@zerothreatai/vulnerability-registry 3.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +34 -17
- package/dist/categories/configuration.js +561 -60
- package/dist/categories/injection.js +68 -34
- package/dist/categories/sensitive-paths.js +168 -84
- package/dist/categories/ssrf.js +22 -11
- package/dist/categories/xss.js +30 -15
- package/dist/category.d.ts +6 -0
- package/dist/category.js +15 -0
- package/dist/error-codes.d.ts +20 -0
- package/dist/error-codes.js +20 -0
- package/dist/index.d.ts +9 -1
- package/dist/index.js +5 -1
- package/dist/scanner.d.ts +6 -0
- package/dist/scanner.js +22 -0
- package/dist/types.d.ts +2 -0
- package/dist-cjs/categories/authentication.js +34 -17
- package/dist-cjs/categories/configuration.js +561 -60
- package/dist-cjs/categories/injection.js +68 -34
- package/dist-cjs/categories/sensitive-paths.js +168 -84
- package/dist-cjs/categories/ssrf.js +22 -11
- package/dist-cjs/categories/xss.js +30 -15
- package/dist-cjs/category.js +18 -0
- package/dist-cjs/error-codes.js +20 -0
- package/dist-cjs/index.js +7 -1
- package/dist-cjs/scanner.js +25 -0
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +145 -128
- package/src/categories/configuration.ts +1632 -1111
- package/src/categories/injection.ts +158 -124
- package/src/categories/sensitive-paths.ts +168 -84
- package/src/categories/ssrf.ts +22 -11
- package/src/categories/xss.ts +30 -15
- package/src/category.ts +16 -0
- package/src/error-codes.ts +25 -5
- package/src/id-registry.json +1235 -0
- package/src/index.ts +20 -14
- package/src/scanner.ts +23 -0
- package/src/types.ts +4 -2
- package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -378
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -906
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -750
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1791
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -250
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -328
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -242
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -315
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -107
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -86
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -7
- package/src/types.js.map +0 -1
package/src/categories/xss.js
DELETED
|
@@ -1,328 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* Vulnerability Registry - XSS Vulnerabilities
|
|
4
|
-
*
|
|
5
|
-
* Definitions for all Cross-Site Scripting vulnerability types
|
|
6
|
-
*/
|
|
7
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
-
exports.XSS_VULNERABILITIES = void 0;
|
|
9
|
-
const error_codes_js_1 = require("../error-codes.js");
|
|
10
|
-
exports.XSS_VULNERABILITIES = {
|
|
11
|
-
[error_codes_js_1.VulnerabilityCode.XSS_REFLECTED]: {
|
|
12
|
-
id: 31,
|
|
13
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_REFLECTED,
|
|
14
|
-
title: 'Cross-Site Scripting - Reflected',
|
|
15
|
-
description: 'Reflected XSS vulnerability where user input is immediately returned by the server in the response without proper encoding, allowing attackers to inject malicious scripts that execute in the victim browser when they click a crafted link or submit a manipulated form.',
|
|
16
|
-
severity: 'medium',
|
|
17
|
-
category: 'xss',
|
|
18
|
-
scanner: 'xss',
|
|
19
|
-
cvss: {
|
|
20
|
-
score: 6.1,
|
|
21
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N',
|
|
22
|
-
severity: 'MEDIUM',
|
|
23
|
-
},
|
|
24
|
-
cwe: [
|
|
25
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
26
|
-
],
|
|
27
|
-
owasp: [
|
|
28
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
29
|
-
],
|
|
30
|
-
remediation: 'HTML-encode all user input before rendering in HTML. Implement Content Security Policy (CSP). Use context-aware output encoding based on output location (HTML, JS, CSS, URL).',
|
|
31
|
-
},
|
|
32
|
-
[error_codes_js_1.VulnerabilityCode.XSS_STORED]: {
|
|
33
|
-
id: 32,
|
|
34
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_STORED,
|
|
35
|
-
title: 'Cross-Site Scripting - Stored',
|
|
36
|
-
description: 'Critical stored XSS vulnerability where malicious scripts are permanently saved in the application database and served to all users who view the affected content, enabling widespread session hijacking, credential theft, and malware distribution without requiring victim interaction beyond normal usage.',
|
|
37
|
-
severity: 'high',
|
|
38
|
-
category: 'xss',
|
|
39
|
-
scanner: 'xss',
|
|
40
|
-
cvss: {
|
|
41
|
-
score: 8.1,
|
|
42
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N',
|
|
43
|
-
severity: 'HIGH',
|
|
44
|
-
},
|
|
45
|
-
cwe: [
|
|
46
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
47
|
-
],
|
|
48
|
-
owasp: [
|
|
49
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
50
|
-
],
|
|
51
|
-
remediation: 'Sanitize all user input before storage. HTML-encode all dynamic content in responses. Implement strict Content Security Policy. Use HTTP-only and Secure flags for session cookies.',
|
|
52
|
-
},
|
|
53
|
-
[error_codes_js_1.VulnerabilityCode.XSS_DOM_BASED]: {
|
|
54
|
-
id: 33,
|
|
55
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_DOM_BASED,
|
|
56
|
-
title: 'Cross-Site Scripting - DOM Based',
|
|
57
|
-
description: 'DOM-based XSS vulnerability where the attack payload is processed entirely in the client-side JavaScript code without being sent to the server, typically through dangerous sinks like innerHTML, document.write(), or eval() that process URL fragments or user-controlled DOM elements.',
|
|
58
|
-
severity: 'medium',
|
|
59
|
-
category: 'xss',
|
|
60
|
-
scanner: 'xss',
|
|
61
|
-
cvss: {
|
|
62
|
-
score: 6.1,
|
|
63
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N',
|
|
64
|
-
severity: 'MEDIUM',
|
|
65
|
-
},
|
|
66
|
-
cwe: [
|
|
67
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
68
|
-
],
|
|
69
|
-
owasp: [
|
|
70
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
71
|
-
],
|
|
72
|
-
remediation: 'Avoid using dangerous DOM sinks like innerHTML and document.write(). Use textContent instead of innerHTML. Sanitize any DOM manipulation with user input. Implement Trusted Types if supported.',
|
|
73
|
-
},
|
|
74
|
-
[error_codes_js_1.VulnerabilityCode.XSS_SVG_INJECTION]: {
|
|
75
|
-
id: 34,
|
|
76
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_SVG_INJECTION,
|
|
77
|
-
title: 'Cross-Site Scripting - SVG Injection',
|
|
78
|
-
description: 'SVG-based XSS vulnerability where malicious JavaScript is embedded within SVG image files using script elements or event handlers like onload, which execute when the browser renders the SVG file as an image or inline element, bypassing image upload security controls.',
|
|
79
|
-
severity: 'high',
|
|
80
|
-
category: 'xss',
|
|
81
|
-
scanner: 'xss',
|
|
82
|
-
cvss: {
|
|
83
|
-
score: 7.1,
|
|
84
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N',
|
|
85
|
-
severity: 'HIGH',
|
|
86
|
-
},
|
|
87
|
-
cwe: [
|
|
88
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
89
|
-
],
|
|
90
|
-
owasp: [
|
|
91
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
92
|
-
],
|
|
93
|
-
remediation: 'Sanitize uploaded SVG files to remove script elements and event handlers. Serve user-uploaded SVGs from a separate domain. Set Content-Disposition: attachment for SVG downloads. Use Content-Security-Policy.',
|
|
94
|
-
},
|
|
95
|
-
[error_codes_js_1.VulnerabilityCode.XSS_CSTI_ANGULAR]: {
|
|
96
|
-
id: 35,
|
|
97
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_CSTI_ANGULAR,
|
|
98
|
-
title: 'Cross-Site Scripting - Angular Template Injection',
|
|
99
|
-
description: 'AngularJS client-side template injection vulnerability where user input containing Angular expressions like {{constructor.constructor("alert(1)")()}} is evaluated by the Angular template engine, leading to arbitrary JavaScript execution in the user browser context.',
|
|
100
|
-
severity: 'high',
|
|
101
|
-
category: 'xss',
|
|
102
|
-
scanner: 'xss',
|
|
103
|
-
cvss: {
|
|
104
|
-
score: 7.5,
|
|
105
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N',
|
|
106
|
-
severity: 'HIGH',
|
|
107
|
-
},
|
|
108
|
-
cwe: [
|
|
109
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
110
|
-
{ id: 'CWE-94', name: 'Code Injection', url: 'https://cwe.mitre.org/data/definitions/94.html' },
|
|
111
|
-
],
|
|
112
|
-
owasp: [
|
|
113
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
114
|
-
],
|
|
115
|
-
remediation: 'Upgrade from AngularJS to modern Angular which is not vulnerable to template injection. Use ng-non-bindable directive for user content. Encode special characters {{}} in user input. Apply strict CSP.',
|
|
116
|
-
},
|
|
117
|
-
[error_codes_js_1.VulnerabilityCode.XSS_CSP_BYPASS]: {
|
|
118
|
-
id: 36,
|
|
119
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_CSP_BYPASS,
|
|
120
|
-
title: 'Cross-Site Scripting - CSP Bypass',
|
|
121
|
-
description: 'XSS vulnerability that bypasses Content Security Policy protections through techniques like JSONP endpoints on whitelisted domains, base tag injection, Angular.js libraries on CDN, or other CSP bypass gadgets that allow script execution despite CSP controls being in place.',
|
|
122
|
-
severity: 'high',
|
|
123
|
-
category: 'xss',
|
|
124
|
-
scanner: 'xss',
|
|
125
|
-
cvss: {
|
|
126
|
-
score: 7.5,
|
|
127
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N',
|
|
128
|
-
severity: 'HIGH',
|
|
129
|
-
},
|
|
130
|
-
cwe: [
|
|
131
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
132
|
-
],
|
|
133
|
-
owasp: [
|
|
134
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
135
|
-
],
|
|
136
|
-
remediation: 'Review CSP for JSONP endpoints and Angular.js CDN inclusions. Use nonce-based CSP instead of allowlist domains. Add base-uri restriction. Fix the underlying XSS vulnerability.',
|
|
137
|
-
},
|
|
138
|
-
[error_codes_js_1.VulnerabilityCode.XSS_JS_CONTEXT]: {
|
|
139
|
-
id: 37,
|
|
140
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_JS_CONTEXT,
|
|
141
|
-
title: 'Cross-Site Scripting - JavaScript Context',
|
|
142
|
-
description: 'XSS vulnerability where user input is injected directly into JavaScript code blocks, allowing attackers to break out of string contexts and execute arbitrary JavaScript by injecting quote characters and script code, or modify application logic by injecting new statements.',
|
|
143
|
-
severity: 'high',
|
|
144
|
-
category: 'xss',
|
|
145
|
-
scanner: 'xss',
|
|
146
|
-
cvss: {
|
|
147
|
-
score: 7.5,
|
|
148
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N',
|
|
149
|
-
severity: 'HIGH',
|
|
150
|
-
},
|
|
151
|
-
cwe: [
|
|
152
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
153
|
-
],
|
|
154
|
-
owasp: [
|
|
155
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
156
|
-
],
|
|
157
|
-
remediation: 'Avoid inserting user data into JavaScript code. Use JSON.stringify() with proper encoding for data passed to JavaScript. Pass data through data attributes and access via DOM APIs instead.',
|
|
158
|
-
},
|
|
159
|
-
[error_codes_js_1.VulnerabilityCode.XSS_EVENT_HANDLER]: {
|
|
160
|
-
id: 38,
|
|
161
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_EVENT_HANDLER,
|
|
162
|
-
title: 'Cross-Site Scripting - Event Handler Injection',
|
|
163
|
-
description: 'XSS vulnerability through injection into HTML event handler attributes like onclick, onerror, onload, or onmouseover, allowing attackers to execute JavaScript when users interact with or simply view the affected page elements without requiring script tags.',
|
|
164
|
-
severity: 'high',
|
|
165
|
-
category: 'xss',
|
|
166
|
-
scanner: 'xss',
|
|
167
|
-
cvss: {
|
|
168
|
-
score: 7.1,
|
|
169
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N',
|
|
170
|
-
severity: 'HIGH',
|
|
171
|
-
},
|
|
172
|
-
cwe: [
|
|
173
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
174
|
-
],
|
|
175
|
-
owasp: [
|
|
176
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
177
|
-
],
|
|
178
|
-
remediation: 'Use proper HTML encoding for all user input in attributes. Avoid placing user input in event handler attributes. Use Content Security Policy with unsafe-inline disabled.',
|
|
179
|
-
},
|
|
180
|
-
[error_codes_js_1.VulnerabilityCode.XSS_SCRIPT_INJECTION]: {
|
|
181
|
-
id: 39,
|
|
182
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_SCRIPT_INJECTION,
|
|
183
|
-
title: 'Cross-Site Scripting - Script Tag Injection',
|
|
184
|
-
description: 'XSS vulnerability where attackers can inject complete script tags into the HTML response, enabling arbitrary JavaScript execution. This is often the most straightforward XSS exploitation when input is not properly sanitized before rendering.',
|
|
185
|
-
severity: 'high',
|
|
186
|
-
category: 'xss',
|
|
187
|
-
scanner: 'xss',
|
|
188
|
-
cvss: {
|
|
189
|
-
score: 7.5,
|
|
190
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N',
|
|
191
|
-
severity: 'HIGH',
|
|
192
|
-
},
|
|
193
|
-
cwe: [
|
|
194
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
195
|
-
],
|
|
196
|
-
owasp: [
|
|
197
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
198
|
-
],
|
|
199
|
-
remediation: 'Encode < and > characters in user input. Implement Content Security Policy. Use HTML sanitization libraries that remove script tags. Apply context-aware output encoding.',
|
|
200
|
-
},
|
|
201
|
-
[error_codes_js_1.VulnerabilityCode.XSS_HTML_INJECTION]: {
|
|
202
|
-
id: 40,
|
|
203
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_HTML_INJECTION,
|
|
204
|
-
title: 'Cross-Site Scripting - HTML Injection',
|
|
205
|
-
description: 'HTML injection vulnerability where attackers can inject arbitrary HTML elements that modify page structure, enabling phishing attacks through fake login forms, content spoofing, or combination with CSS to overlay malicious content over legitimate page elements.',
|
|
206
|
-
severity: 'medium',
|
|
207
|
-
category: 'xss',
|
|
208
|
-
scanner: 'xss',
|
|
209
|
-
cvss: {
|
|
210
|
-
score: 6.1,
|
|
211
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N',
|
|
212
|
-
severity: 'MEDIUM',
|
|
213
|
-
},
|
|
214
|
-
cwe: [
|
|
215
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
216
|
-
],
|
|
217
|
-
owasp: [
|
|
218
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
219
|
-
],
|
|
220
|
-
remediation: 'HTML-encode all user input. Use allowlist-based HTML sanitization if rich text is required. Implement Content Security Policy to restrict form actions and frame sources.',
|
|
221
|
-
},
|
|
222
|
-
[error_codes_js_1.VulnerabilityCode.XSS_ATTRIBUTE_INJECTION]: {
|
|
223
|
-
id: 41,
|
|
224
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_ATTRIBUTE_INJECTION,
|
|
225
|
-
title: 'Cross-Site Scripting - Attribute Injection',
|
|
226
|
-
description: 'XSS vulnerability where user input is placed in HTML attributes without proper encoding, allowing attackers to break out of the attribute context and inject new attributes or event handlers by using quote characters and spaces.',
|
|
227
|
-
severity: 'medium',
|
|
228
|
-
category: 'xss',
|
|
229
|
-
scanner: 'xss',
|
|
230
|
-
cvss: {
|
|
231
|
-
score: 6.1,
|
|
232
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N',
|
|
233
|
-
severity: 'MEDIUM',
|
|
234
|
-
},
|
|
235
|
-
cwe: [
|
|
236
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
237
|
-
],
|
|
238
|
-
owasp: [
|
|
239
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
240
|
-
],
|
|
241
|
-
remediation: 'HTML-encode quotes (single and double) when placing user input in attributes. Always use quoted attributes. Avoid placing user input in dangerous attributes like href, src, or event handlers.',
|
|
242
|
-
},
|
|
243
|
-
[error_codes_js_1.VulnerabilityCode.XSS_CSS_INJECTION]: {
|
|
244
|
-
id: 42,
|
|
245
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_CSS_INJECTION,
|
|
246
|
-
title: 'Cross-Site Scripting - CSS Injection',
|
|
247
|
-
description: 'CSS injection vulnerability where attackers can inject malicious CSS rules to exfiltrate data through CSS selectors and background URLs, modify page appearance for phishing, or in older browsers achieve JavaScript execution through CSS expressions.',
|
|
248
|
-
severity: 'medium',
|
|
249
|
-
category: 'xss',
|
|
250
|
-
scanner: 'xss',
|
|
251
|
-
cvss: {
|
|
252
|
-
score: 5.3,
|
|
253
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N',
|
|
254
|
-
severity: 'MEDIUM',
|
|
255
|
-
},
|
|
256
|
-
cwe: [
|
|
257
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
258
|
-
],
|
|
259
|
-
owasp: [
|
|
260
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
261
|
-
],
|
|
262
|
-
remediation: 'Sanitize CSS input to remove url() functions and expression() directives. Use CSS-specific encoding. Implement Content Security Policy with style-src restrictions.',
|
|
263
|
-
},
|
|
264
|
-
[error_codes_js_1.VulnerabilityCode.XSS_TEMPLATE_LITERAL]: {
|
|
265
|
-
id: 43,
|
|
266
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_TEMPLATE_LITERAL,
|
|
267
|
-
title: 'Cross-Site Scripting - Template Literal Injection',
|
|
268
|
-
description: 'XSS vulnerability through JavaScript template literals (backtick strings) where user input can break out of the template context or inject expressions using ${} syntax, executing arbitrary JavaScript in the client browser context.',
|
|
269
|
-
severity: 'high',
|
|
270
|
-
category: 'xss',
|
|
271
|
-
scanner: 'xss',
|
|
272
|
-
cvss: {
|
|
273
|
-
score: 7.1,
|
|
274
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N',
|
|
275
|
-
severity: 'HIGH',
|
|
276
|
-
},
|
|
277
|
-
cwe: [
|
|
278
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
279
|
-
],
|
|
280
|
-
owasp: [
|
|
281
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
282
|
-
],
|
|
283
|
-
remediation: 'Avoid placing user input inside template literals. Escape backticks, dollar signs, and braces. Use tagged template functions with proper escaping for user data.',
|
|
284
|
-
},
|
|
285
|
-
[error_codes_js_1.VulnerabilityCode.XSS_MUTATION_BASED]: {
|
|
286
|
-
id: 44,
|
|
287
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_MUTATION_BASED,
|
|
288
|
-
title: 'Cross-Site Scripting - Mutation XSS',
|
|
289
|
-
description: 'Mutation-based XSS (mXSS) vulnerability exploiting browser HTML parser quirks and DOM mutations where seemingly safe HTML is transformed into executable script through browser parsing behaviors, bypassing traditional sanitization.',
|
|
290
|
-
severity: 'high',
|
|
291
|
-
category: 'xss',
|
|
292
|
-
scanner: 'xss',
|
|
293
|
-
cvss: {
|
|
294
|
-
score: 7.1,
|
|
295
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N',
|
|
296
|
-
severity: 'HIGH',
|
|
297
|
-
},
|
|
298
|
-
cwe: [
|
|
299
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
300
|
-
],
|
|
301
|
-
owasp: [
|
|
302
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
303
|
-
],
|
|
304
|
-
remediation: 'Use DOMPurify or similar mXSS-aware sanitizers. Avoid innerHTML with user content. Implement Trusted Types. Stay updated on browser parsing behavior changes.',
|
|
305
|
-
},
|
|
306
|
-
[error_codes_js_1.VulnerabilityCode.XSS_CSTI_VUE]: {
|
|
307
|
-
id: 45,
|
|
308
|
-
code: error_codes_js_1.VulnerabilityCode.XSS_CSTI_VUE,
|
|
309
|
-
title: 'Cross-Site Scripting - Vue.js Template Injection',
|
|
310
|
-
description: 'Vue.js client-side template injection vulnerability where user input containing Vue expression syntax like {{}} or v-bind directives is evaluated by the Vue template compiler, leading to arbitrary JavaScript execution in the browser context.',
|
|
311
|
-
severity: 'high',
|
|
312
|
-
category: 'xss',
|
|
313
|
-
scanner: 'xss',
|
|
314
|
-
cvss: {
|
|
315
|
-
score: 7.5,
|
|
316
|
-
vector: 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N',
|
|
317
|
-
severity: 'HIGH',
|
|
318
|
-
},
|
|
319
|
-
cwe: [
|
|
320
|
-
{ id: 'CWE-79', name: 'Cross-Site Scripting', url: 'https://cwe.mitre.org/data/definitions/79.html' },
|
|
321
|
-
{ id: 'CWE-94', name: 'Code Injection', url: 'https://cwe.mitre.org/data/definitions/94.html' },
|
|
322
|
-
],
|
|
323
|
-
owasp: [
|
|
324
|
-
{ id: 'A03:2021', name: 'Injection', url: 'https://owasp.org/Top10/A03_2021-Injection/' },
|
|
325
|
-
],
|
|
326
|
-
remediation: 'Use v-text instead of v-html for user content. Never compile user input as Vue templates. Use vue-runtime-only build that does not include template compiler. Sanitize mustache syntax.',
|
|
327
|
-
},
|
|
328
|
-
};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"xss.js","sourceRoot":"","sources":["xss.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,mBAAmB,CAAC;AAGtD,MAAM,CAAC,MAAM,mBAAmB,GAA4C;IACxE,CAAC,iBAAiB,CAAC,aAAa,CAAC,EAAE;QAC/B,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,aAAa;QACrC,KAAK,EAAE,kCAAkC;QACzC,WAAW,EAAE,4QAA4Q;QACzR,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,gLAAgL;KAChM;IAED,CAAC,iBAAiB,CAAC,UAAU,CAAC,EAAE;QAC5B,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,UAAU;QAClC,KAAK,EAAE,+BAA+B;QACtC,WAAW,EAAE,gTAAgT;QAC7T,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,qLAAqL;KACrM;IAED,CAAC,iBAAiB,CAAC,aAAa,CAAC,EAAE;QAC/B,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,aAAa;QACrC,KAAK,EAAE,kCAAkC;QACzC,WAAW,EAAE,2RAA2R;QACxS,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,iMAAiM;KACjN;IAED,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,EAAE;QACnC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,iBAAiB;QACzC,KAAK,EAAE,sCAAsC;QAC7C,WAAW,EAAE,6QAA6Q;QAC1R,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,gNAAgN;KAChO;IAED,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,EAAE;QAClC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,gBAAgB;QACxC,KAAK,EAAE,mDAAmD;QAC1D,WAAW,EAAE,2QAA2Q;QACxR,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;YACrG,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,gBAAgB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SAClG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,yMAAyM;KACzN;IAED,CAAC,iBAAiB,CAAC,cAAc,CAAC,EAAE;QAChC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,cAAc;QACtC,KAAK,EAAE,mCAAmC;QAC1C,WAAW,EAAE,mRAAmR;QAChS,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,iLAAiL;KACjM;IAED,CAAC,iBAAiB,CAAC,cAAc,CAAC,EAAE;QAChC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,cAAc;QACtC,KAAK,EAAE,2CAA2C;QAClD,WAAW,EAAE,kRAAkR;QAC/R,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,6LAA6L;KAC7M;IAED,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,EAAE;QACnC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,iBAAiB;QACzC,KAAK,EAAE,gDAAgD;QACvD,WAAW,EAAE,kQAAkQ;QAC/Q,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,2KAA2K;KAC3L;IAED,CAAC,iBAAiB,CAAC,oBAAoB,CAAC,EAAE;QACtC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,oBAAoB;QAC5C,KAAK,EAAE,6CAA6C;QACpD,WAAW,EAAE,mPAAmP;QAChQ,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,2KAA2K;KAC3L;IAED,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,EAAE;QACpC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,kBAAkB;QAC1C,KAAK,EAAE,uCAAuC;QAC9C,WAAW,EAAE,uQAAuQ;QACpR,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,2KAA2K;KAC3L;IAED,CAAC,iBAAiB,CAAC,uBAAuB,CAAC,EAAE;QACzC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,uBAAuB;QAC/C,KAAK,EAAE,4CAA4C;QACnD,WAAW,EAAE,qOAAqO;QAClP,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,iMAAiM;KACjN;IAED,CAAC,iBAAiB,CAAC,iBAAiB,CAAC,EAAE;QACnC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,iBAAiB;QACzC,KAAK,EAAE,sCAAsC;QAC7C,WAAW,EAAE,0PAA0P;QACvQ,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,QAAQ;SACrB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,qKAAqK;KACrL;IAED,CAAC,iBAAiB,CAAC,oBAAoB,CAAC,EAAE;QACtC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,oBAAoB;QAC5C,KAAK,EAAE,mDAAmD;QAC1D,WAAW,EAAE,wOAAwO;QACrP,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,kKAAkK;KAClL;IAED,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,EAAE;QACpC,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,kBAAkB;QAC1C,KAAK,EAAE,qCAAqC;QAC5C,WAAW,EAAE,wOAAwO;QACrP,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SACxG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,+JAA+J;KAC/K;IAED,CAAC,iBAAiB,CAAC,YAAY,CAAC,EAAE;QAC9B,EAAE,EAAE,EAAE;QACN,IAAI,EAAE,iBAAiB,CAAC,YAAY;QACpC,KAAK,EAAE,kDAAkD;QACzD,WAAW,EAAE,mPAAmP;QAChQ,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,KAAK;QACf,OAAO,EAAE,KAAK;QACd,IAAI,EAAE;YACF,KAAK,EAAE,GAAG;YACV,MAAM,EAAE,8CAA8C;YACtD,QAAQ,EAAE,MAAM;SACnB;QACD,GAAG,EAAE;YACD,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,sBAAsB,EAAE,GAAG,EAAE,gDAAgD,EAAE;YACrG,EAAE,EAAE,EAAE,QAAQ,EAAE,IAAI,EAAE,gBAAgB,EAAE,GAAG,EAAE,gDAAgD,EAAE;SAClG;QACD,KAAK,EAAE;YACH,EAAE,EAAE,EAAE,UAAU,EAAE,IAAI,EAAE,WAAW,EAAE,GAAG,EAAE,6CAA6C,EAAE;SAC5F;QACD,WAAW,EAAE,yLAAyL;KACzM;CACJ,CAAC"}
|
package/src/error-codes.d.ts
DELETED
|
@@ -1,242 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Vulnerability Registry - Error Codes
|
|
3
|
-
*
|
|
4
|
-
* Central enum containing all vulnerability error codes across all scanners.
|
|
5
|
-
* Each code maps to a complete VulnerabilityDefinition.
|
|
6
|
-
*/
|
|
7
|
-
export declare enum VulnerabilityCode {
|
|
8
|
-
SQLI_ERROR_BASED = "SQLI_ERROR_BASED",
|
|
9
|
-
SQLI_BOOLEAN_BASED = "SQLI_BOOLEAN_BASED",
|
|
10
|
-
SQLI_TIME_BASED = "SQLI_TIME_BASED",
|
|
11
|
-
SQLI_STACK_BASED = "SQLI_STACK_BASED",
|
|
12
|
-
SQLI_UNION_BASED = "SQLI_UNION_BASED",
|
|
13
|
-
XSS_REFLECTED = "XSS_REFLECTED",
|
|
14
|
-
XSS_STORED = "XSS_STORED",
|
|
15
|
-
XSS_DOM_BASED = "XSS_DOM_BASED",
|
|
16
|
-
XSS_SVG_INJECTION = "XSS_SVG_INJECTION",
|
|
17
|
-
XSS_CSTI_ANGULAR = "XSS_CSTI_ANGULAR",
|
|
18
|
-
XSS_CSTI_VUE = "XSS_CSTI_VUE",
|
|
19
|
-
XSS_EVENT_HANDLER = "XSS_EVENT_HANDLER",
|
|
20
|
-
XSS_SCRIPT_INJECTION = "XSS_SCRIPT_INJECTION",
|
|
21
|
-
XSS_HTML_INJECTION = "XSS_HTML_INJECTION",
|
|
22
|
-
XSS_ATTRIBUTE_INJECTION = "XSS_ATTRIBUTE_INJECTION",
|
|
23
|
-
XSS_JS_CONTEXT = "XSS_JS_CONTEXT",
|
|
24
|
-
XSS_CSS_INJECTION = "XSS_CSS_INJECTION",
|
|
25
|
-
XSS_CSP_BYPASS = "XSS_CSP_BYPASS",
|
|
26
|
-
XSS_TEMPLATE_LITERAL = "XSS_TEMPLATE_LITERAL",
|
|
27
|
-
XSS_MUTATION_BASED = "XSS_MUTATION_BASED",
|
|
28
|
-
CMDI_OOB_CONFIRMED = "CMDI_OOB_CONFIRMED",
|
|
29
|
-
CMDI_REFLECTED = "CMDI_REFLECTED",
|
|
30
|
-
CMDI_TIME_BASED = "CMDI_TIME_BASED",
|
|
31
|
-
CMDI_ERROR_BASED = "CMDI_ERROR_BASED",
|
|
32
|
-
SSRF_CLOUD_METADATA = "SSRF_CLOUD_METADATA",
|
|
33
|
-
SSRF_INTERNAL_SERVICE = "SSRF_INTERNAL_SERVICE",
|
|
34
|
-
SSRF_PROTOCOL_SMUGGLING = "SSRF_PROTOCOL_SMUGGLING",
|
|
35
|
-
SSRF_BLIND_OOB = "SSRF_BLIND_OOB",
|
|
36
|
-
SSRF_FILTER_BYPASS = "SSRF_FILTER_BYPASS",
|
|
37
|
-
SSTI_JINJA2 = "SSTI_JINJA2",
|
|
38
|
-
SSTI_TWIG = "SSTI_TWIG",
|
|
39
|
-
SSTI_FREEMARKER = "SSTI_FREEMARKER",
|
|
40
|
-
SSTI_VELOCITY = "SSTI_VELOCITY",
|
|
41
|
-
SSTI_THYMELEAF = "SSTI_THYMELEAF",
|
|
42
|
-
SSTI_ERB = "SSTI_ERB",
|
|
43
|
-
SSTI_EJS = "SSTI_EJS",
|
|
44
|
-
SSTI_PUG = "SSTI_PUG",
|
|
45
|
-
SSTI_SMARTY = "SSTI_SMARTY",
|
|
46
|
-
SSTI_MAKO = "SSTI_MAKO",
|
|
47
|
-
SSTI_GENERIC = "SSTI_GENERIC",
|
|
48
|
-
XXE_CLASSIC = "XXE_CLASSIC",
|
|
49
|
-
XXE_BLIND = "XXE_BLIND",
|
|
50
|
-
XXE_OOB = "XXE_OOB",
|
|
51
|
-
XXE_ERROR_BASED = "XXE_ERROR_BASED",
|
|
52
|
-
XXE_PARAMETER_ENTITY = "XXE_PARAMETER_ENTITY",
|
|
53
|
-
XPATH_AUTH_BYPASS = "XPATH_AUTH_BYPASS",
|
|
54
|
-
XPATH_DATA_EXTRACTION = "XPATH_DATA_EXTRACTION",
|
|
55
|
-
XPATH_BLIND = "XPATH_BLIND",
|
|
56
|
-
XPATH_ERROR_BASED = "XPATH_ERROR_BASED",
|
|
57
|
-
LFI_PATH_TRAVERSAL = "LFI_PATH_TRAVERSAL",
|
|
58
|
-
LFI_FILTER_BYPASS = "LFI_FILTER_BYPASS",
|
|
59
|
-
LFI_SOURCE_DISCLOSURE = "LFI_SOURCE_DISCLOSURE",
|
|
60
|
-
LFI_WRAPPER_PROTOCOL = "LFI_WRAPPER_PROTOCOL",
|
|
61
|
-
LFI_PROC_DISCLOSURE = "LFI_PROC_DISCLOSURE",
|
|
62
|
-
JWT_NONE_ALGORITHM = "JWT_NONE_ALGORITHM",
|
|
63
|
-
JWT_WEAK_SECRET = "JWT_WEAK_SECRET",
|
|
64
|
-
JWT_KEY_CONFUSION = "JWT_KEY_CONFUSION",
|
|
65
|
-
JWT_EXPIRED_TOKEN = "JWT_EXPIRED_TOKEN",
|
|
66
|
-
JWT_MISSING_CLAIMS = "JWT_MISSING_CLAIMS",
|
|
67
|
-
JWT_CLAIM_TAMPERING = "JWT_CLAIM_TAMPERING",
|
|
68
|
-
JWT_KID_INJECTION = "JWT_KID_INJECTION",
|
|
69
|
-
JWT_JKU_INJECTION = "JWT_JKU_INJECTION",
|
|
70
|
-
JWT_EMBEDDED_JWK = "JWT_EMBEDDED_JWK",
|
|
71
|
-
JWT_X5C_INJECTION = "JWT_X5C_INJECTION",
|
|
72
|
-
REDIRECT_HEADER_INJECTION = "REDIRECT_HEADER_INJECTION",
|
|
73
|
-
REDIRECT_META_REFRESH = "REDIRECT_META_REFRESH",
|
|
74
|
-
REDIRECT_JS_NAVIGATION = "REDIRECT_JS_NAVIGATION",
|
|
75
|
-
BAC_ANONYMOUS_ACCESS = "BAC_ANONYMOUS_ACCESS",
|
|
76
|
-
BAC_HORIZONTAL_PRIVILEGE = "BAC_HORIZONTAL_PRIVILEGE",
|
|
77
|
-
BAC_VERTICAL_PRIVILEGE = "BAC_VERTICAL_PRIVILEGE",
|
|
78
|
-
BAC_IDOR = "BAC_IDOR",
|
|
79
|
-
HEADER_MISSING_CSP = "HEADER_MISSING_CSP",
|
|
80
|
-
HEADER_MISSING_HSTS = "HEADER_MISSING_HSTS",
|
|
81
|
-
HEADER_MISSING_XFRAME = "HEADER_MISSING_XFRAME",
|
|
82
|
-
HEADER_MISSING_XCONTENT_TYPE = "HEADER_MISSING_XCONTENT_TYPE",
|
|
83
|
-
HEADER_MISSING_XSS_PROTECTION = "HEADER_MISSING_XSS_PROTECTION",
|
|
84
|
-
HEADER_MISSING_REFERRER_POLICY = "HEADER_MISSING_REFERRER_POLICY",
|
|
85
|
-
HEADER_MISSING_PERMISSIONS_POLICY = "HEADER_MISSING_PERMISSIONS_POLICY",
|
|
86
|
-
HEADER_WEAK_CSP = "HEADER_WEAK_CSP",
|
|
87
|
-
HEADER_CORS_MISCONFIGURED = "HEADER_CORS_MISCONFIGURED",
|
|
88
|
-
HEADER_COEP_WITHOUT_COOP = "HEADER_COEP_WITHOUT_COOP",
|
|
89
|
-
HEADER_CORP_UNUSUAL = "HEADER_CORP_UNUSUAL",
|
|
90
|
-
HEADER_EXPECT_CT_PRESENT = "HEADER_EXPECT_CT_PRESENT",
|
|
91
|
-
HEADER_SERVER_HEADER_PRESENT = "HEADER_SERVER_HEADER_PRESENT",
|
|
92
|
-
HEADER_X_POWERED_BY_PRESENT = "HEADER_X_POWERED_BY_PRESENT",
|
|
93
|
-
HEADER_X_XSS_PROTECTION_ENABLED = "HEADER_X_XSS_PROTECTION_ENABLED",
|
|
94
|
-
COOKIE_SAMESITE_NONE_WITHOUT_SECURE = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE",
|
|
95
|
-
COOKIE_SESSION_MISSING_SECURE = "COOKIE_SESSION_MISSING_SECURE",
|
|
96
|
-
COOKIE_MISSING_SECURE = "COOKIE_MISSING_SECURE",
|
|
97
|
-
COOKIE_SESSION_MISSING_HTTPONLY = "COOKIE_SESSION_MISSING_HTTPONLY",
|
|
98
|
-
COOKIE_MISSING_HTTPONLY = "COOKIE_MISSING_HTTPONLY",
|
|
99
|
-
COOKIE_MISSING_SAMESITE = "COOKIE_MISSING_SAMESITE",
|
|
100
|
-
COOKIE_HOST_PREFIX_INVALID = "COOKIE_HOST_PREFIX_INVALID",
|
|
101
|
-
COOKIE_SECURE_PREFIX_INVALID = "COOKIE_SECURE_PREFIX_INVALID",
|
|
102
|
-
HEADER_DRIFT_CSP = "HEADER_DRIFT_CSP",
|
|
103
|
-
HEADER_DRIFT_HSTS = "HEADER_DRIFT_HSTS",
|
|
104
|
-
HEADER_DRIFT_XCONTENT_TYPE = "HEADER_DRIFT_XCONTENT_TYPE",
|
|
105
|
-
HEADER_DRIFT_REFERRER_POLICY = "HEADER_DRIFT_REFERRER_POLICY",
|
|
106
|
-
HEADER_DRIFT_XFRAME = "HEADER_DRIFT_XFRAME",
|
|
107
|
-
HEADER_DRIFT_PERMISSIONS_POLICY = "HEADER_DRIFT_PERMISSIONS_POLICY",
|
|
108
|
-
HEADER_DRIFT_COOP = "HEADER_DRIFT_COOP",
|
|
109
|
-
HEADER_DRIFT_COEP = "HEADER_DRIFT_COEP",
|
|
110
|
-
HEADER_DRIFT_CORP = "HEADER_DRIFT_CORP",
|
|
111
|
-
HOST_CACHE_POISONING = "HOST_CACHE_POISONING",
|
|
112
|
-
HOST_PASSWORD_RESET = "HOST_PASSWORD_RESET",
|
|
113
|
-
HOST_REDIRECT = "HOST_REDIRECT",
|
|
114
|
-
DIRBROWSE_ENABLED = "DIRBROWSE_ENABLED",
|
|
115
|
-
DIRBROWSE_SENSITIVE = "DIRBROWSE_SENSITIVE",
|
|
116
|
-
MASSASSIGN_PROTOTYPE_POLLUTION = "MASSASSIGN_PROTOTYPE_POLLUTION",
|
|
117
|
-
MASSASSIGN_ROLE_ESCALATION = "MASSASSIGN_ROLE_ESCALATION",
|
|
118
|
-
MASSASSIGN_HIDDEN_FIELD = "MASSASSIGN_HIDDEN_FIELD",
|
|
119
|
-
DESER_JAVA = "DESER_JAVA",
|
|
120
|
-
DESER_PHP = "DESER_PHP",
|
|
121
|
-
DESER_PYTHON = "DESER_PYTHON",
|
|
122
|
-
DESER_DOTNET = "DESER_DOTNET",
|
|
123
|
-
DESER_RUBY = "DESER_RUBY",
|
|
124
|
-
DESER_NODE = "DESER_NODE",
|
|
125
|
-
SENS_CRIT_AWS_CREDENTIALS = "SENS_CRIT_AWS_CREDENTIALS",
|
|
126
|
-
SENS_CRIT_SSH_PRIVATE_KEY = "SENS_CRIT_SSH_PRIVATE_KEY",
|
|
127
|
-
SENS_CRIT_SSL_PRIVATE_KEY = "SENS_CRIT_SSL_PRIVATE_KEY",
|
|
128
|
-
SENS_CRIT_RAILS_MASTER_KEY = "SENS_CRIT_RAILS_MASTER_KEY",
|
|
129
|
-
SENS_CRIT_TERRAFORM_STATE = "SENS_CRIT_TERRAFORM_STATE",
|
|
130
|
-
SENS_CRIT_FIREBASE_ADMIN_SDK = "SENS_CRIT_FIREBASE_ADMIN_SDK",
|
|
131
|
-
SENS_CRIT_KUBE_CONFIG = "SENS_CRIT_KUBE_CONFIG",
|
|
132
|
-
SENS_CRIT_AZURE_STORAGE_KEY = "SENS_CRIT_AZURE_STORAGE_KEY",
|
|
133
|
-
SENS_CRIT_CONSUL_KV = "SENS_CRIT_CONSUL_KV",
|
|
134
|
-
SENS_CRIT_VAULT_SECRET = "SENS_CRIT_VAULT_SECRET",
|
|
135
|
-
SENS_CRIT_DOCKER_SECRET = "SENS_CRIT_DOCKER_SECRET",
|
|
136
|
-
SENS_HIGH_GIT_EXPOSED = "SENS_HIGH_GIT_EXPOSED",
|
|
137
|
-
SENS_HIGH_GIT_CONFIG = "SENS_HIGH_GIT_CONFIG",
|
|
138
|
-
SENS_HIGH_WORDPRESS_CONFIG = "SENS_HIGH_WORDPRESS_CONFIG",
|
|
139
|
-
SENS_HIGH_SPRING_ACTUATOR = "SENS_HIGH_SPRING_ACTUATOR",
|
|
140
|
-
SENS_HIGH_SPRING_HEAPDUMP = "SENS_HIGH_SPRING_HEAPDUMP",
|
|
141
|
-
SENS_HIGH_DATABASE_BACKUP = "SENS_HIGH_DATABASE_BACKUP",
|
|
142
|
-
SENS_HIGH_PHPINFO = "SENS_HIGH_PHPINFO",
|
|
143
|
-
SENS_HIGH_LARAVEL_DEBUG = "SENS_HIGH_LARAVEL_DEBUG",
|
|
144
|
-
SENS_HIGH_GCP_SERVICE_ACCOUNT = "SENS_HIGH_GCP_SERVICE_ACCOUNT",
|
|
145
|
-
SENS_HIGH_GRAPHQL_INTROSPECTION = "SENS_HIGH_GRAPHQL_INTROSPECTION",
|
|
146
|
-
SENS_HIGH_PHPMYADMIN = "SENS_HIGH_PHPMYADMIN",
|
|
147
|
-
SENS_HIGH_MONGODB_CONFIG = "SENS_HIGH_MONGODB_CONFIG",
|
|
148
|
-
SENS_HIGH_JAVA_KEYSTORE = "SENS_HIGH_JAVA_KEYSTORE",
|
|
149
|
-
SENS_HIGH_PHP_SESSION = "SENS_HIGH_PHP_SESSION",
|
|
150
|
-
SENS_HIGH_ENV_FILE = "SENS_HIGH_ENV_FILE",
|
|
151
|
-
SENS_HIGH_BACKUP_FILE = "SENS_HIGH_BACKUP_FILE",
|
|
152
|
-
SENS_HIGH_HTPASSWD = "SENS_HIGH_HTPASSWD",
|
|
153
|
-
SENS_HIGH_DS_STORE = "SENS_HIGH_DS_STORE",
|
|
154
|
-
SENS_MED_SWAGGER_DOCS = "SENS_MED_SWAGGER_DOCS",
|
|
155
|
-
SENS_MED_APACHE_STATUS = "SENS_MED_APACHE_STATUS",
|
|
156
|
-
SENS_MED_PROMETHEUS_METRICS = "SENS_MED_PROMETHEUS_METRICS",
|
|
157
|
-
SENS_MED_DOCKERFILE = "SENS_MED_DOCKERFILE",
|
|
158
|
-
SENS_MED_FIREBASE_CONFIG = "SENS_MED_FIREBASE_CONFIG",
|
|
159
|
-
SENS_MED_SOURCE_MAP = "SENS_MED_SOURCE_MAP",
|
|
160
|
-
SENS_MED_ELASTICSEARCH = "SENS_MED_ELASTICSEARCH",
|
|
161
|
-
SENS_MED_ADMIN_PANEL = "SENS_MED_ADMIN_PANEL",
|
|
162
|
-
SENS_MED_COMPOSER_LOCK = "SENS_MED_COMPOSER_LOCK",
|
|
163
|
-
SENS_MED_PACKAGE_LOCK = "SENS_MED_PACKAGE_LOCK",
|
|
164
|
-
SENS_MED_GEMFILE_LOCK = "SENS_MED_GEMFILE_LOCK",
|
|
165
|
-
SENS_MED_ROBOTS_TXT = "SENS_MED_ROBOTS_TXT",
|
|
166
|
-
SENS_MED_SITEMAP = "SENS_MED_SITEMAP",
|
|
167
|
-
SENS_MED_CROSSDOMAIN_XML = "SENS_MED_CROSSDOMAIN_XML",
|
|
168
|
-
SENS_LOW_TRAVIS_CI = "SENS_LOW_TRAVIS_CI",
|
|
169
|
-
SENS_LOW_JENKINSFILE = "SENS_LOW_JENKINSFILE",
|
|
170
|
-
SENS_LOW_CIRCLECI = "SENS_LOW_CIRCLECI",
|
|
171
|
-
SENS_LOW_GITLAB_CI = "SENS_LOW_GITLAB_CI",
|
|
172
|
-
SENS_LOW_README = "SENS_LOW_README",
|
|
173
|
-
SENS_LOW_CHANGELOG = "SENS_LOW_CHANGELOG",
|
|
174
|
-
SENS_LOW_LICENSE = "SENS_LOW_LICENSE",
|
|
175
|
-
SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED",
|
|
176
|
-
SENS_HIGH_APPSETTINGS_JSON_EXPOSED = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED",
|
|
177
|
-
SENS_HIGH_SPRING_CONFIG_EXPOSED = "SENS_HIGH_SPRING_CONFIG_EXPOSED",
|
|
178
|
-
SENS_HIGH_NPMRC_EXPOSED = "SENS_HIGH_NPMRC_EXPOSED",
|
|
179
|
-
SENS_HIGH_RAILS_DATABASE_YML_EXPOSED = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED",
|
|
180
|
-
SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED",
|
|
181
|
-
SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED",
|
|
182
|
-
SENS_HIGH_JOLOKIA_EXPOSED = "SENS_HIGH_JOLOKIA_EXPOSED",
|
|
183
|
-
SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED",
|
|
184
|
-
SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED",
|
|
185
|
-
SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED",
|
|
186
|
-
SENS_HIGH_REDIS_RDB_DUMP_DETECTED = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED",
|
|
187
|
-
SENS_HIGH_TRACE_AXD = "SENS_HIGH_TRACE_AXD",
|
|
188
|
-
SENS_HIGH_ELMAH_AXD_EXPOSED = "SENS_HIGH_ELMAH_AXD_EXPOSED",
|
|
189
|
-
SENS_HIGH_SQLITE_DATABASE_DETECTED = "SENS_HIGH_SQLITE_DATABASE_DETECTED",
|
|
190
|
-
SENS_HIGH_AWS_CONFIG_EXPOSED = "SENS_HIGH_AWS_CONFIG_EXPOSED",
|
|
191
|
-
SENS_HIGH_AZURE_CREDENTIALS_EXPOSED = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED",
|
|
192
|
-
SENS_HIGH_HELM_VALUES_EXPOSED = "SENS_HIGH_HELM_VALUES_EXPOSED",
|
|
193
|
-
SENS_HIGH_TERRAFORM_VARS_EXPOSED = "SENS_HIGH_TERRAFORM_VARS_EXPOSED",
|
|
194
|
-
SENS_HIGH_LARAVEL_LOG_EXPOSED = "SENS_HIGH_LARAVEL_LOG_EXPOSED",
|
|
195
|
-
SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED",
|
|
196
|
-
SENS_HIGH_ADMINER_EXPOSED = "SENS_HIGH_ADMINER_EXPOSED",
|
|
197
|
-
SENS_HIGH_DEBUG_ENDPOINT_EXPOSED = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED",
|
|
198
|
-
SENS_HIGH_GO_DEBUG_VARS_EXPOSED = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED",
|
|
199
|
-
SENS_HIGH_GO_PPROF_EXPOSED = "SENS_HIGH_GO_PPROF_EXPOSED",
|
|
200
|
-
SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED",
|
|
201
|
-
SENS_HIGH_MONGO_RC_EXPOSED = "SENS_HIGH_MONGO_RC_EXPOSED",
|
|
202
|
-
SENS_MED_UN_PROTECTED_CONFIG_JSON = "SENS_MED_UN_PROTECTED_CONFIG_JSON",
|
|
203
|
-
SENS_MED_MERCURIAL_REPOSITORY_FOUND = "SENS_MED_MERCURIAL_REPOSITORY_FOUND",
|
|
204
|
-
SENS_MED_MERCURIAL_HGRC_EXPOSED = "SENS_MED_MERCURIAL_HGRC_EXPOSED",
|
|
205
|
-
SENS_MED_CVS_ROOT_EXPOSED = "SENS_MED_CVS_ROOT_EXPOSED",
|
|
206
|
-
SENS_MED_CVS_ENTRIES_EXPOSED = "SENS_MED_CVS_ENTRIES_EXPOSED",
|
|
207
|
-
SENS_MED_BAZAAR_REPO_EXPOSED = "SENS_MED_BAZAAR_REPO_EXPOSED",
|
|
208
|
-
SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED",
|
|
209
|
-
SENS_MED_LARAVEL_LOG_VIEWER_ENABLED = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED",
|
|
210
|
-
SENS_MED_APACHE_HTACCESS_FILE_DETECTED = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED",
|
|
211
|
-
SENS_MED_APACHE_SERVER_INFO_EXPOSED = "SENS_MED_APACHE_SERVER_INFO_EXPOSED",
|
|
212
|
-
SENS_MED_PACKAGE_DEPENDENCIES_DETECTED = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED",
|
|
213
|
-
SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED",
|
|
214
|
-
SENS_MED_SSH_PUBLIC_KEY_EXPOSED = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED",
|
|
215
|
-
SENS_MED_SSL_CERTIFICATE_EXPOSED = "SENS_MED_SSL_CERTIFICATE_EXPOSED",
|
|
216
|
-
SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED",
|
|
217
|
-
SENS_MED_GRAPHI_QL_EXPOSED = "SENS_MED_GRAPHI_QL_EXPOSED",
|
|
218
|
-
SENS_MED_TERRAFORM_LOCK_EXPOSED = "SENS_MED_TERRAFORM_LOCK_EXPOSED",
|
|
219
|
-
SENS_MED_ERROR_LOG_EXPOSED = "SENS_MED_ERROR_LOG_EXPOSED",
|
|
220
|
-
SENS_MED_ACCESS_LOG_EXPOSED = "SENS_MED_ACCESS_LOG_EXPOSED",
|
|
221
|
-
SENS_MED_DEBUG_LOG_EXPOSED = "SENS_MED_DEBUG_LOG_EXPOSED",
|
|
222
|
-
SENS_MED_APPLICATION_LOG_EXPOSED = "SENS_MED_APPLICATION_LOG_EXPOSED",
|
|
223
|
-
SENS_MED_WSDL_EXPOSED = "SENS_MED_WSDL_EXPOSED",
|
|
224
|
-
SENS_MED_WORD_PRESS_XML_RPC_EXPOSED = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED",
|
|
225
|
-
SENS_LOW_TOML_PROJECT_FILE_EXPOSED = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED",
|
|
226
|
-
SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED",
|
|
227
|
-
SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED",
|
|
228
|
-
SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED",
|
|
229
|
-
SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED",
|
|
230
|
-
SENS_LOW_PYTHON_REQUIREMENTS_DETECTED = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED",
|
|
231
|
-
SENS_LOW_TEST_ENDPOINT_EXPOSED = "SENS_LOW_TEST_ENDPOINT_EXPOSED",
|
|
232
|
-
SENS_LOW_STAGING_ENDPOINT_EXPOSED = "SENS_LOW_STAGING_ENDPOINT_EXPOSED",
|
|
233
|
-
SENS_LOW_EDITOR_BACKUP_FILE_DETECTED = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED",
|
|
234
|
-
SENS_LOW_VIM_SWAP_FILE_DETECTED = "SENS_LOW_VIM_SWAP_FILE_DETECTED",
|
|
235
|
-
SENS_LOW_DIRECTORY_LISTING_ENABLED = "SENS_LOW_DIRECTORY_LISTING_ENABLED",
|
|
236
|
-
SENS_LOW_AWSSAM_TEMPLATE_EXPOSED = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED",
|
|
237
|
-
SENS_LOW_SERVERLESS_CONFIG_EXPOSED = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED",
|
|
238
|
-
SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED",
|
|
239
|
-
CLICK_FRAMEABLE = "CLICK_FRAMEABLE",
|
|
240
|
-
CLICK_PARTIAL_PROTECTION = "CLICK_PARTIAL_PROTECTION"
|
|
241
|
-
}
|
|
242
|
-
export default VulnerabilityCode;
|
package/src/error-codes.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"error-codes.d.ts","sourceRoot":"","sources":["error-codes.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,oBAAY,iBAAiB;IAIzB,gBAAgB,qBAAqB;IACrC,kBAAkB,uBAAuB;IACzC,eAAe,oBAAoB;IACnC,gBAAgB,qBAAqB;IACrC,gBAAgB,qBAAqB;IAKrC,aAAa,kBAAkB;IAC/B,UAAU,eAAe;IACzB,aAAa,kBAAkB;IAC/B,iBAAiB,sBAAsB;IACvC,gBAAgB,qBAAqB;IACrC,YAAY,iBAAiB;IAC7B,iBAAiB,sBAAsB;IACvC,oBAAoB,yBAAyB;IAC7C,kBAAkB,uBAAuB;IACzC,uBAAuB,4BAA4B;IACnD,cAAc,mBAAmB;IACjC,iBAAiB,sBAAsB;IACvC,cAAc,mBAAmB;IACjC,oBAAoB,yBAAyB;IAC7C,kBAAkB,uBAAuB;IAKzC,kBAAkB,uBAAuB;IACzC,cAAc,mBAAmB;IACjC,eAAe,oBAAoB;IACnC,gBAAgB,qBAAqB;IAKrC,mBAAmB,wBAAwB;IAC3C,qBAAqB,0BAA0B;IAC/C,uBAAuB,4BAA4B;IACnD,cAAc,mBAAmB;IACjC,kBAAkB,uBAAuB;IAKzC,WAAW,gBAAgB;IAC3B,SAAS,cAAc;IACvB,eAAe,oBAAoB;IACnC,aAAa,kBAAkB;IAC/B,cAAc,mBAAmB;IACjC,QAAQ,aAAa;IACrB,QAAQ,aAAa;IACrB,QAAQ,aAAa;IACrB,WAAW,gBAAgB;IAC3B,SAAS,cAAc;IACvB,YAAY,iBAAiB;IAK7B,WAAW,gBAAgB;IAC3B,SAAS,cAAc;IACvB,OAAO,YAAY;IACnB,eAAe,oBAAoB;IACnC,oBAAoB,yBAAyB;IAK7C,iBAAiB,sBAAsB;IACvC,qBAAqB,0BAA0B;IAC/C,WAAW,gBAAgB;IAC3B,iBAAiB,sBAAsB;IAKvC,kBAAkB,uBAAuB;IACzC,iBAAiB,sBAAsB;IACvC,qBAAqB,0BAA0B;IAC/C,oBAAoB,yBAAyB;IAC7C,mBAAmB,wBAAwB;IAK3C,kBAAkB,uBAAuB;IACzC,eAAe,oBAAoB;IACnC,iBAAiB,sBAAsB;IACvC,iBAAiB,sBAAsB;IACvC,kBAAkB,uBAAuB;IACzC,mBAAmB,wBAAwB;IAC3C,iBAAiB,sBAAsB;IACvC,iBAAiB,sBAAsB;IACvC,gBAAgB,qBAAqB;IACrC,iBAAiB,sBAAsB;IAKvC,yBAAyB,8BAA8B;IACvD,qBAAqB,0BAA0B;IAC/C,sBAAsB,2BAA2B;IAKjD,oBAAoB,yBAAyB;IAC7C,wBAAwB,6BAA6B;IACrD,sBAAsB,2BAA2B;IACjD,QAAQ,aAAa;IAKrB,kBAAkB,uBAAuB;IACzC,mBAAmB,wBAAwB;IAC3C,qBAAqB,0BAA0B;IAC/C,4BAA4B,iCAAiC;IAC7D,6BAA6B,kCAAkC;IAC/D,8BAA8B,mCAAmC;IACjE,iCAAiC,sCAAsC;IACvE,eAAe,oBAAoB;IACnC,yBAAyB,8BAA8B;IACvD,wBAAwB,6BAA6B;IACrD,mBAAmB,wBAAwB;IAC3C,wBAAwB,6BAA6B;IACrD,4BAA4B,iCAAiC;IAC7D,2BAA2B,gCAAgC;IAC3D,+BAA+B,oCAAoC;IACnE,mCAAmC,wCAAwC;IAC3E,6BAA6B,kCAAkC;IAC/D,qBAAqB,0BAA0B;IAC/C,+BAA+B,oCAAoC;IACnE,uBAAuB,4BAA4B;IACnD,uBAAuB,4BAA4B;IACnD,0BAA0B,+BAA+B;IACzD,4BAA4B,iCAAiC;IAC7D,gBAAgB,qBAAqB;IACrC,iBAAiB,sBAAsB;IACvC,0BAA0B,+BAA+B;IACzD,4BAA4B,iCAAiC;IAC7D,mBAAmB,wBAAwB;IAC3C,+BAA+B,oCAAoC;IACnE,iBAAiB,sBAAsB;IACvC,iBAAiB,sBAAsB;IACvC,iBAAiB,sBAAsB;IAKvC,oBAAoB,yBAAyB;IAC7C,mBAAmB,wBAAwB;IAC3C,aAAa,kBAAkB;IAK/B,iBAAiB,sBAAsB;IACvC,mBAAmB,wBAAwB;IAK3C,8BAA8B,mCAAmC;IACjE,0BAA0B,+BAA+B;IACzD,uBAAuB,4BAA4B;IAKnD,UAAU,eAAe;IACzB,SAAS,cAAc;IACvB,YAAY,iBAAiB;IAC7B,YAAY,iBAAiB;IAC7B,UAAU,eAAe;IACzB,UAAU,eAAe;IAKzB,yBAAyB,8BAA8B;IACvD,yBAAyB,8BAA8B;IACvD,yBAAyB,8BAA8B;IACvD,0BAA0B,+BAA+B;IACzD,yBAAyB,8BAA8B;IACvD,4BAA4B,iCAAiC;IAC7D,qBAAqB,0BAA0B;IAC/C,2BAA2B,gCAAgC;IAC3D,mBAAmB,wBAAwB;IAC3C,sBAAsB,2BAA2B;IACjD,uBAAuB,4BAA4B;IAKnD,qBAAqB,0BAA0B;IAC/C,oBAAoB,yBAAyB;IAC7C,0BAA0B,+BAA+B;IACzD,yBAAyB,8BAA8B;IACvD,yBAAyB,8BAA8B;IACvD,yBAAyB,8BAA8B;IACvD,iBAAiB,sBAAsB;IACvC,uBAAuB,4BAA4B;IACnD,6BAA6B,kCAAkC;IAC/D,+BAA+B,oCAAoC;IACnE,oBAAoB,yBAAyB;IAC7C,wBAAwB,6BAA6B;IACrD,uBAAuB,4BAA4B;IACnD,qBAAqB,0BAA0B;IAC/C,kBAAkB,uBAAuB;IACzC,qBAAqB,0BAA0B;IAC/C,kBAAkB,uBAAuB;IACzC,kBAAkB,uBAAuB;IAKzC,qBAAqB,0BAA0B;IAC/C,sBAAsB,2BAA2B;IACjD,2BAA2B,gCAAgC;IAC3D,mBAAmB,wBAAwB;IAC3C,wBAAwB,6BAA6B;IACrD,mBAAmB,wBAAwB;IAC3C,sBAAsB,2BAA2B;IACjD,oBAAoB,yBAAyB;IAC7C,sBAAsB,2BAA2B;IACjD,qBAAqB,0BAA0B;IAC/C,qBAAqB,0BAA0B;IAC/C,mBAAmB,wBAAwB;IAC3C,gBAAgB,qBAAqB;IACrC,wBAAwB,6BAA6B;IAKrD,kBAAkB,uBAAuB;IACzC,oBAAoB,yBAAyB;IAC7C,iBAAiB,sBAAsB;IACvC,kBAAkB,uBAAuB;IACzC,eAAe,oBAAoB;IACnC,kBAAkB,uBAAuB;IACzC,gBAAgB,qBAAqB;IAMrC,gDAAgD,qDAAqD;IACrG,kCAAkC,uCAAuC;IACzE,+BAA+B,oCAAoC;IACnE,uBAAuB,4BAA4B;IACnD,oCAAoC,yCAAyC;IAC7E,qCAAqC,0CAA0C;IAC/E,iCAAiC,sCAAsC;IACvE,yBAAyB,8BAA8B;IACvD,2CAA2C,gDAAgD;IAC3F,wCAAwC,6CAA6C;IACrF,yCAAyC,8CAA8C;IACvF,iCAAiC,sCAAsC;IACvE,mBAAmB,wBAAwB;IAC3C,2BAA2B,gCAAgC;IAC3D,kCAAkC,uCAAuC;IACzE,4BAA4B,iCAAiC;IAC7D,mCAAmC,wCAAwC;IAC3E,6BAA6B,kCAAkC;IAC/D,gCAAgC,qCAAqC;IACrE,6BAA6B,kCAAkC;IAC/D,sCAAsC,2CAA2C;IACjF,yBAAyB,8BAA8B;IACvD,gCAAgC,qCAAqC;IACrE,+BAA+B,oCAAoC;IACnE,0BAA0B,+BAA+B;IACzD,sCAAsC,2CAA2C;IACjF,0BAA0B,+BAA+B;IAEzD,iCAAiC,sCAAsC;IACvE,mCAAmC,wCAAwC;IAC3E,+BAA+B,oCAAoC;IACnE,yBAAyB,8BAA8B;IACvD,4BAA4B,iCAAiC;IAC7D,4BAA4B,iCAAiC;IAC7D,8CAA8C,mDAAmD;IACjG,mCAAmC,wCAAwC;IAC3E,sCAAsC,2CAA2C;IACjF,mCAAmC,wCAAwC;IAC3E,sCAAsC,2CAA2C;IACjF,2CAA2C,gDAAgD;IAC3F,+BAA+B,oCAAoC;IACnE,gCAAgC,qCAAqC;IACrE,kCAAkC,uCAAuC;IACzE,0BAA0B,+BAA+B;IACzD,+BAA+B,oCAAoC;IACnE,0BAA0B,+BAA+B;IACzD,2BAA2B,gCAAgC;IAC3D,0BAA0B,+BAA+B;IACzD,gCAAgC,qCAAqC;IACrE,qBAAqB,0BAA0B;IAC/C,mCAAmC,wCAAwC;IAE3E,kCAAkC,uCAAuC;IACzE,6DAA6D,kEAAkE;IAC/H,+CAA+C,oDAAoD;IACnG,0CAA0C,+CAA+C;IACzF,yCAAyC,8CAA8C;IACvF,qCAAqC,0CAA0C;IAC/E,8BAA8B,mCAAmC;IACjE,iCAAiC,sCAAsC;IACvE,oCAAoC,yCAAyC;IAC7E,+BAA+B,oCAAoC;IACnE,kCAAkC,uCAAuC;IACzE,gCAAgC,qCAAqC;IACrE,kCAAkC,uCAAuC;IACzE,yCAAyC,8CAA8C;IAKvF,eAAe,oBAAoB;IACnC,wBAAwB,6BAA6B;CACxD;AAED,eAAe,iBAAiB,CAAC"}
|