POLICY";
|
|
148
|
+
VulnerabilityCode["HEADER_DRIFT_COOP"] = "HEADER_DRIFT_COOP";
|
|
149
|
+
VulnerabilityCode["HEADER_DRIFT_COEP"] = "HEADER_DRIFT_COEP";
|
|
150
|
+
VulnerabilityCode["HEADER_DRIFT_CORP"] = "HEADER_DRIFT_CORP";
|
|
151
|
+
// ========================================
|
|
152
|
+
// HOST HEADER INJECTION (HOST_*)
|
|
153
|
+
// ========================================
|
|
154
|
+
VulnerabilityCode["HOST_CACHE_POISONING"] = "HOST_CACHE_POISONING";
|
|
155
|
+
VulnerabilityCode["HOST_PASSWORD_RESET"] = "HOST_PASSWORD_RESET";
|
|
156
|
+
VulnerabilityCode["HOST_REDIRECT"] = "HOST_REDIRECT";
|
|
157
|
+
// ========================================
|
|
158
|
+
// DIRECTORY BROWSING (DIRBROWSE_*)
|
|
159
|
+
// ========================================
|
|
160
|
+
VulnerabilityCode["DIRBROWSE_ENABLED"] = "DIRBROWSE_ENABLED";
|
|
161
|
+
VulnerabilityCode["DIRBROWSE_SENSITIVE"] = "DIRBROWSE_SENSITIVE";
|
|
162
|
+
// ========================================
|
|
163
|
+
// MASS ASSIGNMENT (MASSASSIGN_*)
|
|
164
|
+
// ========================================
|
|
165
|
+
VulnerabilityCode["MASSASSIGN_PROTOTYPE_POLLUTION"] = "MASSASSIGN_PROTOTYPE_POLLUTION";
|
|
166
|
+
VulnerabilityCode["MASSASSIGN_ROLE_ESCALATION"] = "MASSASSIGN_ROLE_ESCALATION";
|
|
167
|
+
VulnerabilityCode["MASSASSIGN_HIDDEN_FIELD"] = "MASSASSIGN_HIDDEN_FIELD";
|
|
168
|
+
// ========================================
|
|
169
|
+
// DESERIALIZATION (DESER_*)
|
|
170
|
+
// ========================================
|
|
171
|
+
VulnerabilityCode["DESER_JAVA"] = "DESER_JAVA";
|
|
172
|
+
VulnerabilityCode["DESER_PHP"] = "DESER_PHP";
|
|
173
|
+
VulnerabilityCode["DESER_PYTHON"] = "DESER_PYTHON";
|
|
174
|
+
VulnerabilityCode["DESER_DOTNET"] = "DESER_DOTNET";
|
|
175
|
+
VulnerabilityCode["DESER_RUBY"] = "DESER_RUBY";
|
|
176
|
+
VulnerabilityCode["DESER_NODE"] = "DESER_NODE";
|
|
177
|
+
// ========================================
|
|
178
|
+
// SENSITIVE PATH SCOUT - CRITICAL (SENS_CRIT_*)
|
|
179
|
+
// ========================================
|
|
180
|
+
VulnerabilityCode["SENS_CRIT_AWS_CREDENTIALS"] = "SENS_CRIT_AWS_CREDENTIALS";
|
|
181
|
+
VulnerabilityCode["SENS_CRIT_SSH_PRIVATE_KEY"] = "SENS_CRIT_SSH_PRIVATE_KEY";
|
|
182
|
+
VulnerabilityCode["SENS_CRIT_SSL_PRIVATE_KEY"] = "SENS_CRIT_SSL_PRIVATE_KEY";
|
|
183
|
+
VulnerabilityCode["SENS_CRIT_RAILS_MASTER_KEY"] = "SENS_CRIT_RAILS_MASTER_KEY";
|
|
184
|
+
VulnerabilityCode["SENS_CRIT_TERRAFORM_STATE"] = "SENS_CRIT_TERRAFORM_STATE";
|
|
185
|
+
VulnerabilityCode["SENS_CRIT_FIREBASE_ADMIN_SDK"] = "SENS_CRIT_FIREBASE_ADMIN_SDK";
|
|
186
|
+
VulnerabilityCode["SENS_CRIT_KUBE_CONFIG"] = "SENS_CRIT_KUBE_CONFIG";
|
|
187
|
+
VulnerabilityCode["SENS_CRIT_AZURE_STORAGE_KEY"] = "SENS_CRIT_AZURE_STORAGE_KEY";
|
|
188
|
+
VulnerabilityCode["SENS_CRIT_CONSUL_KV"] = "SENS_CRIT_CONSUL_KV";
|
|
189
|
+
VulnerabilityCode["SENS_CRIT_VAULT_SECRET"] = "SENS_CRIT_VAULT_SECRET";
|
|
190
|
+
VulnerabilityCode["SENS_CRIT_DOCKER_SECRET"] = "SENS_CRIT_DOCKER_SECRET";
|
|
191
|
+
// ========================================
|
|
192
|
+
// SENSITIVE PATH SCOUT - HIGH (SENS_HIGH_*)
|
|
193
|
+
// ========================================
|
|
194
|
+
VulnerabilityCode["SENS_HIGH_GIT_EXPOSED"] = "SENS_HIGH_GIT_EXPOSED";
|
|
195
|
+
VulnerabilityCode["SENS_HIGH_GIT_CONFIG"] = "SENS_HIGH_GIT_CONFIG";
|
|
196
|
+
VulnerabilityCode["SENS_HIGH_WORDPRESS_CONFIG"] = "SENS_HIGH_WORDPRESS_CONFIG";
|
|
197
|
+
VulnerabilityCode["SENS_HIGH_SPRING_ACTUATOR"] = "SENS_HIGH_SPRING_ACTUATOR";
|
|
198
|
+
VulnerabilityCode["SENS_HIGH_SPRING_HEAPDUMP"] = "SENS_HIGH_SPRING_HEAPDUMP";
|
|
199
|
+
VulnerabilityCode["SENS_HIGH_DATABASE_BACKUP"] = "SENS_HIGH_DATABASE_BACKUP";
|
|
200
|
+
VulnerabilityCode["SENS_HIGH_PHPINFO"] = "SENS_HIGH_PHPINFO";
|
|
201
|
+
VulnerabilityCode["SENS_HIGH_LARAVEL_DEBUG"] = "SENS_HIGH_LARAVEL_DEBUG";
|
|
202
|
+
VulnerabilityCode["SENS_HIGH_GCP_SERVICE_ACCOUNT"] = "SENS_HIGH_GCP_SERVICE_ACCOUNT";
|
|
203
|
+
VulnerabilityCode["SENS_HIGH_GRAPHQL_INTROSPECTION"] = "SENS_HIGH_GRAPHQL_INTROSPECTION";
|
|
204
|
+
VulnerabilityCode["SENS_HIGH_PHPMYADMIN"] = "SENS_HIGH_PHPMYADMIN";
|
|
205
|
+
VulnerabilityCode["SENS_HIGH_MONGODB_CONFIG"] = "SENS_HIGH_MONGODB_CONFIG";
|
|
206
|
+
VulnerabilityCode["SENS_HIGH_JAVA_KEYSTORE"] = "SENS_HIGH_JAVA_KEYSTORE";
|
|
207
|
+
VulnerabilityCode["SENS_HIGH_PHP_SESSION"] = "SENS_HIGH_PHP_SESSION";
|
|
208
|
+
VulnerabilityCode["SENS_HIGH_ENV_FILE"] = "SENS_HIGH_ENV_FILE";
|
|
209
|
+
VulnerabilityCode["SENS_HIGH_BACKUP_FILE"] = "SENS_HIGH_BACKUP_FILE";
|
|
210
|
+
VulnerabilityCode["SENS_HIGH_HTPASSWD"] = "SENS_HIGH_HTPASSWD";
|
|
211
|
+
VulnerabilityCode["SENS_HIGH_DS_STORE"] = "SENS_HIGH_DS_STORE";
|
|
212
|
+
// ========================================
|
|
213
|
+
// SENSITIVE PATH SCOUT - MEDIUM (SENS_MED_*)
|
|
214
|
+
// ========================================
|
|
215
|
+
VulnerabilityCode["SENS_MED_SWAGGER_DOCS"] = "SENS_MED_SWAGGER_DOCS";
|
|
216
|
+
VulnerabilityCode["SENS_MED_APACHE_STATUS"] = "SENS_MED_APACHE_STATUS";
|
|
217
|
+
VulnerabilityCode["SENS_MED_PROMETHEUS_METRICS"] = "SENS_MED_PROMETHEUS_METRICS";
|
|
218
|
+
VulnerabilityCode["SENS_MED_DOCKERFILE"] = "SENS_MED_DOCKERFILE";
|
|
219
|
+
VulnerabilityCode["SENS_MED_FIREBASE_CONFIG"] = "SENS_MED_FIREBASE_CONFIG";
|
|
220
|
+
VulnerabilityCode["SENS_MED_SOURCE_MAP"] = "SENS_MED_SOURCE_MAP";
|
|
221
|
+
VulnerabilityCode["SENS_MED_ELASTICSEARCH"] = "SENS_MED_ELASTICSEARCH";
|
|
222
|
+
VulnerabilityCode["SENS_MED_ADMIN_PANEL"] = "SENS_MED_ADMIN_PANEL";
|
|
223
|
+
VulnerabilityCode["SENS_MED_COMPOSER_LOCK"] = "SENS_MED_COMPOSER_LOCK";
|
|
224
|
+
VulnerabilityCode["SENS_MED_PACKAGE_LOCK"] = "SENS_MED_PACKAGE_LOCK";
|
|
225
|
+
VulnerabilityCode["SENS_MED_GEMFILE_LOCK"] = "SENS_MED_GEMFILE_LOCK";
|
|
226
|
+
VulnerabilityCode["SENS_MED_ROBOTS_TXT"] = "SENS_MED_ROBOTS_TXT";
|
|
227
|
+
VulnerabilityCode["SENS_MED_SITEMAP"] = "SENS_MED_SITEMAP";
|
|
228
|
+
VulnerabilityCode["SENS_MED_CROSSDOMAIN_XML"] = "SENS_MED_CROSSDOMAIN_XML";
|
|
229
|
+
// ========================================
|
|
230
|
+
// SENSITIVE PATH SCOUT - LOW (SENS_LOW_*)
|
|
231
|
+
// ========================================
|
|
232
|
+
VulnerabilityCode["SENS_LOW_TRAVIS_CI"] = "SENS_LOW_TRAVIS_CI";
|
|
233
|
+
VulnerabilityCode["SENS_LOW_JENKINSFILE"] = "SENS_LOW_JENKINSFILE";
|
|
234
|
+
VulnerabilityCode["SENS_LOW_CIRCLECI"] = "SENS_LOW_CIRCLECI";
|
|
235
|
+
VulnerabilityCode["SENS_LOW_GITLAB_CI"] = "SENS_LOW_GITLAB_CI";
|
|
236
|
+
VulnerabilityCode["SENS_LOW_README"] = "SENS_LOW_README";
|
|
237
|
+
VulnerabilityCode["SENS_LOW_CHANGELOG"] = "SENS_LOW_CHANGELOG";
|
|
238
|
+
VulnerabilityCode["SENS_LOW_LICENSE"] = "SENS_LOW_LICENSE";
|
|
239
|
+
// ========================================
|
|
240
|
+
// SENSITIVE PATH SCOUT - EXTENDED
|
|
241
|
+
// ========================================
|
|
242
|
+
// HIGH
|
|
243
|
+
VulnerabilityCode["SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED"] = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED";
|
|
244
|
+
VulnerabilityCode["SENS_HIGH_APPSETTINGS_JSON_EXPOSED"] = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED";
|
|
245
|
+
VulnerabilityCode["SENS_HIGH_SPRING_CONFIG_EXPOSED"] = "SENS_HIGH_SPRING_CONFIG_EXPOSED";
|
|
246
|
+
VulnerabilityCode["SENS_HIGH_NPMRC_EXPOSED"] = "SENS_HIGH_NPMRC_EXPOSED";
|
|
247
|
+
VulnerabilityCode["SENS_HIGH_RAILS_DATABASE_YML_EXPOSED"] = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED";
|
|
248
|
+
VulnerabilityCode["SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED"] = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED";
|
|
249
|
+
VulnerabilityCode["SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED"] = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED";
|
|
250
|
+
VulnerabilityCode["SENS_HIGH_JOLOKIA_EXPOSED"] = "SENS_HIGH_JOLOKIA_EXPOSED";
|
|
251
|
+
VulnerabilityCode["SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED"] = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED";
|
|
252
|
+
VulnerabilityCode["SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED"] = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED";
|
|
253
|
+
VulnerabilityCode["SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED"] = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED";
|
|
254
|
+
VulnerabilityCode["SENS_HIGH_REDIS_RDB_DUMP_DETECTED"] = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED";
|
|
255
|
+
VulnerabilityCode["SENS_HIGH_TRACE_AXD"] = "SENS_HIGH_TRACE_AXD";
|
|
256
|
+
VulnerabilityCode["SENS_HIGH_ELMAH_AXD_EXPOSED"] = "SENS_HIGH_ELMAH_AXD_EXPOSED";
|
|
257
|
+
VulnerabilityCode["SENS_HIGH_SQLITE_DATABASE_DETECTED"] = "SENS_HIGH_SQLITE_DATABASE_DETECTED";
|
|
258
|
+
VulnerabilityCode["SENS_HIGH_AWS_CONFIG_EXPOSED"] = "SENS_HIGH_AWS_CONFIG_EXPOSED";
|
|
259
|
+
VulnerabilityCode["SENS_HIGH_AZURE_CREDENTIALS_EXPOSED"] = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED";
|
|
260
|
+
VulnerabilityCode["SENS_HIGH_HELM_VALUES_EXPOSED"] = "SENS_HIGH_HELM_VALUES_EXPOSED";
|
|
261
|
+
VulnerabilityCode["SENS_HIGH_TERRAFORM_VARS_EXPOSED"] = "SENS_HIGH_TERRAFORM_VARS_EXPOSED";
|
|
262
|
+
VulnerabilityCode["SENS_HIGH_LARAVEL_LOG_EXPOSED"] = "SENS_HIGH_LARAVEL_LOG_EXPOSED";
|
|
263
|
+
VulnerabilityCode["SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED"] = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED";
|
|
264
|
+
VulnerabilityCode["SENS_HIGH_ADMINER_EXPOSED"] = "SENS_HIGH_ADMINER_EXPOSED";
|
|
265
|
+
VulnerabilityCode["SENS_HIGH_DEBUG_ENDPOINT_EXPOSED"] = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED";
|
|
266
|
+
VulnerabilityCode["SENS_HIGH_GO_DEBUG_VARS_EXPOSED"] = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED";
|
|
267
|
+
VulnerabilityCode["SENS_HIGH_GO_PPROF_EXPOSED"] = "SENS_HIGH_GO_PPROF_EXPOSED";
|
|
268
|
+
VulnerabilityCode["SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED"] = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED";
|
|
269
|
+
VulnerabilityCode["SENS_HIGH_MONGO_RC_EXPOSED"] = "SENS_HIGH_MONGO_RC_EXPOSED";
|
|
270
|
+
// MEDIUM
|
|
271
|
+
VulnerabilityCode["SENS_MED_UN_PROTECTED_CONFIG_JSON"] = "SENS_MED_UN_PROTECTED_CONFIG_JSON";
|
|
272
|
+
VulnerabilityCode["SENS_MED_MERCURIAL_REPOSITORY_FOUND"] = "SENS_MED_MERCURIAL_REPOSITORY_FOUND";
|
|
273
|
+
VulnerabilityCode["SENS_MED_MERCURIAL_HGRC_EXPOSED"] = "SENS_MED_MERCURIAL_HGRC_EXPOSED";
|
|
274
|
+
VulnerabilityCode["SENS_MED_CVS_ROOT_EXPOSED"] = "SENS_MED_CVS_ROOT_EXPOSED";
|
|
275
|
+
VulnerabilityCode["SENS_MED_CVS_ENTRIES_EXPOSED"] = "SENS_MED_CVS_ENTRIES_EXPOSED";
|
|
276
|
+
VulnerabilityCode["SENS_MED_BAZAAR_REPO_EXPOSED"] = "SENS_MED_BAZAAR_REPO_EXPOSED";
|
|
277
|
+
VulnerabilityCode["SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED"] = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED";
|
|
278
|
+
VulnerabilityCode["SENS_MED_LARAVEL_LOG_VIEWER_ENABLED"] = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED";
|
|
279
|
+
VulnerabilityCode["SENS_MED_APACHE_HTACCESS_FILE_DETECTED"] = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED";
|
|
280
|
+
VulnerabilityCode["SENS_MED_APACHE_SERVER_INFO_EXPOSED"] = "SENS_MED_APACHE_SERVER_INFO_EXPOSED";
|
|
281
|
+
VulnerabilityCode["SENS_MED_PACKAGE_DEPENDENCIES_DETECTED"] = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED";
|
|
282
|
+
VulnerabilityCode["SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED"] = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED";
|
|
283
|
+
VulnerabilityCode["SENS_MED_SSH_PUBLIC_KEY_EXPOSED"] = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED";
|
|
284
|
+
VulnerabilityCode["SENS_MED_SSL_CERTIFICATE_EXPOSED"] = "SENS_MED_SSL_CERTIFICATE_EXPOSED";
|
|
285
|
+
VulnerabilityCode["SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED"] = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED";
|
|
286
|
+
VulnerabilityCode["SENS_MED_GRAPHI_QL_EXPOSED"] = "SENS_MED_GRAPHI_QL_EXPOSED";
|
|
287
|
+
VulnerabilityCode["SENS_MED_TERRAFORM_LOCK_EXPOSED"] = "SENS_MED_TERRAFORM_LOCK_EXPOSED";
|
|
288
|
+
VulnerabilityCode["SENS_MED_ERROR_LOG_EXPOSED"] = "SENS_MED_ERROR_LOG_EXPOSED";
|
|
289
|
+
VulnerabilityCode["SENS_MED_ACCESS_LOG_EXPOSED"] = "SENS_MED_ACCESS_LOG_EXPOSED";
|
|
290
|
+
VulnerabilityCode["SENS_MED_DEBUG_LOG_EXPOSED"] = "SENS_MED_DEBUG_LOG_EXPOSED";
|
|
291
|
+
VulnerabilityCode["SENS_MED_APPLICATION_LOG_EXPOSED"] = "SENS_MED_APPLICATION_LOG_EXPOSED";
|
|
292
|
+
VulnerabilityCode["SENS_MED_WSDL_EXPOSED"] = "SENS_MED_WSDL_EXPOSED";
|
|
293
|
+
VulnerabilityCode["SENS_MED_WORD_PRESS_XML_RPC_EXPOSED"] = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED";
|
|
294
|
+
// LOW
|
|
295
|
+
VulnerabilityCode["SENS_LOW_TOML_PROJECT_FILE_EXPOSED"] = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED";
|
|
296
|
+
VulnerabilityCode["SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED";
|
|
297
|
+
VulnerabilityCode["SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED";
|
|
298
|
+
VulnerabilityCode["SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED"] = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED";
|
|
299
|
+
VulnerabilityCode["SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED"] = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED";
|
|
300
|
+
VulnerabilityCode["SENS_LOW_PYTHON_REQUIREMENTS_DETECTED"] = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED";
|
|
301
|
+
VulnerabilityCode["SENS_LOW_TEST_ENDPOINT_EXPOSED"] = "SENS_LOW_TEST_ENDPOINT_EXPOSED";
|
|
302
|
+
VulnerabilityCode["SENS_LOW_STAGING_ENDPOINT_EXPOSED"] = "SENS_LOW_STAGING_ENDPOINT_EXPOSED";
|
|
303
|
+
VulnerabilityCode["SENS_LOW_EDITOR_BACKUP_FILE_DETECTED"] = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED";
|
|
304
|
+
VulnerabilityCode["SENS_LOW_VIM_SWAP_FILE_DETECTED"] = "SENS_LOW_VIM_SWAP_FILE_DETECTED";
|
|
305
|
+
VulnerabilityCode["SENS_LOW_DIRECTORY_LISTING_ENABLED"] = "SENS_LOW_DIRECTORY_LISTING_ENABLED";
|
|
306
|
+
VulnerabilityCode["SENS_LOW_AWSSAM_TEMPLATE_EXPOSED"] = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED";
|
|
307
|
+
VulnerabilityCode["SENS_LOW_SERVERLESS_CONFIG_EXPOSED"] = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED";
|
|
308
|
+
VulnerabilityCode["SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED"] = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED";
|
|
309
|
+
// ========================================
|
|
310
|
+
// CLICKJACKING (CLICK_*)
|
|
311
|
+
// ========================================
|
|
312
|
+
VulnerabilityCode["CLICK_FRAMEABLE"] = "CLICK_FRAMEABLE";
|
|
313
|
+
VulnerabilityCode["CLICK_PARTIAL_PROTECTION"] = "CLICK_PARTIAL_PROTECTION";
|
|
314
|
+
})(VulnerabilityCode || (exports.VulnerabilityCode = VulnerabilityCode = {}));
|
|
315
|
+
exports.default = VulnerabilityCode;
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"error-codes.js","sourceRoot":"","sources":["error-codes.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,MAAM,CAAN,IAAY,iBAoUX;AApUD,WAAY,iBAAiB;IACzB,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,0DAAqC,CAAA;IACrC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,oDAA+B,CAAA;IAC/B,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,kDAA6B,CAAA;IAC7B,4DAAuC,CAAA;IACvC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IACzC,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,4DAAuC,CAAA;IACvC,sDAAiC,CAAA;IACjC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,sDAAiC,CAAA;IACjC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,uCAAuC;IACvC,2CAA2C;IAC3C,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wDAAmC,CAAA;IACnC,oDAA+B,CAAA;IAC/B,sDAAiC,CAAA;IACjC,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAE7B,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wCAAmB,CAAA;IACnB,wDAAmC,CAAA;IACnC,kEAA6C,CAAA;IAE7C,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,gDAA2B,CAAA;IAC3B,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IAEjD,2CAA2C;IAC3C,gCAAgC;IAChC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,sEAAiD,CAAA;IACjD,0CAAqB,CAAA;IAErB,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,kFAA6D,CAAA;IAC7D,oFAA+D,CAAA;IAC/D,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,wDAAmC,CAAA;IACnC,4EAAuD,CAAA;IACvD,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,kFAA6D,CAAA;IAC7D,gFAA2D,CAAA;IAC3D,wFAAmE,CAAA;IACnE,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,oEAA+C,CAAA;IAC/C,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,wEAAmD,CAAA;IACnD,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IACvC,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,gEAA2C,CAAA;IAC3C,wFAAmE,CAAA;IACnE,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAC3C,oDAA+B,CAAA;IAE/B,2CAA2C;IAC3C,mCAAmC;IACnC,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,sFAAiE,CAAA;IACjE,8EAAyD,CAAA;IACzD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,8CAAyB,CAAA;IACzB,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAC7B,kDAA6B,CAAA;IAC7B,8CAAyB,CAAA;IACzB,8CAAyB,CAAA;IAEzB,2CAA2C;IAC3C,gDAAgD;IAChD,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,oEAA+C,CAAA;IAC/C,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4CAA4C;IAC5C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4DAAuC,CAAA;IACvC,wEAAmD,CAAA;IACnD,oFAA+D,CAAA;IAC/D,wFAAmE,CAAA;IACnE,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,wEAAmD,CAAA;IACnD,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6CAA6C;IAC7C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IACjD,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,kEAA6C,CAAA;IAC7C,sEAAiD,CAAA;IACjD,oEAA+C,CAAA;IAC/C,oEAA+C,CAAA;IAC/C,gEAA2C,CAAA;IAC3C,0DAAqC,CAAA;IACrC,0EAAqD,CAAA;IAErD,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,kEAA6C,CAAA;IAC7C,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,8DAAyC,CAAA;IACzC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,kCAAkC;IAClC,2CAA2C;IAC3C,OAAO;IACP,0HAAqG,CAAA;IACrG,8FAAyE,CAAA;IACzE,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,kGAA6E,CAAA;IAC7E,oGAA+E,CAAA;IAC/E,4FAAuE,CAAA;IACvE,4EAAuD,CAAA;IACvD,gHAA2F,CAAA;IAC3F,0GAAqF,CAAA;IACrF,4GAAuF,CAAA;IACvF,4FAAuE,CAAA;IACvE,gEAA2C,CAAA;IAC3C,gFAA2D,CAAA;IAC3D,8FAAyE,CAAA;IACzE,kFAA6D,CAAA;IAC7D,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,0FAAqE,CAAA;IACrE,oFAA+D,CAAA;IAC/D,sGAAiF,CAAA;IACjF,4EAAuD,CAAA;IACvD,0FAAqE,CAAA;IACrE,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,sGAAiF,CAAA;IACjF,8EAAyD,CAAA;IACzD,SAAS;IACT,4FAAuE,CAAA;IACvE,gGAA2E,CAAA;IAC3E,wFAAmE,CAAA;IACnE,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,kFAA6D,CAAA;IAC7D,sHAAiG,CAAA;IACjG,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gHAA2F,CAAA;IAC3F,wFAAmE,CAAA;IACnE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,8EAAyD,CAAA;IACzD,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,gFAA2D,CAAA;IAC3D,8EAAyD,CAAA;IACzD,0FAAqE,CAAA;IACrE,oEAA+C,CAAA;IAC/C,gGAA2E,CAAA;IAC3E,MAAM;IACN,8FAAyE,CAAA;IACzE,oJAA+H,CAAA;IAC/H,wHAAmG,CAAA;IACnG,8GAAyF,CAAA;IACzF,4GAAuF,CAAA;IACvF,oGAA+E,CAAA;IAC/E,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,kGAA6E,CAAA;IAC7E,wFAAmE,CAAA;IACnE,8FAAyE,CAAA;IACzE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,4GAAuF,CAAA;IAEvF,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,wDAAmC,CAAA;IACnC,0EAAqD,CAAA;AACzD,CAAC,EApUW,iBAAiB,KAAjB,iBAAiB,QAoU5B;AAED,eAAe,iBAAiB,CAAC"}
|