@zerothreatai/vulnerability-registry 2.0.0 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dist/categories/authentication.js +17 -0
  2. package/dist/categories/configuration.js +501 -0
  3. package/dist/categories/injection.js +34 -0
  4. package/dist/categories/sensitive-paths.js +84 -0
  5. package/dist/categories/ssrf.js +11 -0
  6. package/dist/categories/xss.js +15 -0
  7. package/dist/category.d.ts +6 -0
  8. package/dist/category.js +15 -0
  9. package/dist/error-codes.d.ts +20 -0
  10. package/dist/error-codes.js +20 -0
  11. package/dist/index.d.ts +9 -1
  12. package/dist/index.js +5 -1
  13. package/dist/scanner.d.ts +6 -0
  14. package/dist/scanner.js +22 -0
  15. package/dist/types.d.ts +2 -0
  16. package/dist-cjs/categories/authentication.js +17 -0
  17. package/dist-cjs/categories/configuration.js +501 -0
  18. package/dist-cjs/categories/injection.js +34 -0
  19. package/dist-cjs/categories/sensitive-paths.js +84 -0
  20. package/dist-cjs/categories/ssrf.js +11 -0
  21. package/dist-cjs/categories/xss.js +15 -0
  22. package/dist-cjs/category.js +18 -0
  23. package/dist-cjs/error-codes.js +20 -0
  24. package/dist-cjs/index.js +7 -1
  25. package/dist-cjs/scanner.js +25 -0
  26. package/package.json +1 -1
  27. package/src/categories/authentication.js +54 -40
  28. package/src/categories/authentication.ts +134 -117
  29. package/src/categories/configuration.js +990 -114
  30. package/src/categories/configuration.ts +1625 -1104
  31. package/src/categories/injection.js +105 -74
  32. package/src/categories/injection.ts +129 -95
  33. package/src/categories/sensitive-paths.js +255 -174
  34. package/src/categories/sensitive-paths.ts +84 -0
  35. package/src/categories/ssrf.js +36 -28
  36. package/src/categories/ssrf.ts +11 -0
  37. package/src/categories/xss.js +47 -35
  38. package/src/categories/xss.ts +15 -0
  39. package/src/category.ts +16 -0
  40. package/src/error-codes.d.ts +38 -0
  41. package/src/error-codes.js +41 -6
  42. package/src/error-codes.ts +25 -5
  43. package/src/index.js +33 -48
  44. package/src/index.ts +20 -14
  45. package/src/scanner.ts +23 -0
  46. package/src/types.d.ts +2 -0
  47. package/src/types.js +1 -2
  48. package/src/types.ts +4 -2
  49. package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
@@ -14,6 +14,7 @@ export const CONFIG_VULNERABILITIES = {
14
14
  title: 'Missing Security Header - Content-Security-Policy',
15
15
  description: 'The application does not implement Content-Security-Policy header, leaving it vulnerable to cross-site scripting attacks that could be mitigated by restricting the sources from which scripts, styles, and other resources can be loaded into the page.',
16
16
  severity: 'medium',
17
+ levelId: 3,
17
18
  category: 'configuration',
18
19
  scanner: 'security-headers',
19
20
  cvss: {
@@ -35,6 +36,7 @@ export const CONFIG_VULNERABILITIES = {
35
36
  title: 'Missing Security Header - Strict-Transport-Security',
36
37
  description: 'The application does not implement HSTS (HTTP Strict Transport Security) header, leaving users vulnerable to SSL stripping attacks and man-in-the-middle downgrades from HTTPS to HTTP connections on initial visits or after cookie expiration.',
37
38
  severity: 'medium',
39
+ levelId: 3,
38
40
  category: 'configuration',
39
41
  scanner: 'security-headers',
40
42
  cvss: {
@@ -56,6 +58,7 @@ export const CONFIG_VULNERABILITIES = {
56
58
  title: 'HSTS Misconfiguration - Invalid Max-Age',
57
59
  description: 'The Strict-Transport-Security header uses an invalid or malformed max-age value, preventing reliable HTTPS enforcement.',
58
60
  severity: 'medium',
61
+ levelId: 3,
59
62
  category: 'configuration',
60
63
  scanner: 'security-headers',
61
64
  cvss: {
@@ -77,6 +80,7 @@ export const CONFIG_VULNERABILITIES = {
77
80
  title: 'HSTS Misconfiguration - Max-Age Too Short',
78
81
  description: 'The Strict-Transport-Security header uses a short max-age value that weakens HTTPS enforcement and allows downgrade risk to return quickly.',
79
82
  severity: 'medium',
83
+ levelId: 3,
80
84
  category: 'configuration',
81
85
  scanner: 'security-headers',
82
86
  cvss: {
@@ -98,6 +102,7 @@ export const CONFIG_VULNERABILITIES = {
98
102
  title: 'HSTS Misconfiguration - Missing includeSubDomains',
99
103
  description: 'The Strict-Transport-Security header is missing includeSubDomains, leaving subdomains unprotected from downgrade and stripping attacks.',
100
104
  severity: 'medium',
105
+ levelId: 3,
101
106
  category: 'configuration',
102
107
  scanner: 'security-headers',
103
108
  cvss: {
@@ -119,6 +124,7 @@ export const CONFIG_VULNERABILITIES = {
119
124
  title: 'HSTS Preload Requirements Not Met',
120
125
  description: 'The HSTS header indicates preload intent but does not meet preload requirements, such as a sufficiently long max-age or includeSubDomains, reducing preload effectiveness.',
121
126
  severity: 'medium',
127
+ levelId: 3,
122
128
  category: 'configuration',
123
129
  scanner: 'security-headers',
124
130
  cvss: {
@@ -140,6 +146,7 @@ export const CONFIG_VULNERABILITIES = {
140
146
  title: 'Missing Security Header - X-Frame-Options',
141
147
  description: 'The application does not set X-Frame-Options header, making it vulnerable to clickjacking attacks where malicious websites can embed the application in invisible iframes and trick users into performing unintended actions through deceptive UI overlays.',
142
148
  severity: 'medium',
149
+ levelId: 3,
143
150
  category: 'configuration',
144
151
  scanner: 'security-headers',
145
152
  cvss: {
@@ -161,6 +168,7 @@ export const CONFIG_VULNERABILITIES = {
161
168
  title: 'Weak Content-Security-Policy Configuration',
162
169
  description: 'The Content-Security-Policy header contains unsafe directives like unsafe-inline, unsafe-eval, or overly permissive source allowlists that significantly reduce its effectiveness as an XSS mitigation and may create false sense of security.',
163
170
  severity: 'medium',
171
+ levelId: 3,
164
172
  category: 'configuration',
165
173
  scanner: 'security-headers',
166
174
  cvss: {
@@ -182,6 +190,7 @@ export const CONFIG_VULNERABILITIES = {
182
190
  title: 'Content-Security-Policy Report-Only Enabled',
183
191
  description: 'The Content-Security-Policy header is deployed in report-only mode, which does not enforce protections and allows unsafe content to execute while only logging violations.',
184
192
  severity: 'medium',
193
+ levelId: 3,
185
194
  category: 'configuration',
186
195
  scanner: 'security-headers',
187
196
  cvss: {
@@ -203,6 +212,7 @@ export const CONFIG_VULNERABILITIES = {
203
212
  title: 'Content-Security-Policy Contains Unsafe Directives',
204
213
  description: 'The Content-Security-Policy header includes unsafe directives such as unsafe-inline or unsafe-eval that reduce XSS protection and allow risky script execution paths.',
205
214
  severity: 'medium',
215
+ levelId: 3,
206
216
  category: 'configuration',
207
217
  scanner: 'security-headers',
208
218
  cvss: {
@@ -224,6 +234,7 @@ export const CONFIG_VULNERABILITIES = {
224
234
  title: 'Content-Security-Policy Allows data: in script-src',
225
235
  description: 'The CSP allows data: URIs for script execution, which can enable script injection through crafted data URLs and weaken XSS protections.',
226
236
  severity: 'medium',
237
+ levelId: 3,
227
238
  category: 'configuration',
228
239
  scanner: 'security-headers',
229
240
  cvss: {
@@ -245,6 +256,7 @@ export const CONFIG_VULNERABILITIES = {
245
256
  title: 'Content-Security-Policy Allows blob: in script-src',
246
257
  description: 'The CSP allows blob: URIs for script execution, which can be abused to load attacker-controlled scripts in some contexts and weaken XSS mitigations.',
247
258
  severity: 'medium',
259
+ levelId: 3,
248
260
  category: 'configuration',
249
261
  scanner: 'security-headers',
250
262
  cvss: {
@@ -266,6 +278,7 @@ export const CONFIG_VULNERABILITIES = {
266
278
  title: 'Content-Security-Policy default-src Uses Wildcard',
267
279
  description: 'The CSP default-src directive allows all origins, which effectively disables the protection and allows untrusted content to load.',
268
280
  severity: 'medium',
281
+ levelId: 3,
269
282
  category: 'configuration',
270
283
  scanner: 'security-headers',
271
284
  cvss: {
@@ -287,6 +300,7 @@ export const CONFIG_VULNERABILITIES = {
287
300
  title: 'Content-Security-Policy Missing base-uri Directive',
288
301
  description: 'The CSP does not include a base-uri directive, allowing the base URL to be set by injected markup and enabling abuse of relative URL resolution.',
289
302
  severity: 'medium',
303
+ levelId: 3,
290
304
  category: 'configuration',
291
305
  scanner: 'security-headers',
292
306
  cvss: {
@@ -308,6 +322,7 @@ export const CONFIG_VULNERABILITIES = {
308
322
  title: 'Content-Security-Policy Missing object-src Directive',
309
323
  description: 'The CSP does not include an object-src directive, allowing embedded objects to load from arbitrary origins and weakening defense-in-depth against plugin-based risks.',
310
324
  severity: 'medium',
325
+ levelId: 3,
311
326
  category: 'configuration',
312
327
  scanner: 'security-headers',
313
328
  cvss: {
@@ -329,6 +344,7 @@ export const CONFIG_VULNERABILITIES = {
329
344
  title: 'Content-Security-Policy Missing frame-ancestors Directive',
330
345
  description: 'The CSP does not include a frame-ancestors directive, leaving pages potentially frameable and vulnerable to clickjacking attacks.',
331
346
  severity: 'medium',
347
+ levelId: 3,
332
348
  category: 'configuration',
333
349
  scanner: 'security-headers',
334
350
  cvss: {
@@ -350,6 +366,7 @@ export const CONFIG_VULNERABILITIES = {
350
366
  title: 'CORS Misconfiguration',
351
367
  description: 'Cross-Origin Resource Sharing is misconfigured with overly permissive Access-Control-Allow-Origin headers including wildcard (*) with credentials, or dynamic reflection of Origin header without proper validation, enabling cross-origin data theft.',
352
368
  severity: 'high',
369
+ levelId: 2,
353
370
  category: 'configuration',
354
371
  scanner: 'security-headers',
355
372
  cvss: {
@@ -371,6 +388,7 @@ export const CONFIG_VULNERABILITIES = {
371
388
  title: 'CORS Wildcard With Credentials',
372
389
  description: 'Access-Control-Allow-Origin is set to * while Access-Control-Allow-Credentials is enabled, which browsers block but signals a dangerous CORS policy that can be misapplied in some environments.',
373
390
  severity: 'high',
391
+ levelId: 2,
374
392
  category: 'configuration',
375
393
  scanner: 'security-headers',
376
394
  cvss: {
@@ -392,6 +410,7 @@ export const CONFIG_VULNERABILITIES = {
392
410
  title: 'CORS Origin Reflection Without Vary',
393
411
  description: 'The Origin header is reflected in Access-Control-Allow-Origin without Vary: Origin, which can lead to cache poisoning and unintended cross-origin access.',
394
412
  severity: 'high',
413
+ levelId: 2,
395
414
  category: 'configuration',
396
415
  scanner: 'security-headers',
397
416
  cvss: {
@@ -413,6 +432,7 @@ export const CONFIG_VULNERABILITIES = {
413
432
  title: 'CORS Allows Null Origin',
414
433
  description: 'Access-Control-Allow-Origin allows the null origin, enabling requests from opaque origins such as sandboxed iframes and file URLs that can be abused to access sensitive data.',
415
434
  severity: 'high',
435
+ levelId: 2,
416
436
  category: 'configuration',
417
437
  scanner: 'security-headers',
418
438
  cvss: {
@@ -434,6 +454,7 @@ export const CONFIG_VULNERABILITIES = {
434
454
  title: 'CORS Allows Wildcard Subdomains',
435
455
  description: 'CORS policies allow wildcard subdomains that can be abused if any subdomain is compromised or can be controlled by untrusted parties.',
436
456
  severity: 'high',
457
+ levelId: 2,
437
458
  category: 'configuration',
438
459
  scanner: 'security-headers',
439
460
  cvss: {
@@ -452,12 +473,454 @@ export const CONFIG_VULNERABILITIES = {
452
473
  // ========================================
453
474
  // DIRECTORY BROWSING
454
475
  // ========================================
476
+ [VulnerabilityCode.DIRBROWSE_GENERIC]: {
477
+ id: 2000,
478
+ code: VulnerabilityCode.DIRBROWSE_GENERIC,
479
+ title: 'Directory Listing Enabled (Generic)',
480
+ description: 'Directory listing is enabled and exposes directory contents to unauthenticated visitors, revealing application structure and file names.',
481
+ severity: 'low',
482
+ levelId: 4,
483
+ category: 'configuration',
484
+ scanner: 'directory-browsing',
485
+ cvss: {
486
+ score: 3.7,
487
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
488
+ severity: 'LOW',
489
+ },
490
+ cwe: [
491
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
492
+ ],
493
+ owasp: [
494
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
495
+ ],
496
+ remediation: 'Disable directory listing in the web server configuration and ensure directories have index files.',
497
+ },
498
+ [VulnerabilityCode.DIRBROWSE_GENERIC_SENSITIVE]: {
499
+ id: 2001,
500
+ code: VulnerabilityCode.DIRBROWSE_GENERIC_SENSITIVE,
501
+ title: 'Directory Listing Exposing Sensitive Content (Generic)',
502
+ description: 'Directory listing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
503
+ severity: 'medium',
504
+ levelId: 3,
505
+ category: 'configuration',
506
+ scanner: 'directory-browsing',
507
+ cvss: {
508
+ score: 5.3,
509
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
510
+ severity: 'MEDIUM',
511
+ },
512
+ cwe: [
513
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
514
+ ],
515
+ owasp: [
516
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
517
+ ],
518
+ remediation: 'Disable directory listing and remove sensitive files from web-accessible directories.',
519
+ },
520
+ [VulnerabilityCode.DIRBROWSE_APACHE]: {
521
+ id: 2002,
522
+ code: VulnerabilityCode.DIRBROWSE_APACHE,
523
+ title: 'Apache Autoindex Enabled',
524
+ description: 'Apache autoindex is enabled, exposing directory contents to unauthenticated visitors.',
525
+ severity: 'low',
526
+ levelId: 4,
527
+ category: 'configuration',
528
+ scanner: 'directory-browsing',
529
+ cvss: {
530
+ score: 3.7,
531
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
532
+ severity: 'LOW',
533
+ },
534
+ cwe: [
535
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
536
+ ],
537
+ owasp: [
538
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
539
+ ],
540
+ remediation: 'Disable autoindex in Apache (Options -Indexes) and add index files.',
541
+ },
542
+ [VulnerabilityCode.DIRBROWSE_APACHE_SENSITIVE]: {
543
+ id: 2003,
544
+ code: VulnerabilityCode.DIRBROWSE_APACHE_SENSITIVE,
545
+ title: 'Apache Autoindex Exposing Sensitive Content',
546
+ description: 'Apache autoindex is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
547
+ severity: 'medium',
548
+ levelId: 3,
549
+ category: 'configuration',
550
+ scanner: 'directory-browsing',
551
+ cvss: {
552
+ score: 5.3,
553
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
554
+ severity: 'MEDIUM',
555
+ },
556
+ cwe: [
557
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
558
+ ],
559
+ owasp: [
560
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
561
+ ],
562
+ remediation: 'Disable autoindex and remove sensitive files from web-accessible directories.',
563
+ },
564
+ [VulnerabilityCode.DIRBROWSE_NGINX]: {
565
+ id: 2004,
566
+ code: VulnerabilityCode.DIRBROWSE_NGINX,
567
+ title: 'Nginx Autoindex Enabled',
568
+ description: 'Nginx autoindex is enabled, exposing directory contents to unauthenticated visitors.',
569
+ severity: 'low',
570
+ levelId: 4,
571
+ category: 'configuration',
572
+ scanner: 'directory-browsing',
573
+ cvss: {
574
+ score: 3.7,
575
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
576
+ severity: 'LOW',
577
+ },
578
+ cwe: [
579
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
580
+ ],
581
+ owasp: [
582
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
583
+ ],
584
+ remediation: 'Disable autoindex in nginx (autoindex off) and add index files.',
585
+ },
586
+ [VulnerabilityCode.DIRBROWSE_NGINX_SENSITIVE]: {
587
+ id: 2005,
588
+ code: VulnerabilityCode.DIRBROWSE_NGINX_SENSITIVE,
589
+ title: 'Nginx Autoindex Exposing Sensitive Content',
590
+ description: 'Nginx autoindex is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
591
+ severity: 'medium',
592
+ levelId: 3,
593
+ category: 'configuration',
594
+ scanner: 'directory-browsing',
595
+ cvss: {
596
+ score: 5.3,
597
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
598
+ severity: 'MEDIUM',
599
+ },
600
+ cwe: [
601
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
602
+ ],
603
+ owasp: [
604
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
605
+ ],
606
+ remediation: 'Disable autoindex and remove sensitive files from web-accessible directories.',
607
+ },
608
+ [VulnerabilityCode.DIRBROWSE_IIS]: {
609
+ id: 2006,
610
+ code: VulnerabilityCode.DIRBROWSE_IIS,
611
+ title: 'IIS Directory Browsing Enabled',
612
+ description: 'IIS directory browsing is enabled, exposing directory contents to unauthenticated visitors.',
613
+ severity: 'low',
614
+ levelId: 4,
615
+ category: 'configuration',
616
+ scanner: 'directory-browsing',
617
+ cvss: {
618
+ score: 3.7,
619
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
620
+ severity: 'LOW',
621
+ },
622
+ cwe: [
623
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
624
+ ],
625
+ owasp: [
626
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
627
+ ],
628
+ remediation: 'Disable directory browsing in IIS and ensure directories have index files.',
629
+ },
630
+ [VulnerabilityCode.DIRBROWSE_IIS_SENSITIVE]: {
631
+ id: 2007,
632
+ code: VulnerabilityCode.DIRBROWSE_IIS_SENSITIVE,
633
+ title: 'IIS Directory Browsing Exposing Sensitive Content',
634
+ description: 'IIS directory browsing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
635
+ severity: 'medium',
636
+ levelId: 3,
637
+ category: 'configuration',
638
+ scanner: 'directory-browsing',
639
+ cvss: {
640
+ score: 5.3,
641
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
642
+ severity: 'MEDIUM',
643
+ },
644
+ cwe: [
645
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
646
+ ],
647
+ owasp: [
648
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
649
+ ],
650
+ remediation: 'Disable directory browsing and remove sensitive files from web-accessible directories.',
651
+ },
652
+ [VulnerabilityCode.DIRBROWSE_TOMCAT]: {
653
+ id: 2008,
654
+ code: VulnerabilityCode.DIRBROWSE_TOMCAT,
655
+ title: 'Tomcat Directory Listing Enabled',
656
+ description: 'Tomcat directory listing is enabled, exposing directory contents to unauthenticated visitors.',
657
+ severity: 'low',
658
+ levelId: 4,
659
+ category: 'configuration',
660
+ scanner: 'directory-browsing',
661
+ cvss: {
662
+ score: 3.7,
663
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
664
+ severity: 'LOW',
665
+ },
666
+ cwe: [
667
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
668
+ ],
669
+ owasp: [
670
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
671
+ ],
672
+ remediation: 'Disable directory listings in Tomcat and add index files to web directories.',
673
+ },
674
+ [VulnerabilityCode.DIRBROWSE_TOMCAT_SENSITIVE]: {
675
+ id: 2009,
676
+ code: VulnerabilityCode.DIRBROWSE_TOMCAT_SENSITIVE,
677
+ title: 'Tomcat Directory Listing Exposing Sensitive Content',
678
+ description: 'Tomcat directory listing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
679
+ severity: 'medium',
680
+ levelId: 3,
681
+ category: 'configuration',
682
+ scanner: 'directory-browsing',
683
+ cvss: {
684
+ score: 5.3,
685
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
686
+ severity: 'MEDIUM',
687
+ },
688
+ cwe: [
689
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
690
+ ],
691
+ owasp: [
692
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
693
+ ],
694
+ remediation: 'Disable directory listings and remove sensitive files from web-accessible directories.',
695
+ },
696
+ [VulnerabilityCode.DIRBROWSE_CADDY]: {
697
+ id: 2010,
698
+ code: VulnerabilityCode.DIRBROWSE_CADDY,
699
+ title: 'Caddy File Server Browsing Enabled',
700
+ description: 'Caddy file server browsing is enabled, exposing directory contents to unauthenticated visitors.',
701
+ severity: 'low',
702
+ levelId: 4,
703
+ category: 'configuration',
704
+ scanner: 'directory-browsing',
705
+ cvss: {
706
+ score: 3.7,
707
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
708
+ severity: 'LOW',
709
+ },
710
+ cwe: [
711
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
712
+ ],
713
+ owasp: [
714
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
715
+ ],
716
+ remediation: 'Disable file_server browse in Caddy or restrict browsing to trusted users.',
717
+ },
718
+ [VulnerabilityCode.DIRBROWSE_CADDY_SENSITIVE]: {
719
+ id: 2011,
720
+ code: VulnerabilityCode.DIRBROWSE_CADDY_SENSITIVE,
721
+ title: 'Caddy File Server Browsing Exposing Sensitive Content',
722
+ description: 'Caddy file server browsing is enabled on a directory containing sensitive files such as backups, credentials, or configuration artifacts.',
723
+ severity: 'medium',
724
+ levelId: 3,
725
+ category: 'configuration',
726
+ scanner: 'directory-browsing',
727
+ cvss: {
728
+ score: 5.3,
729
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
730
+ severity: 'MEDIUM',
731
+ },
732
+ cwe: [
733
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
734
+ ],
735
+ owasp: [
736
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
737
+ ],
738
+ remediation: 'Disable file_server browse and remove sensitive files from web-accessible directories.',
739
+ },
740
+ [VulnerabilityCode.DIRBROWSE_WEBDAV]: {
741
+ id: 2012,
742
+ code: VulnerabilityCode.DIRBROWSE_WEBDAV,
743
+ title: 'WebDAV Directory Listing Enabled',
744
+ description: 'WebDAV responses expose directory contents, allowing unauthenticated browsing of files and folders.',
745
+ severity: 'low',
746
+ levelId: 4,
747
+ category: 'configuration',
748
+ scanner: 'directory-browsing',
749
+ cvss: {
750
+ score: 3.7,
751
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
752
+ severity: 'LOW',
753
+ },
754
+ cwe: [
755
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
756
+ ],
757
+ owasp: [
758
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
759
+ ],
760
+ remediation: 'Disable unauthenticated WebDAV browsing or restrict access with authentication and authorization.',
761
+ },
762
+ [VulnerabilityCode.DIRBROWSE_WEBDAV_SENSITIVE]: {
763
+ id: 2013,
764
+ code: VulnerabilityCode.DIRBROWSE_WEBDAV_SENSITIVE,
765
+ title: 'WebDAV Directory Listing Exposing Sensitive Content',
766
+ description: 'WebDAV responses expose directories containing sensitive files such as backups, credentials, or configuration artifacts.',
767
+ severity: 'medium',
768
+ levelId: 3,
769
+ category: 'configuration',
770
+ scanner: 'directory-browsing',
771
+ cvss: {
772
+ score: 5.3,
773
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
774
+ severity: 'MEDIUM',
775
+ },
776
+ cwe: [
777
+ { id: 'CWE-548', name: 'Directory Listing', url: 'https://cwe.mitre.org/data/definitions/548.html' },
778
+ ],
779
+ owasp: [
780
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
781
+ ],
782
+ remediation: 'Disable unauthenticated WebDAV browsing and remove sensitive files from exposed directories.',
783
+ },
784
+ [VulnerabilityCode.DIRBROWSE_S3]: {
785
+ id: 2014,
786
+ code: VulnerabilityCode.DIRBROWSE_S3,
787
+ title: 'S3 Bucket Listing Enabled',
788
+ description: 'An S3 bucket listing is exposed, allowing unauthenticated enumeration of object keys.',
789
+ severity: 'low',
790
+ levelId: 4,
791
+ category: 'configuration',
792
+ scanner: 'directory-browsing',
793
+ cvss: {
794
+ score: 3.7,
795
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
796
+ severity: 'LOW',
797
+ },
798
+ cwe: [
799
+ { id: 'CWE-200', name: 'Exposure of Sensitive Information to an Unauthorized Actor', url: 'https://cwe.mitre.org/data/definitions/200.html' },
800
+ ],
801
+ owasp: [
802
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
803
+ ],
804
+ remediation: 'Disable public ListBucket access and restrict bucket policies to authorized principals.',
805
+ },
806
+ [VulnerabilityCode.DIRBROWSE_S3_SENSITIVE]: {
807
+ id: 2015,
808
+ code: VulnerabilityCode.DIRBROWSE_S3_SENSITIVE,
809
+ title: 'S3 Bucket Listing Exposing Sensitive Content',
810
+ description: 'An S3 bucket listing is exposed and includes sensitive objects such as backups, credentials, or configuration artifacts.',
811
+ severity: 'medium',
812
+ levelId: 3,
813
+ category: 'configuration',
814
+ scanner: 'directory-browsing',
815
+ cvss: {
816
+ score: 5.3,
817
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
818
+ severity: 'MEDIUM',
819
+ },
820
+ cwe: [
821
+ { id: 'CWE-200', name: 'Exposure of Sensitive Information to an Unauthorized Actor', url: 'https://cwe.mitre.org/data/definitions/200.html' },
822
+ ],
823
+ owasp: [
824
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
825
+ ],
826
+ remediation: 'Remove public ListBucket access and rotate any exposed credentials or secrets.',
827
+ },
828
+ [VulnerabilityCode.DIRBROWSE_GCS]: {
829
+ id: 2016,
830
+ code: VulnerabilityCode.DIRBROWSE_GCS,
831
+ title: 'GCS Bucket Listing Enabled',
832
+ description: 'A Google Cloud Storage bucket listing is exposed, allowing unauthenticated enumeration of object keys.',
833
+ severity: 'low',
834
+ levelId: 4,
835
+ category: 'configuration',
836
+ scanner: 'directory-browsing',
837
+ cvss: {
838
+ score: 3.7,
839
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
840
+ severity: 'LOW',
841
+ },
842
+ cwe: [
843
+ { id: 'CWE-200', name: 'Exposure of Sensitive Information to an Unauthorized Actor', url: 'https://cwe.mitre.org/data/definitions/200.html' },
844
+ ],
845
+ owasp: [
846
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
847
+ ],
848
+ remediation: 'Restrict bucket IAM policies to authorized principals and disable anonymous listing.',
849
+ },
850
+ [VulnerabilityCode.DIRBROWSE_GCS_SENSITIVE]: {
851
+ id: 2017,
852
+ code: VulnerabilityCode.DIRBROWSE_GCS_SENSITIVE,
853
+ title: 'GCS Bucket Listing Exposing Sensitive Content',
854
+ description: 'A Google Cloud Storage bucket listing is exposed and includes sensitive objects such as backups, credentials, or configuration artifacts.',
855
+ severity: 'medium',
856
+ levelId: 3,
857
+ category: 'configuration',
858
+ scanner: 'directory-browsing',
859
+ cvss: {
860
+ score: 5.3,
861
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
862
+ severity: 'MEDIUM',
863
+ },
864
+ cwe: [
865
+ { id: 'CWE-200', name: 'Exposure of Sensitive Information to an Unauthorized Actor', url: 'https://cwe.mitre.org/data/definitions/200.html' },
866
+ ],
867
+ owasp: [
868
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
869
+ ],
870
+ remediation: 'Remove public listing access and rotate any exposed credentials or secrets.',
871
+ },
872
+ [VulnerabilityCode.DIRBROWSE_AZURE_BLOB]: {
873
+ id: 2018,
874
+ code: VulnerabilityCode.DIRBROWSE_AZURE_BLOB,
875
+ title: 'Azure Blob Container Listing Enabled',
876
+ description: 'An Azure Blob container listing is exposed, allowing unauthenticated enumeration of blob names.',
877
+ severity: 'low',
878
+ levelId: 4,
879
+ category: 'configuration',
880
+ scanner: 'directory-browsing',
881
+ cvss: {
882
+ score: 3.7,
883
+ vector: 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N',
884
+ severity: 'LOW',
885
+ },
886
+ cwe: [
887
+ { id: 'CWE-200', name: 'Exposure of Sensitive Information to an Unauthorized Actor', url: 'https://cwe.mitre.org/data/definitions/200.html' },
888
+ ],
889
+ owasp: [
890
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
891
+ ],
892
+ remediation: 'Disable public container listing and restrict access via SAS tokens or RBAC.',
893
+ },
894
+ [VulnerabilityCode.DIRBROWSE_AZURE_BLOB_SENSITIVE]: {
895
+ id: 2019,
896
+ code: VulnerabilityCode.DIRBROWSE_AZURE_BLOB_SENSITIVE,
897
+ title: 'Azure Blob Container Listing Exposing Sensitive Content',
898
+ description: 'An Azure Blob container listing is exposed and includes sensitive blobs such as backups, credentials, or configuration artifacts.',
899
+ severity: 'medium',
900
+ levelId: 3,
901
+ category: 'configuration',
902
+ scanner: 'directory-browsing',
903
+ cvss: {
904
+ score: 5.3,
905
+ vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N',
906
+ severity: 'MEDIUM',
907
+ },
908
+ cwe: [
909
+ { id: 'CWE-200', name: 'Exposure of Sensitive Information to an Unauthorized Actor', url: 'https://cwe.mitre.org/data/definitions/200.html' },
910
+ ],
911
+ owasp: [
912
+ { id: 'A05:2021', name: 'Security Misconfiguration', url: 'https://owasp.org/Top10/A05_2021-Security_Misconfiguration/' },
913
+ ],
914
+ remediation: 'Remove public listing access and rotate any exposed credentials or secrets.',
915
+ },
916
+ // Legacy generic codes (keep for backward compatibility)
455
917
  [VulnerabilityCode.DIRBROWSE_ENABLED]: {
456
918
  id: 74,
457
919
  code: VulnerabilityCode.DIRBROWSE_ENABLED,
458
920
  title: 'Directory Listing Enabled',
459
921
  description: 'Web server directory listing is enabled, exposing the contents of directories to anyone who browses to them without an index file. This reveals application structure, backup files, configuration files, and potentially sensitive data to attackers.',
460
922
  severity: 'low',
923
+ levelId: 4,
461
924
  category: 'configuration',
462
925
  scanner: 'directory-browsing',
463
926
  cvss: {
@@ -479,6 +942,7 @@ export const CONFIG_VULNERABILITIES = {
479
942
  title: 'Directory Listing Exposing Sensitive Content',
480
943
  description: 'Directory listing is enabled on a directory containing sensitive files like backups, configuration files, source code, or credentials. This elevates the risk significantly as attackers can directly access sensitive information without guessing filenames.',
481
944
  severity: 'medium',
945
+ levelId: 3,
482
946
  category: 'configuration',
483
947
  scanner: 'directory-browsing',
484
948
  cvss: {
@@ -503,6 +967,7 @@ export const CONFIG_VULNERABILITIES = {
503
967
  title: 'Clickjacking - Page Frameable',
504
968
  description: 'The application pages can be embedded in iframes on malicious websites, enabling clickjacking attacks where attackers overlay transparent frames over deceptive UI elements to trick users into clicking hidden buttons or links that perform unintended actions.',
505
969
  severity: 'medium',
970
+ levelId: 3,
506
971
  category: 'configuration',
507
972
  scanner: 'security-headers',
508
973
  cvss: {
@@ -527,6 +992,7 @@ export const CONFIG_VULNERABILITIES = {
527
992
  title: 'Insecure Deserialization - Java',
528
993
  description: 'Critical Java deserialization vulnerability where untrusted serialized objects are processed, allowing attackers to achieve remote code execution through gadget chains in common libraries like Apache Commons Collections, Spring Framework, or other classpath dependencies.',
529
994
  severity: 'critical',
995
+ levelId: 1,
530
996
  category: 'injection',
531
997
  scanner: 'deserialization',
532
998
  cvss: {
@@ -548,6 +1014,7 @@ export const CONFIG_VULNERABILITIES = {
548
1014
  title: 'Insecure Deserialization - PHP',
549
1015
  description: 'Critical PHP deserialization vulnerability where unserialize() processes attacker-controlled data, enabling object injection attacks through magic methods like __wakeup(), __destruct(), or __toString() in application or framework classes for remote code execution.',
550
1016
  severity: 'critical',
1017
+ levelId: 1,
551
1018
  category: 'injection',
552
1019
  scanner: 'deserialization',
553
1020
  cvss: {
@@ -569,6 +1036,7 @@ export const CONFIG_VULNERABILITIES = {
569
1036
  title: 'Insecure Deserialization - Python',
570
1037
  description: 'Critical Python deserialization vulnerability through pickle/cPickle processing of untrusted data, enabling remote code execution via __reduce__ method exploitation. Python pickle is inherently unsafe and should never process untrusted input.',
571
1038
  severity: 'critical',
1039
+ levelId: 1,
572
1040
  category: 'injection',
573
1041
  scanner: 'deserialization',
574
1042
  cvss: {
@@ -590,6 +1058,7 @@ export const CONFIG_VULNERABILITIES = {
590
1058
  title: 'Insecure Deserialization - .NET',
591
1059
  description: 'Critical .NET deserialization vulnerability through BinaryFormatter, ObjectStateFormatter, LosFormatter, or other dangerous formatters processing untrusted data, enabling remote code execution through gadget chains in the .NET runtime or third-party libraries.',
592
1060
  severity: 'critical',
1061
+ levelId: 1,
593
1062
  category: 'injection',
594
1063
  scanner: 'deserialization',
595
1064
  cvss: {
@@ -611,6 +1080,7 @@ export const CONFIG_VULNERABILITIES = {
611
1080
  title: 'Insecure Deserialization - Ruby',
612
1081
  description: 'Critical Ruby deserialization vulnerability through Marshal.load or YAML.load processing untrusted data, enabling remote code execution through Ruby object instantiation gadgets that execute arbitrary code during object reconstruction.',
613
1082
  severity: 'critical',
1083
+ levelId: 1,
614
1084
  category: 'injection',
615
1085
  scanner: 'deserialization',
616
1086
  cvss: {
@@ -632,6 +1102,7 @@ export const CONFIG_VULNERABILITIES = {
632
1102
  title: 'Insecure Deserialization - Node.js',
633
1103
  description: 'Critical Node.js deserialization vulnerability through node-serialize, funcster, or similar libraries that execute JavaScript during deserialization, enabling remote code execution when attacker-controlled serialized data containing functions or IIFE is processed.',
634
1104
  severity: 'critical',
1105
+ levelId: 1,
635
1106
  category: 'injection',
636
1107
  scanner: 'deserialization',
637
1108
  cvss: {
@@ -653,6 +1124,7 @@ export const CONFIG_VULNERABILITIES = {
653
1124
  title: 'Clickjacking - Partial Protection',
654
1125
  description: 'Incomplete clickjacking protection where X-Frame-Options or frame-ancestors CSP is only applied on some pages, uses weak values like ALLOW-FROM with bypassable origins, or has inconsistent implementation allowing certain pages to be framed.',
655
1126
  severity: 'low',
1127
+ levelId: 4,
656
1128
  category: 'configuration',
657
1129
  scanner: 'security-headers',
658
1130
  cvss: {
@@ -674,6 +1146,7 @@ export const CONFIG_VULNERABILITIES = {
674
1146
  title: 'Missing Security Header - X-Content-Type-Options',
675
1147
  description: 'The application does not set X-Content-Type-Options: nosniff header, allowing browsers to perform MIME-type sniffing that can lead to XSS attacks when user-uploaded content is served with incorrect Content-Type and browsers execute it as script.',
676
1148
  severity: 'low',
1149
+ levelId: 4,
677
1150
  category: 'configuration',
678
1151
  scanner: 'security-headers',
679
1152
  cvss: {
@@ -695,6 +1168,7 @@ export const CONFIG_VULNERABILITIES = {
695
1168
  title: 'Invalid Security Header - X-Content-Type-Options',
696
1169
  description: 'The X-Content-Type-Options header is present but misconfigured (not set to nosniff), which can allow MIME sniffing and reduce protection against content-type confusion.',
697
1170
  severity: 'low',
1171
+ levelId: 4,
698
1172
  category: 'configuration',
699
1173
  scanner: 'security-headers',
700
1174
  cvss: {
@@ -716,6 +1190,7 @@ export const CONFIG_VULNERABILITIES = {
716
1190
  title: 'Missing Security Header - Referrer-Policy',
717
1191
  description: 'The application does not implement Referrer-Policy header, potentially leaking sensitive URL information including session tokens, user IDs, or query parameters to external sites when users click links or resources are loaded from third-party domains.',
718
1192
  severity: 'low',
1193
+ levelId: 4,
719
1194
  category: 'configuration',
720
1195
  scanner: 'security-headers',
721
1196
  cvss: {
@@ -737,6 +1212,7 @@ export const CONFIG_VULNERABILITIES = {
737
1212
  title: 'Unsafe Referrer-Policy Configuration',
738
1213
  description: 'The Referrer-Policy header is set to a permissive value that can leak full URLs and sensitive query parameters to external origins.',
739
1214
  severity: 'low',
1215
+ levelId: 4,
740
1216
  category: 'configuration',
741
1217
  scanner: 'security-headers',
742
1218
  cvss: {
@@ -758,6 +1234,7 @@ export const CONFIG_VULNERABILITIES = {
758
1234
  title: 'Missing Security Header - Permissions-Policy',
759
1235
  description: 'The application does not implement Permissions-Policy (formerly Feature-Policy) header, allowing embedded frames or malicious scripts to access sensitive browser features like camera, microphone, geolocation, or payment APIs without explicit permission.',
760
1236
  severity: 'info',
1237
+ levelId: 5,
761
1238
  category: 'configuration',
762
1239
  scanner: 'security-headers',
763
1240
  cvss: {
@@ -779,6 +1256,7 @@ export const CONFIG_VULNERABILITIES = {
779
1256
  title: 'Missing Security Header - X-XSS-Protection',
780
1257
  description: 'The legacy X-XSS-Protection header is not set. While deprecated in modern browsers, it can provide defense-in-depth for older browsers that still honor this header for their built-in XSS auditor feature.',
781
1258
  severity: 'info',
1259
+ levelId: 5,
782
1260
  category: 'configuration',
783
1261
  scanner: 'security-headers',
784
1262
  cvss: {
@@ -800,6 +1278,7 @@ export const CONFIG_VULNERABILITIES = {
800
1278
  title: 'Header Misconfiguration - COEP Without COOP',
801
1279
  description: 'Cross-Origin-Embedder-Policy (COEP) is set without Cross-Origin-Opener-Policy (COOP), which can create inconsistent cross-origin isolation behavior and indicate incomplete or misapplied security header strategy for isolation-sensitive applications.',
802
1280
  severity: 'info',
1281
+ levelId: 5,
803
1282
  category: 'configuration',
804
1283
  scanner: 'security-headers',
805
1284
  cvss: {
@@ -821,6 +1300,7 @@ export const CONFIG_VULNERABILITIES = {
821
1300
  title: 'Header Misconfiguration - Unusual CORP Value',
822
1301
  description: 'Cross-Origin-Resource-Policy (CORP) is set to a non-standard value, which may indicate a misconfiguration that provides no effective protection or creates unpredictable resource loading behavior across origins.',
823
1302
  severity: 'info',
1303
+ levelId: 5,
824
1304
  category: 'configuration',
825
1305
  scanner: 'security-headers',
826
1306
  cvss: {
@@ -842,6 +1322,7 @@ export const CONFIG_VULNERABILITIES = {
842
1322
  title: 'Deprecated Header - Expect-CT Present',
843
1323
  description: 'The Expect-CT header is present even though the feature is deprecated and no longer enforced by major browsers, adding unnecessary configuration surface without meaningful security benefit.',
844
1324
  severity: 'info',
1325
+ levelId: 5,
845
1326
  category: 'configuration',
846
1327
  scanner: 'security-headers',
847
1328
  cvss: {
@@ -863,6 +1344,7 @@ export const CONFIG_VULNERABILITIES = {
863
1344
  title: 'Information Exposure - Server Header Present',
864
1345
  description: 'The Server header reveals technology or version details that can assist attackers with fingerprinting and targeted exploitation, increasing the likelihood of tailored attacks against known software weaknesses.',
865
1346
  severity: 'info',
1347
+ levelId: 5,
866
1348
  category: 'configuration',
867
1349
  scanner: 'security-headers',
868
1350
  cvss: {
@@ -884,6 +1366,7 @@ export const CONFIG_VULNERABILITIES = {
884
1366
  title: 'Information Exposure - X-Powered-By Present',
885
1367
  description: 'The X-Powered-By header discloses framework or runtime information that can be used to fingerprint the application stack and target known vulnerabilities in specific platforms or versions.',
886
1368
  severity: 'info',
1369
+ levelId: 5,
887
1370
  category: 'configuration',
888
1371
  scanner: 'security-headers',
889
1372
  cvss: {
@@ -905,6 +1388,7 @@ export const CONFIG_VULNERABILITIES = {
905
1388
  title: 'Deprecated Header - X-XSS-Protection Enabled',
906
1389
  description: 'The X-XSS-Protection header is enabled, which is deprecated and can introduce security risks or inconsistent behavior in legacy browsers due to the removed XSS auditor feature.',
907
1390
  severity: 'low',
1391
+ levelId: 4,
908
1392
  category: 'configuration',
909
1393
  scanner: 'security-headers',
910
1394
  cvss: {
@@ -926,6 +1410,7 @@ export const CONFIG_VULNERABILITIES = {
926
1410
  title: 'Cookie Misconfiguration - SameSite=None Without Secure',
927
1411
  description: 'A cookie is configured with SameSite=None but lacks the Secure attribute, enabling cross-site transmission over unencrypted connections and undermining cookie integrity and confidentiality controls.',
928
1412
  severity: 'medium',
1413
+ levelId: 3,
929
1414
  category: 'configuration',
930
1415
  scanner: 'security-headers',
931
1416
  cvss: {
@@ -947,6 +1432,7 @@ export const CONFIG_VULNERABILITIES = {
947
1432
  title: 'Cookie Misconfiguration - Session Cookie Missing Secure',
948
1433
  description: 'Session or authentication cookies are missing the Secure attribute, allowing them to be transmitted over unencrypted connections and increasing the risk of session hijacking or credential theft.',
949
1434
  severity: 'high',
1435
+ levelId: 2,
950
1436
  category: 'configuration',
951
1437
  scanner: 'security-headers',
952
1438
  cvss: {
@@ -968,6 +1454,7 @@ export const CONFIG_VULNERABILITIES = {
968
1454
  title: 'Cookie Misconfiguration - Missing Secure Attribute',
969
1455
  description: 'Cookies are set without the Secure attribute, permitting transmission over plaintext HTTP and exposing cookie contents to network interception or manipulation.',
970
1456
  severity: 'medium',
1457
+ levelId: 3,
971
1458
  category: 'configuration',
972
1459
  scanner: 'security-headers',
973
1460
  cvss: {
@@ -989,6 +1476,7 @@ export const CONFIG_VULNERABILITIES = {
989
1476
  title: 'Cookie Misconfiguration - Session Cookie Missing HttpOnly',
990
1477
  description: 'Session or authentication cookies are missing the HttpOnly attribute, allowing client-side scripts to access sensitive cookie values and increasing the impact of XSS attacks.',
991
1478
  severity: 'high',
1479
+ levelId: 2,
992
1480
  category: 'configuration',
993
1481
  scanner: 'security-headers',
994
1482
  cvss: {
@@ -1010,6 +1498,7 @@ export const CONFIG_VULNERABILITIES = {
1010
1498
  title: 'Cookie Misconfiguration - Missing HttpOnly Attribute',
1011
1499
  description: 'Cookies are missing the HttpOnly attribute, allowing JavaScript access to cookie values and increasing the potential impact of client-side script injection.',
1012
1500
  severity: 'medium',
1501
+ levelId: 3,
1013
1502
  category: 'configuration',
1014
1503
  scanner: 'security-headers',
1015
1504
  cvss: {
@@ -1031,6 +1520,7 @@ export const CONFIG_VULNERABILITIES = {
1031
1520
  title: 'Cookie Misconfiguration - Missing SameSite Attribute',
1032
1521
  description: 'Cookies do not specify SameSite, which can allow cross-site requests to include cookies by default and increase exposure to CSRF-style attacks or cross-site leakage.',
1033
1522
  severity: 'medium',
1523
+ levelId: 3,
1034
1524
  category: 'configuration',
1035
1525
  scanner: 'security-headers',
1036
1526
  cvss: {
@@ -1052,6 +1542,7 @@ export const CONFIG_VULNERABILITIES = {
1052
1542
  title: 'Cookie Misconfiguration - __Host- Prefix Violations',
1053
1543
  description: 'Cookies with the __Host- prefix do not meet required attributes (Secure, Path=/, no Domain), weakening the protections provided by host-only cookie semantics.',
1054
1544
  severity: 'medium',
1545
+ levelId: 3,
1055
1546
  category: 'configuration',
1056
1547
  scanner: 'security-headers',
1057
1548
  cvss: {
@@ -1073,6 +1564,7 @@ export const CONFIG_VULNERABILITIES = {
1073
1564
  title: 'Cookie Misconfiguration - __Secure- Prefix Violations',
1074
1565
  description: 'Cookies with the __Secure- prefix are missing the Secure attribute, which defeats the prefix requirement and weakens transport security protections.',
1075
1566
  severity: 'medium',
1567
+ levelId: 3,
1076
1568
  category: 'configuration',
1077
1569
  scanner: 'security-headers',
1078
1570
  cvss: {
@@ -1094,6 +1586,7 @@ export const CONFIG_VULNERABILITIES = {
1094
1586
  title: 'Header Drift - Content-Security-Policy Inconsistent',
1095
1587
  description: 'Content-Security-Policy is present on some paths but missing on others, creating uneven defenses and potentially exposing unprotected routes to script injection or content loading risks.',
1096
1588
  severity: 'low',
1589
+ levelId: 4,
1097
1590
  category: 'configuration',
1098
1591
  scanner: 'security-headers',
1099
1592
  cvss: {
@@ -1115,6 +1608,7 @@ export const CONFIG_VULNERABILITIES = {
1115
1608
  title: 'Header Drift - Strict-Transport-Security Inconsistent',
1116
1609
  description: 'Strict-Transport-Security is present on some paths but missing on others, reducing the effectiveness of HTTPS enforcement and creating mixed transport behavior across the site.',
1117
1610
  severity: 'low',
1611
+ levelId: 4,
1118
1612
  category: 'configuration',
1119
1613
  scanner: 'security-headers',
1120
1614
  cvss: {
@@ -1136,6 +1630,7 @@ export const CONFIG_VULNERABILITIES = {
1136
1630
  title: 'Header Drift - X-Content-Type-Options Inconsistent',
1137
1631
  description: 'X-Content-Type-Options is present on some paths but missing on others, allowing inconsistent MIME sniffing behavior that could expose unprotected routes to content-type confusion.',
1138
1632
  severity: 'low',
1633
+ levelId: 4,
1139
1634
  category: 'configuration',
1140
1635
  scanner: 'security-headers',
1141
1636
  cvss: {
@@ -1157,6 +1652,7 @@ export const CONFIG_VULNERABILITIES = {
1157
1652
  title: 'Header Drift - Referrer-Policy Inconsistent',
1158
1653
  description: 'Referrer-Policy is present on some paths but missing on others, leading to inconsistent referrer leakage controls and potential exposure of sensitive URL data.',
1159
1654
  severity: 'low',
1655
+ levelId: 4,
1160
1656
  category: 'configuration',
1161
1657
  scanner: 'security-headers',
1162
1658
  cvss: {
@@ -1178,6 +1674,7 @@ export const CONFIG_VULNERABILITIES = {
1178
1674
  title: 'Header Drift - X-Frame-Options Inconsistent',
1179
1675
  description: 'X-Frame-Options or equivalent framing controls are present on some paths but missing on others, creating uneven clickjacking protection across the site.',
1180
1676
  severity: 'low',
1677
+ levelId: 4,
1181
1678
  category: 'configuration',
1182
1679
  scanner: 'security-headers',
1183
1680
  cvss: {
@@ -1199,6 +1696,7 @@ export const CONFIG_VULNERABILITIES = {
1199
1696
  title: 'Header Drift - Permissions-Policy Inconsistent',
1200
1697
  description: 'Permissions-Policy is present on some paths but missing on others, leading to inconsistent controls over browser features such as geolocation, camera, or microphone.',
1201
1698
  severity: 'low',
1699
+ levelId: 4,
1202
1700
  category: 'configuration',
1203
1701
  scanner: 'security-headers',
1204
1702
  cvss: {
@@ -1220,6 +1718,7 @@ export const CONFIG_VULNERABILITIES = {
1220
1718
  title: 'Header Drift - COOP Inconsistent',
1221
1719
  description: 'Cross-Origin-Opener-Policy is present on some paths but missing on others, which can lead to uneven cross-origin isolation guarantees and inconsistent window isolation behavior.',
1222
1720
  severity: 'low',
1721
+ levelId: 4,
1223
1722
  category: 'configuration',
1224
1723
  scanner: 'security-headers',
1225
1724
  cvss: {
@@ -1241,6 +1740,7 @@ export const CONFIG_VULNERABILITIES = {
1241
1740
  title: 'Header Drift - COEP Inconsistent',
1242
1741
  description: 'Cross-Origin-Embedder-Policy is present on some paths but missing on others, resulting in inconsistent embedding restrictions and cross-origin isolation posture.',
1243
1742
  severity: 'low',
1743
+ levelId: 4,
1244
1744
  category: 'configuration',
1245
1745
  scanner: 'security-headers',
1246
1746
  cvss: {
@@ -1262,6 +1762,7 @@ export const CONFIG_VULNERABILITIES = {
1262
1762
  title: 'Header Drift - CORP Inconsistent',
1263
1763
  description: 'Cross-Origin-Resource-Policy is present on some paths but missing on others, which can leave inconsistent controls on resource sharing and embedding across the application.',
1264
1764
  severity: 'low',
1765
+ levelId: 4,
1265
1766
  category: 'configuration',
1266
1767
  scanner: 'security-headers',
1267
1768
  cvss: {