@zerothreatai/vulnerability-registry 3.0.0 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dist/categories/authentication.js +17 -0
  2. package/dist/categories/configuration.js +501 -0
  3. package/dist/categories/injection.js +34 -0
  4. package/dist/categories/sensitive-paths.js +84 -0
  5. package/dist/categories/ssrf.js +11 -0
  6. package/dist/categories/xss.js +15 -0
  7. package/dist/category.d.ts +6 -0
  8. package/dist/category.js +15 -0
  9. package/dist/error-codes.d.ts +20 -0
  10. package/dist/error-codes.js +20 -0
  11. package/dist/index.d.ts +9 -1
  12. package/dist/index.js +5 -1
  13. package/dist/scanner.d.ts +6 -0
  14. package/dist/scanner.js +22 -0
  15. package/dist/types.d.ts +2 -0
  16. package/dist-cjs/categories/authentication.js +17 -0
  17. package/dist-cjs/categories/configuration.js +501 -0
  18. package/dist-cjs/categories/injection.js +34 -0
  19. package/dist-cjs/categories/sensitive-paths.js +84 -0
  20. package/dist-cjs/categories/ssrf.js +11 -0
  21. package/dist-cjs/categories/xss.js +15 -0
  22. package/dist-cjs/category.js +18 -0
  23. package/dist-cjs/error-codes.js +20 -0
  24. package/dist-cjs/index.js +7 -1
  25. package/dist-cjs/scanner.js +25 -0
  26. package/package.json +1 -1
  27. package/src/categories/authentication.js +54 -40
  28. package/src/categories/authentication.ts +134 -117
  29. package/src/categories/configuration.js +990 -114
  30. package/src/categories/configuration.ts +1625 -1104
  31. package/src/categories/injection.js +105 -74
  32. package/src/categories/injection.ts +129 -95
  33. package/src/categories/sensitive-paths.js +255 -174
  34. package/src/categories/sensitive-paths.ts +84 -0
  35. package/src/categories/ssrf.js +36 -28
  36. package/src/categories/ssrf.ts +11 -0
  37. package/src/categories/xss.js +47 -35
  38. package/src/categories/xss.ts +15 -0
  39. package/src/category.ts +16 -0
  40. package/src/error-codes.d.ts +38 -0
  41. package/src/error-codes.js +41 -6
  42. package/src/error-codes.ts +25 -5
  43. package/src/index.js +33 -48
  44. package/src/index.ts +20 -14
  45. package/src/scanner.ts +23 -0
  46. package/src/types.d.ts +2 -0
  47. package/src/types.js +1 -2
  48. package/src/types.ts +4 -2
  49. package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
@@ -18,6 +18,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
18
18
  title: 'AWS Credentials Exposed',
19
19
  description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
20
20
  severity: 'critical',
21
+ levelId: 1,
21
22
  category: 'information_disclosure',
22
23
  scanner: 'sensitive-path-scout',
23
24
  cvss: {
@@ -41,6 +42,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
41
42
  title: 'SSH Private Key Exposed',
42
43
  description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
43
44
  severity: 'critical',
45
+ levelId: 1,
44
46
  category: 'information_disclosure',
45
47
  scanner: 'sensitive-path-scout',
46
48
  cvss: {
@@ -63,6 +65,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
63
65
  title: 'SSL/TLS Private Key Exposed',
64
66
  description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
65
67
  severity: 'critical',
68
+ levelId: 1,
66
69
  category: 'cryptographic',
67
70
  scanner: 'sensitive-path-scout',
68
71
  cvss: {
@@ -85,6 +88,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
85
88
  title: 'Rails Master Key Exposed',
86
89
  description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
87
90
  severity: 'critical',
91
+ levelId: 1,
88
92
  category: 'information_disclosure',
89
93
  scanner: 'sensitive-path-scout',
90
94
  cvss: {
@@ -107,6 +111,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
107
111
  title: 'Terraform State File Exposed',
108
112
  description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
109
113
  severity: 'critical',
114
+ levelId: 1,
110
115
  category: 'information_disclosure',
111
116
  scanner: 'sensitive-path-scout',
112
117
  cvss: {
@@ -129,6 +134,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
129
134
  title: 'Kubernetes Config Exposed',
130
135
  description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
131
136
  severity: 'critical',
137
+ levelId: 1,
132
138
  category: 'information_disclosure',
133
139
  scanner: 'sensitive-path-scout',
134
140
  cvss: {
@@ -151,6 +157,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
151
157
  title: 'HashiCorp Vault Secret Exposed',
152
158
  description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
153
159
  severity: 'critical',
160
+ levelId: 1,
154
161
  category: 'information_disclosure',
155
162
  scanner: 'sensitive-path-scout',
156
163
  cvss: {
@@ -176,6 +183,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
176
183
  title: 'Git Repository Exposed',
177
184
  description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
178
185
  severity: 'high',
186
+ levelId: 2,
179
187
  category: 'information_disclosure',
180
188
  scanner: 'sensitive-path-scout',
181
189
  cvss: {
@@ -198,6 +206,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
198
206
  title: 'Environment File Exposed',
199
207
  description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
200
208
  severity: 'high',
209
+ levelId: 2,
201
210
  category: 'information_disclosure',
202
211
  scanner: 'sensitive-path-scout',
203
212
  cvss: {
@@ -220,6 +229,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
220
229
  title: 'WordPress Configuration File Exposed',
221
230
  description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
222
231
  severity: 'high',
232
+ levelId: 2,
223
233
  category: 'information_disclosure',
224
234
  scanner: 'sensitive-path-scout',
225
235
  cvss: {
@@ -242,6 +252,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
242
252
  title: 'Spring Boot Actuator Endpoints Exposed',
243
253
  description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
244
254
  severity: 'high',
255
+ levelId: 2,
245
256
  category: 'information_disclosure',
246
257
  scanner: 'sensitive-path-scout',
247
258
  cvss: {
@@ -265,6 +276,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
265
276
  title: 'Spring Boot Heapdump Exposed',
266
277
  description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
267
278
  severity: 'critical',
279
+ levelId: 1,
268
280
  category: 'information_disclosure',
269
281
  scanner: 'sensitive-path-scout',
270
282
  cvss: {
@@ -287,6 +299,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
287
299
  title: 'PHP Info Page Exposed',
288
300
  description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
289
301
  severity: 'medium',
302
+ levelId: 3,
290
303
  category: 'information_disclosure',
291
304
  scanner: 'sensitive-path-scout',
292
305
  cvss: {
@@ -309,6 +322,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
309
322
  title: 'Laravel Debug Mode Enabled',
310
323
  description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
311
324
  severity: 'high',
325
+ levelId: 2,
312
326
  category: 'information_disclosure',
313
327
  scanner: 'sensitive-path-scout',
314
328
  cvss: {
@@ -331,6 +345,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
331
345
  title: 'GraphQL Introspection Enabled',
332
346
  description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
333
347
  severity: 'medium',
348
+ levelId: 3,
334
349
  category: 'information_disclosure',
335
350
  scanner: 'sensitive-path-scout',
336
351
  cvss: {
@@ -353,6 +368,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
353
368
  title: 'Database Backup File Exposed',
354
369
  description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
355
370
  severity: 'critical',
371
+ levelId: 1,
356
372
  category: 'information_disclosure',
357
373
  scanner: 'sensitive-path-scout',
358
374
  cvss: {
@@ -378,6 +394,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
378
394
  title: 'Swagger/OpenAPI Documentation Exposed',
379
395
  description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
380
396
  severity: 'low',
397
+ levelId: 4,
381
398
  category: 'information_disclosure',
382
399
  scanner: 'sensitive-path-scout',
383
400
  cvss: {
@@ -400,6 +417,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
400
417
  title: 'Prometheus Metrics Endpoint Exposed',
401
418
  description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
402
419
  severity: 'medium',
420
+ levelId: 3,
403
421
  category: 'information_disclosure',
404
422
  scanner: 'sensitive-path-scout',
405
423
  cvss: {
@@ -422,6 +440,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
422
440
  title: 'Admin Panel Publicly Accessible',
423
441
  description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
424
442
  severity: 'medium',
443
+ levelId: 3,
425
444
  category: 'access_control',
426
445
  scanner: 'sensitive-path-scout',
427
446
  cvss: {
@@ -444,6 +463,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
444
463
  title: 'JavaScript Source Maps Exposed',
445
464
  description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
446
465
  severity: 'low',
466
+ levelId: 4,
447
467
  category: 'information_disclosure',
448
468
  scanner: 'sensitive-path-scout',
449
469
  cvss: {
@@ -468,6 +488,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
468
488
  title: 'Un Protected Config JSON',
469
489
  description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
470
490
  severity: 'medium',
491
+ levelId: 3,
471
492
  category: 'information_disclosure',
472
493
  scanner: 'sensitive-path-scout',
473
494
  cvss: {
@@ -490,6 +511,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
490
511
  title: 'Web Server Configuration File Detected',
491
512
  description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
492
513
  severity: 'high',
514
+ levelId: 2,
493
515
  category: 'information_disclosure',
494
516
  scanner: 'sensitive-path-scout',
495
517
  cvss: {
@@ -512,6 +534,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
512
534
  title: 'Appsettings JSON Exposed',
513
535
  description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
514
536
  severity: 'high',
537
+ levelId: 2,
515
538
  category: 'information_disclosure',
516
539
  scanner: 'sensitive-path-scout',
517
540
  cvss: {
@@ -534,6 +557,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
534
557
  title: 'Spring Config Exposed',
535
558
  description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
536
559
  severity: 'high',
560
+ levelId: 2,
537
561
  category: 'information_disclosure',
538
562
  scanner: 'sensitive-path-scout',
539
563
  cvss: {
@@ -556,6 +580,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
556
580
  title: 'Npmrc Exposed',
557
581
  description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
558
582
  severity: 'high',
583
+ levelId: 2,
559
584
  category: 'information_disclosure',
560
585
  scanner: 'sensitive-path-scout',
561
586
  cvss: {
@@ -578,6 +603,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
578
603
  title: 'TOML Project File Exposed',
579
604
  description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
580
605
  severity: 'low',
606
+ levelId: 4,
581
607
  category: 'information_disclosure',
582
608
  scanner: 'sensitive-path-scout',
583
609
  cvss: {
@@ -600,6 +626,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
600
626
  title: 'Rails Database YML Exposed',
601
627
  description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
602
628
  severity: 'high',
629
+ levelId: 2,
603
630
  category: 'information_disclosure',
604
631
  scanner: 'sensitive-path-scout',
605
632
  cvss: {
@@ -622,6 +649,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
622
649
  title: 'Drupal Settings PHP Exposed',
623
650
  description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
624
651
  severity: 'high',
652
+ levelId: 2,
625
653
  category: 'information_disclosure',
626
654
  scanner: 'sensitive-path-scout',
627
655
  cvss: {
@@ -644,6 +672,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
644
672
  title: 'Magento Env PHP Exposed',
645
673
  description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
646
674
  severity: 'high',
675
+ levelId: 2,
647
676
  category: 'information_disclosure',
648
677
  scanner: 'sensitive-path-scout',
649
678
  cvss: {
@@ -666,6 +695,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
666
695
  title: 'Jolokia Exposed',
667
696
  description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
668
697
  severity: 'high',
698
+ levelId: 2,
669
699
  category: 'information_disclosure',
670
700
  scanner: 'sensitive-path-scout',
671
701
  cvss: {
@@ -688,6 +718,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
688
718
  title: 'SVN Working Copy Database Exposed',
689
719
  description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
690
720
  severity: 'high',
721
+ levelId: 2,
691
722
  category: 'information_disclosure',
692
723
  scanner: 'sensitive-path-scout',
693
724
  cvss: {
@@ -710,6 +741,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
710
741
  title: 'Subversion Repository Detected',
711
742
  description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
712
743
  severity: 'high',
744
+ levelId: 2,
713
745
  category: 'information_disclosure',
714
746
  scanner: 'sensitive-path-scout',
715
747
  cvss: {
@@ -732,6 +764,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
732
764
  title: 'Mercurial Repository Found',
733
765
  description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
734
766
  severity: 'medium',
767
+ levelId: 3,
735
768
  category: 'information_disclosure',
736
769
  scanner: 'sensitive-path-scout',
737
770
  cvss: {
@@ -754,6 +787,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
754
787
  title: 'Mercurial Hgrc Exposed',
755
788
  description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
756
789
  severity: 'medium',
790
+ levelId: 3,
757
791
  category: 'information_disclosure',
758
792
  scanner: 'sensitive-path-scout',
759
793
  cvss: {
@@ -776,6 +810,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
776
810
  title: 'CVS Root Exposed',
777
811
  description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
778
812
  severity: 'medium',
813
+ levelId: 3,
779
814
  category: 'information_disclosure',
780
815
  scanner: 'sensitive-path-scout',
781
816
  cvss: {
@@ -798,6 +833,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
798
833
  title: 'CVS Entries Exposed',
799
834
  description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
800
835
  severity: 'medium',
836
+ levelId: 3,
801
837
  category: 'information_disclosure',
802
838
  scanner: 'sensitive-path-scout',
803
839
  cvss: {
@@ -820,6 +856,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
820
856
  title: 'Bazaar Repo Exposed',
821
857
  description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
822
858
  severity: 'medium',
859
+ levelId: 3,
823
860
  category: 'information_disclosure',
824
861
  scanner: 'sensitive-path-scout',
825
862
  cvss: {
@@ -842,6 +879,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
842
879
  title: 'Spring Boot Thread Dump Exposed',
843
880
  description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
844
881
  severity: 'high',
882
+ levelId: 2,
845
883
  category: 'information_disclosure',
846
884
  scanner: 'sensitive-path-scout',
847
885
  cvss: {
@@ -864,6 +902,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
864
902
  title: 'Redis Rdb Dump Detected',
865
903
  description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
866
904
  severity: 'high',
905
+ levelId: 2,
867
906
  category: 'information_disclosure',
868
907
  scanner: 'sensitive-path-scout',
869
908
  cvss: {
@@ -886,6 +925,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
886
925
  title: 'Atlassian Bitbucket Pipelines Configuration Detected',
887
926
  description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
888
927
  severity: 'low',
928
+ levelId: 4,
889
929
  category: 'information_disclosure',
890
930
  scanner: 'sensitive-path-scout',
891
931
  cvss: {
@@ -908,6 +948,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
908
948
  title: 'AZURE Pipelines Configuration Detected',
909
949
  description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
910
950
  severity: 'low',
951
+ levelId: 4,
911
952
  category: 'information_disclosure',
912
953
  scanner: 'sensitive-path-scout',
913
954
  cvss: {
@@ -930,6 +971,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
930
971
  title: 'AWS Code Build Buildspec Detected',
931
972
  description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
932
973
  severity: 'low',
974
+ levelId: 4,
933
975
  category: 'information_disclosure',
934
976
  scanner: 'sensitive-path-scout',
935
977
  cvss: {
@@ -952,6 +994,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
952
994
  title: 'Github Actions Workflow Detected',
953
995
  description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
954
996
  severity: 'low',
997
+ levelId: 4,
955
998
  category: 'information_disclosure',
956
999
  scanner: 'sensitive-path-scout',
957
1000
  cvss: {
@@ -974,6 +1017,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
974
1017
  title: 'Docker Compose Configuration Detected',
975
1018
  description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
976
1019
  severity: 'medium',
1020
+ levelId: 3,
977
1021
  category: 'information_disclosure',
978
1022
  scanner: 'sensitive-path-scout',
979
1023
  cvss: {
@@ -996,6 +1040,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
996
1040
  title: 'Trace Axd',
997
1041
  description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
998
1042
  severity: 'high',
1043
+ levelId: 2,
999
1044
  category: 'information_disclosure',
1000
1045
  scanner: 'sensitive-path-scout',
1001
1046
  cvss: {
@@ -1018,6 +1063,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1018
1063
  title: 'Elmah Axd Exposed',
1019
1064
  description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1020
1065
  severity: 'high',
1066
+ levelId: 2,
1021
1067
  category: 'information_disclosure',
1022
1068
  scanner: 'sensitive-path-scout',
1023
1069
  cvss: {
@@ -1040,6 +1086,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1040
1086
  title: 'Laravel Log Viewer Enabled',
1041
1087
  description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1042
1088
  severity: 'medium',
1089
+ levelId: 3,
1043
1090
  category: 'information_disclosure',
1044
1091
  scanner: 'sensitive-path-scout',
1045
1092
  cvss: {
@@ -1062,6 +1109,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1062
1109
  title: 'Apache Htaccess File Detected',
1063
1110
  description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1064
1111
  severity: 'medium',
1112
+ levelId: 3,
1065
1113
  category: 'information_disclosure',
1066
1114
  scanner: 'sensitive-path-scout',
1067
1115
  cvss: {
@@ -1084,6 +1132,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1084
1132
  title: 'Apache Server Info Exposed',
1085
1133
  description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1086
1134
  severity: 'medium',
1135
+ levelId: 3,
1087
1136
  category: 'information_disclosure',
1088
1137
  scanner: 'sensitive-path-scout',
1089
1138
  cvss: {
@@ -1106,6 +1155,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1106
1155
  title: 'Sqlite Database Detected',
1107
1156
  description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1108
1157
  severity: 'high',
1158
+ levelId: 2,
1109
1159
  category: 'information_disclosure',
1110
1160
  scanner: 'sensitive-path-scout',
1111
1161
  cvss: {
@@ -1128,6 +1178,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1128
1178
  title: 'Package Dependencies Detected',
1129
1179
  description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1130
1180
  severity: 'medium',
1181
+ levelId: 3,
1131
1182
  category: 'information_disclosure',
1132
1183
  scanner: 'sensitive-path-scout',
1133
1184
  cvss: {
@@ -1150,6 +1201,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1150
1201
  title: 'PHP Composer Dependencies Detected',
1151
1202
  description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1152
1203
  severity: 'medium',
1204
+ levelId: 3,
1153
1205
  category: 'information_disclosure',
1154
1206
  scanner: 'sensitive-path-scout',
1155
1207
  cvss: {
@@ -1172,6 +1224,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1172
1224
  title: 'Python Requirements Detected',
1173
1225
  description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1174
1226
  severity: 'low',
1227
+ levelId: 4,
1175
1228
  category: 'information_disclosure',
1176
1229
  scanner: 'sensitive-path-scout',
1177
1230
  cvss: {
@@ -1194,6 +1247,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1194
1247
  title: 'AWS Config Exposed',
1195
1248
  description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1196
1249
  severity: 'high',
1250
+ levelId: 2,
1197
1251
  category: 'information_disclosure',
1198
1252
  scanner: 'sensitive-path-scout',
1199
1253
  cvss: {
@@ -1216,6 +1270,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1216
1270
  title: 'AZURE Credentials Exposed',
1217
1271
  description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1218
1272
  severity: 'high',
1273
+ levelId: 2,
1219
1274
  category: 'information_disclosure',
1220
1275
  scanner: 'sensitive-path-scout',
1221
1276
  cvss: {
@@ -1238,6 +1293,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1238
1293
  title: 'Helm Values Exposed',
1239
1294
  description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1240
1295
  severity: 'high',
1296
+ levelId: 2,
1241
1297
  category: 'information_disclosure',
1242
1298
  scanner: 'sensitive-path-scout',
1243
1299
  cvss: {
@@ -1260,6 +1316,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1260
1316
  title: 'SSH Public Key Exposed',
1261
1317
  description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1262
1318
  severity: 'medium',
1319
+ levelId: 3,
1263
1320
  category: 'information_disclosure',
1264
1321
  scanner: 'sensitive-path-scout',
1265
1322
  cvss: {
@@ -1282,6 +1339,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1282
1339
  title: 'SSL Certificate Exposed',
1283
1340
  description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1284
1341
  severity: 'medium',
1342
+ levelId: 3,
1285
1343
  category: 'information_disclosure',
1286
1344
  scanner: 'sensitive-path-scout',
1287
1345
  cvss: {
@@ -1304,6 +1362,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1304
1362
  title: 'Graph Ql Endpoint Exposed',
1305
1363
  description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1306
1364
  severity: 'medium',
1365
+ levelId: 3,
1307
1366
  category: 'information_disclosure',
1308
1367
  scanner: 'sensitive-path-scout',
1309
1368
  cvss: {
@@ -1326,6 +1385,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1326
1385
  title: 'Graphi Ql Exposed',
1327
1386
  description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1328
1387
  severity: 'medium',
1388
+ levelId: 3,
1329
1389
  category: 'information_disclosure',
1330
1390
  scanner: 'sensitive-path-scout',
1331
1391
  cvss: {
@@ -1348,6 +1408,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1348
1408
  title: 'Terraform Lock Exposed',
1349
1409
  description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1350
1410
  severity: 'medium',
1411
+ levelId: 3,
1351
1412
  category: 'information_disclosure',
1352
1413
  scanner: 'sensitive-path-scout',
1353
1414
  cvss: {
@@ -1370,6 +1431,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1370
1431
  title: 'Terraform Vars Exposed',
1371
1432
  description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1372
1433
  severity: 'high',
1434
+ levelId: 2,
1373
1435
  category: 'information_disclosure',
1374
1436
  scanner: 'sensitive-path-scout',
1375
1437
  cvss: {
@@ -1392,6 +1454,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1392
1454
  title: 'Error Log Exposed',
1393
1455
  description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1394
1456
  severity: 'medium',
1457
+ levelId: 3,
1395
1458
  category: 'information_disclosure',
1396
1459
  scanner: 'sensitive-path-scout',
1397
1460
  cvss: {
@@ -1414,6 +1477,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1414
1477
  title: 'Access Log Exposed',
1415
1478
  description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1416
1479
  severity: 'medium',
1480
+ levelId: 3,
1417
1481
  category: 'information_disclosure',
1418
1482
  scanner: 'sensitive-path-scout',
1419
1483
  cvss: {
@@ -1436,6 +1500,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1436
1500
  title: 'Debug Log Exposed',
1437
1501
  description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1438
1502
  severity: 'medium',
1503
+ levelId: 3,
1439
1504
  category: 'information_disclosure',
1440
1505
  scanner: 'sensitive-path-scout',
1441
1506
  cvss: {
@@ -1458,6 +1523,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1458
1523
  title: 'Application Log Exposed',
1459
1524
  description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1460
1525
  severity: 'medium',
1526
+ levelId: 3,
1461
1527
  category: 'information_disclosure',
1462
1528
  scanner: 'sensitive-path-scout',
1463
1529
  cvss: {
@@ -1480,6 +1546,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1480
1546
  title: 'Laravel Log Exposed',
1481
1547
  description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1482
1548
  severity: 'high',
1549
+ levelId: 2,
1483
1550
  category: 'information_disclosure',
1484
1551
  scanner: 'sensitive-path-scout',
1485
1552
  cvss: {
@@ -1502,6 +1569,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1502
1569
  title: 'Word Press Debug Log Exposed',
1503
1570
  description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1504
1571
  severity: 'high',
1572
+ levelId: 2,
1505
1573
  category: 'information_disclosure',
1506
1574
  scanner: 'sensitive-path-scout',
1507
1575
  cvss: {
@@ -1524,6 +1592,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1524
1592
  title: 'Adminer Exposed',
1525
1593
  description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1526
1594
  severity: 'high',
1595
+ levelId: 2,
1527
1596
  category: 'information_disclosure',
1528
1597
  scanner: 'sensitive-path-scout',
1529
1598
  cvss: {
@@ -1546,6 +1615,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1546
1615
  title: 'WSDL Exposed',
1547
1616
  description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1548
1617
  severity: 'medium',
1618
+ levelId: 3,
1549
1619
  category: 'information_disclosure',
1550
1620
  scanner: 'sensitive-path-scout',
1551
1621
  cvss: {
@@ -1568,6 +1638,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1568
1638
  title: 'Debug Endpoint Exposed',
1569
1639
  description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1570
1640
  severity: 'high',
1641
+ levelId: 2,
1571
1642
  category: 'information_disclosure',
1572
1643
  scanner: 'sensitive-path-scout',
1573
1644
  cvss: {
@@ -1590,6 +1661,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1590
1661
  title: 'Go Debug Vars Exposed',
1591
1662
  description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1592
1663
  severity: 'high',
1664
+ levelId: 2,
1593
1665
  category: 'information_disclosure',
1594
1666
  scanner: 'sensitive-path-scout',
1595
1667
  cvss: {
@@ -1612,6 +1684,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1612
1684
  title: 'Go Pprof Exposed',
1613
1685
  description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1614
1686
  severity: 'high',
1687
+ levelId: 2,
1615
1688
  category: 'information_disclosure',
1616
1689
  scanner: 'sensitive-path-scout',
1617
1690
  cvss: {
@@ -1634,6 +1707,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1634
1707
  title: 'Word Press XML Rpc Exposed',
1635
1708
  description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1636
1709
  severity: 'medium',
1710
+ levelId: 3,
1637
1711
  category: 'information_disclosure',
1638
1712
  scanner: 'sensitive-path-scout',
1639
1713
  cvss: {
@@ -1656,6 +1730,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1656
1730
  title: 'Test Endpoint Exposed',
1657
1731
  description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1658
1732
  severity: 'low',
1733
+ levelId: 4,
1659
1734
  category: 'information_disclosure',
1660
1735
  scanner: 'sensitive-path-scout',
1661
1736
  cvss: {
@@ -1678,6 +1753,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1678
1753
  title: 'Staging Endpoint Exposed',
1679
1754
  description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1680
1755
  severity: 'low',
1756
+ levelId: 4,
1681
1757
  category: 'information_disclosure',
1682
1758
  scanner: 'sensitive-path-scout',
1683
1759
  cvss: {
@@ -1700,6 +1776,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1700
1776
  title: 'Editor Backup File Detected',
1701
1777
  description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1702
1778
  severity: 'low',
1779
+ levelId: 4,
1703
1780
  category: 'information_disclosure',
1704
1781
  scanner: 'sensitive-path-scout',
1705
1782
  cvss: {
@@ -1722,6 +1799,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1722
1799
  title: 'VIM Swap File Detected',
1723
1800
  description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1724
1801
  severity: 'low',
1802
+ levelId: 4,
1725
1803
  category: 'information_disclosure',
1726
1804
  scanner: 'sensitive-path-scout',
1727
1805
  cvss: {
@@ -1744,6 +1822,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1744
1822
  title: 'Directory Listing Enabled',
1745
1823
  description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1746
1824
  severity: 'low',
1825
+ levelId: 4,
1747
1826
  category: 'information_disclosure',
1748
1827
  scanner: 'sensitive-path-scout',
1749
1828
  cvss: {
@@ -1766,6 +1845,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1766
1845
  title: 'AZURE Storage Config Exposed',
1767
1846
  description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1768
1847
  severity: 'high',
1848
+ levelId: 2,
1769
1849
  category: 'information_disclosure',
1770
1850
  scanner: 'sensitive-path-scout',
1771
1851
  cvss: {
@@ -1788,6 +1868,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1788
1868
  title: 'Mongo Rc Exposed',
1789
1869
  description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1790
1870
  severity: 'high',
1871
+ levelId: 2,
1791
1872
  category: 'information_disclosure',
1792
1873
  scanner: 'sensitive-path-scout',
1793
1874
  cvss: {
@@ -1810,6 +1891,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1810
1891
  title: 'Awssam Template Exposed',
1811
1892
  description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1812
1893
  severity: 'low',
1894
+ levelId: 4,
1813
1895
  category: 'information_disclosure',
1814
1896
  scanner: 'sensitive-path-scout',
1815
1897
  cvss: {
@@ -1832,6 +1914,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1832
1914
  title: 'Serverless Config Exposed',
1833
1915
  description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1834
1916
  severity: 'low',
1917
+ levelId: 4,
1835
1918
  category: 'information_disclosure',
1836
1919
  scanner: 'sensitive-path-scout',
1837
1920
  cvss: {
@@ -1854,6 +1937,7 @@ export const SENSITIVE_PATH_VULNERABILITIES: Record<string, VulnerabilityDefinit
1854
1937
  title: 'Cloud Formation Template Exposed',
1855
1938
  description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
1856
1939
  severity: 'low',
1940
+ levelId: 4,
1857
1941
  category: 'information_disclosure',
1858
1942
  scanner: 'sensitive-path-scout',
1859
1943
  cvss: {