@zerothreatai/vulnerability-registry 3.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +34 -17
- package/dist/categories/configuration.js +561 -60
- package/dist/categories/injection.js +68 -34
- package/dist/categories/sensitive-paths.js +168 -84
- package/dist/categories/ssrf.js +22 -11
- package/dist/categories/xss.js +30 -15
- package/dist/category.d.ts +6 -0
- package/dist/category.js +15 -0
- package/dist/error-codes.d.ts +20 -0
- package/dist/error-codes.js +20 -0
- package/dist/index.d.ts +9 -1
- package/dist/index.js +5 -1
- package/dist/scanner.d.ts +6 -0
- package/dist/scanner.js +22 -0
- package/dist/types.d.ts +2 -0
- package/dist-cjs/categories/authentication.js +34 -17
- package/dist-cjs/categories/configuration.js +561 -60
- package/dist-cjs/categories/injection.js +68 -34
- package/dist-cjs/categories/sensitive-paths.js +168 -84
- package/dist-cjs/categories/ssrf.js +22 -11
- package/dist-cjs/categories/xss.js +30 -15
- package/dist-cjs/category.js +18 -0
- package/dist-cjs/error-codes.js +20 -0
- package/dist-cjs/index.js +7 -1
- package/dist-cjs/scanner.js +25 -0
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +145 -128
- package/src/categories/configuration.ts +1632 -1111
- package/src/categories/injection.ts +158 -124
- package/src/categories/sensitive-paths.ts +168 -84
- package/src/categories/ssrf.ts +22 -11
- package/src/categories/xss.ts +30 -15
- package/src/category.ts +16 -0
- package/src/error-codes.ts +25 -5
- package/src/id-registry.json +1235 -0
- package/src/index.ts +20 -14
- package/src/scanner.ts +23 -0
- package/src/types.ts +4 -2
- package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -378
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -906
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -750
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1791
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -250
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -328
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -242
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -315
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -107
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -86
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -7
- package/src/types.js.map +0 -1
package/src/error-codes.js
DELETED
|
@@ -1,315 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* Vulnerability Registry - Error Codes
|
|
4
|
-
*
|
|
5
|
-
* Central enum containing all vulnerability error codes across all scanners.
|
|
6
|
-
* Each code maps to a complete VulnerabilityDefinition.
|
|
7
|
-
*/
|
|
8
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
9
|
-
exports.VulnerabilityCode = void 0;
|
|
10
|
-
var VulnerabilityCode;
|
|
11
|
-
(function (VulnerabilityCode) {
|
|
12
|
-
// ========================================
|
|
13
|
-
// SQL INJECTION (SQLI_*)
|
|
14
|
-
// ========================================
|
|
15
|
-
VulnerabilityCode["SQLI_ERROR_BASED"] = "SQLI_ERROR_BASED";
|
|
16
|
-
VulnerabilityCode["SQLI_BOOLEAN_BASED"] = "SQLI_BOOLEAN_BASED";
|
|
17
|
-
VulnerabilityCode["SQLI_TIME_BASED"] = "SQLI_TIME_BASED";
|
|
18
|
-
VulnerabilityCode["SQLI_STACK_BASED"] = "SQLI_STACK_BASED";
|
|
19
|
-
VulnerabilityCode["SQLI_UNION_BASED"] = "SQLI_UNION_BASED";
|
|
20
|
-
// ========================================
|
|
21
|
-
// CROSS-SITE SCRIPTING (XSS_*)
|
|
22
|
-
// ========================================
|
|
23
|
-
VulnerabilityCode["XSS_REFLECTED"] = "XSS_REFLECTED";
|
|
24
|
-
VulnerabilityCode["XSS_STORED"] = "XSS_STORED";
|
|
25
|
-
VulnerabilityCode["XSS_DOM_BASED"] = "XSS_DOM_BASED";
|
|
26
|
-
VulnerabilityCode["XSS_SVG_INJECTION"] = "XSS_SVG_INJECTION";
|
|
27
|
-
VulnerabilityCode["XSS_CSTI_ANGULAR"] = "XSS_CSTI_ANGULAR";
|
|
28
|
-
VulnerabilityCode["XSS_CSTI_VUE"] = "XSS_CSTI_VUE";
|
|
29
|
-
VulnerabilityCode["XSS_EVENT_HANDLER"] = "XSS_EVENT_HANDLER";
|
|
30
|
-
VulnerabilityCode["XSS_SCRIPT_INJECTION"] = "XSS_SCRIPT_INJECTION";
|
|
31
|
-
VulnerabilityCode["XSS_HTML_INJECTION"] = "XSS_HTML_INJECTION";
|
|
32
|
-
VulnerabilityCode["XSS_ATTRIBUTE_INJECTION"] = "XSS_ATTRIBUTE_INJECTION";
|
|
33
|
-
VulnerabilityCode["XSS_JS_CONTEXT"] = "XSS_JS_CONTEXT";
|
|
34
|
-
VulnerabilityCode["XSS_CSS_INJECTION"] = "XSS_CSS_INJECTION";
|
|
35
|
-
VulnerabilityCode["XSS_CSP_BYPASS"] = "XSS_CSP_BYPASS";
|
|
36
|
-
VulnerabilityCode["XSS_TEMPLATE_LITERAL"] = "XSS_TEMPLATE_LITERAL";
|
|
37
|
-
VulnerabilityCode["XSS_MUTATION_BASED"] = "XSS_MUTATION_BASED";
|
|
38
|
-
// ========================================
|
|
39
|
-
// COMMAND INJECTION (CMDI_*)
|
|
40
|
-
// ========================================
|
|
41
|
-
VulnerabilityCode["CMDI_OOB_CONFIRMED"] = "CMDI_OOB_CONFIRMED";
|
|
42
|
-
VulnerabilityCode["CMDI_REFLECTED"] = "CMDI_REFLECTED";
|
|
43
|
-
VulnerabilityCode["CMDI_TIME_BASED"] = "CMDI_TIME_BASED";
|
|
44
|
-
VulnerabilityCode["CMDI_ERROR_BASED"] = "CMDI_ERROR_BASED";
|
|
45
|
-
// ========================================
|
|
46
|
-
// SERVER-SIDE REQUEST FORGERY (SSRF_*)
|
|
47
|
-
// ========================================
|
|
48
|
-
VulnerabilityCode["SSRF_CLOUD_METADATA"] = "SSRF_CLOUD_METADATA";
|
|
49
|
-
VulnerabilityCode["SSRF_INTERNAL_SERVICE"] = "SSRF_INTERNAL_SERVICE";
|
|
50
|
-
VulnerabilityCode["SSRF_PROTOCOL_SMUGGLING"] = "SSRF_PROTOCOL_SMUGGLING";
|
|
51
|
-
VulnerabilityCode["SSRF_BLIND_OOB"] = "SSRF_BLIND_OOB";
|
|
52
|
-
VulnerabilityCode["SSRF_FILTER_BYPASS"] = "SSRF_FILTER_BYPASS";
|
|
53
|
-
// ========================================
|
|
54
|
-
// SERVER-SIDE TEMPLATE INJECTION (SSTI_*)
|
|
55
|
-
// ========================================
|
|
56
|
-
VulnerabilityCode["SSTI_JINJA2"] = "SSTI_JINJA2";
|
|
57
|
-
VulnerabilityCode["SSTI_TWIG"] = "SSTI_TWIG";
|
|
58
|
-
VulnerabilityCode["SSTI_FREEMARKER"] = "SSTI_FREEMARKER";
|
|
59
|
-
VulnerabilityCode["SSTI_VELOCITY"] = "SSTI_VELOCITY";
|
|
60
|
-
VulnerabilityCode["SSTI_THYMELEAF"] = "SSTI_THYMELEAF";
|
|
61
|
-
VulnerabilityCode["SSTI_ERB"] = "SSTI_ERB";
|
|
62
|
-
VulnerabilityCode["SSTI_EJS"] = "SSTI_EJS";
|
|
63
|
-
VulnerabilityCode["SSTI_PUG"] = "SSTI_PUG";
|
|
64
|
-
VulnerabilityCode["SSTI_SMARTY"] = "SSTI_SMARTY";
|
|
65
|
-
VulnerabilityCode["SSTI_MAKO"] = "SSTI_MAKO";
|
|
66
|
-
VulnerabilityCode["SSTI_GENERIC"] = "SSTI_GENERIC";
|
|
67
|
-
// ========================================
|
|
68
|
-
// XML EXTERNAL ENTITY (XXE_*)
|
|
69
|
-
// ========================================
|
|
70
|
-
VulnerabilityCode["XXE_CLASSIC"] = "XXE_CLASSIC";
|
|
71
|
-
VulnerabilityCode["XXE_BLIND"] = "XXE_BLIND";
|
|
72
|
-
VulnerabilityCode["XXE_OOB"] = "XXE_OOB";
|
|
73
|
-
VulnerabilityCode["XXE_ERROR_BASED"] = "XXE_ERROR_BASED";
|
|
74
|
-
VulnerabilityCode["XXE_PARAMETER_ENTITY"] = "XXE_PARAMETER_ENTITY";
|
|
75
|
-
// ========================================
|
|
76
|
-
// XPATH INJECTION (XPATH_*)
|
|
77
|
-
// ========================================
|
|
78
|
-
VulnerabilityCode["XPATH_AUTH_BYPASS"] = "XPATH_AUTH_BYPASS";
|
|
79
|
-
VulnerabilityCode["XPATH_DATA_EXTRACTION"] = "XPATH_DATA_EXTRACTION";
|
|
80
|
-
VulnerabilityCode["XPATH_BLIND"] = "XPATH_BLIND";
|
|
81
|
-
VulnerabilityCode["XPATH_ERROR_BASED"] = "XPATH_ERROR_BASED";
|
|
82
|
-
// ========================================
|
|
83
|
-
// LOCAL FILE INCLUSION (LFI_*)
|
|
84
|
-
// ========================================
|
|
85
|
-
VulnerabilityCode["LFI_PATH_TRAVERSAL"] = "LFI_PATH_TRAVERSAL";
|
|
86
|
-
VulnerabilityCode["LFI_FILTER_BYPASS"] = "LFI_FILTER_BYPASS";
|
|
87
|
-
VulnerabilityCode["LFI_SOURCE_DISCLOSURE"] = "LFI_SOURCE_DISCLOSURE";
|
|
88
|
-
VulnerabilityCode["LFI_WRAPPER_PROTOCOL"] = "LFI_WRAPPER_PROTOCOL";
|
|
89
|
-
VulnerabilityCode["LFI_PROC_DISCLOSURE"] = "LFI_PROC_DISCLOSURE";
|
|
90
|
-
// ========================================
|
|
91
|
-
// JWT VULNERABILITIES (JWT_*)
|
|
92
|
-
// ========================================
|
|
93
|
-
VulnerabilityCode["JWT_NONE_ALGORITHM"] = "JWT_NONE_ALGORITHM";
|
|
94
|
-
VulnerabilityCode["JWT_WEAK_SECRET"] = "JWT_WEAK_SECRET";
|
|
95
|
-
VulnerabilityCode["JWT_KEY_CONFUSION"] = "JWT_KEY_CONFUSION";
|
|
96
|
-
VulnerabilityCode["JWT_EXPIRED_TOKEN"] = "JWT_EXPIRED_TOKEN";
|
|
97
|
-
VulnerabilityCode["JWT_MISSING_CLAIMS"] = "JWT_MISSING_CLAIMS";
|
|
98
|
-
VulnerabilityCode["JWT_CLAIM_TAMPERING"] = "JWT_CLAIM_TAMPERING";
|
|
99
|
-
VulnerabilityCode["JWT_KID_INJECTION"] = "JWT_KID_INJECTION";
|
|
100
|
-
VulnerabilityCode["JWT_JKU_INJECTION"] = "JWT_JKU_INJECTION";
|
|
101
|
-
VulnerabilityCode["JWT_EMBEDDED_JWK"] = "JWT_EMBEDDED_JWK";
|
|
102
|
-
VulnerabilityCode["JWT_X5C_INJECTION"] = "JWT_X5C_INJECTION";
|
|
103
|
-
// ========================================
|
|
104
|
-
// OPEN REDIRECT (REDIRECT_*)
|
|
105
|
-
// ========================================
|
|
106
|
-
VulnerabilityCode["REDIRECT_HEADER_INJECTION"] = "REDIRECT_HEADER_INJECTION";
|
|
107
|
-
VulnerabilityCode["REDIRECT_META_REFRESH"] = "REDIRECT_META_REFRESH";
|
|
108
|
-
VulnerabilityCode["REDIRECT_JS_NAVIGATION"] = "REDIRECT_JS_NAVIGATION";
|
|
109
|
-
// ========================================
|
|
110
|
-
// BROKEN ACCESS CONTROL (BAC_*)
|
|
111
|
-
// ========================================
|
|
112
|
-
VulnerabilityCode["BAC_ANONYMOUS_ACCESS"] = "BAC_ANONYMOUS_ACCESS";
|
|
113
|
-
VulnerabilityCode["BAC_HORIZONTAL_PRIVILEGE"] = "BAC_HORIZONTAL_PRIVILEGE";
|
|
114
|
-
VulnerabilityCode["BAC_VERTICAL_PRIVILEGE"] = "BAC_VERTICAL_PRIVILEGE";
|
|
115
|
-
VulnerabilityCode["BAC_IDOR"] = "BAC_IDOR";
|
|
116
|
-
// ========================================
|
|
117
|
-
// SECURITY HEADERS (HEADER_*)
|
|
118
|
-
// ========================================
|
|
119
|
-
VulnerabilityCode["HEADER_MISSING_CSP"] = "HEADER_MISSING_CSP";
|
|
120
|
-
VulnerabilityCode["HEADER_MISSING_HSTS"] = "HEADER_MISSING_HSTS";
|
|
121
|
-
VulnerabilityCode["HEADER_MISSING_XFRAME"] = "HEADER_MISSING_XFRAME";
|
|
122
|
-
VulnerabilityCode["HEADER_MISSING_XCONTENT_TYPE"] = "HEADER_MISSING_XCONTENT_TYPE";
|
|
123
|
-
VulnerabilityCode["HEADER_MISSING_XSS_PROTECTION"] = "HEADER_MISSING_XSS_PROTECTION";
|
|
124
|
-
VulnerabilityCode["HEADER_MISSING_REFERRER_POLICY"] = "HEADER_MISSING_REFERRER_POLICY";
|
|
125
|
-
VulnerabilityCode["HEADER_MISSING_PERMISSIONS_POLICY"] = "HEADER_MISSING_PERMISSIONS_POLICY";
|
|
126
|
-
VulnerabilityCode["HEADER_WEAK_CSP"] = "HEADER_WEAK_CSP";
|
|
127
|
-
VulnerabilityCode["HEADER_CORS_MISCONFIGURED"] = "HEADER_CORS_MISCONFIGURED";
|
|
128
|
-
VulnerabilityCode["HEADER_COEP_WITHOUT_COOP"] = "HEADER_COEP_WITHOUT_COOP";
|
|
129
|
-
VulnerabilityCode["HEADER_CORP_UNUSUAL"] = "HEADER_CORP_UNUSUAL";
|
|
130
|
-
VulnerabilityCode["HEADER_EXPECT_CT_PRESENT"] = "HEADER_EXPECT_CT_PRESENT";
|
|
131
|
-
VulnerabilityCode["HEADER_SERVER_HEADER_PRESENT"] = "HEADER_SERVER_HEADER_PRESENT";
|
|
132
|
-
VulnerabilityCode["HEADER_X_POWERED_BY_PRESENT"] = "HEADER_X_POWERED_BY_PRESENT";
|
|
133
|
-
VulnerabilityCode["HEADER_X_XSS_PROTECTION_ENABLED"] = "HEADER_X_XSS_PROTECTION_ENABLED";
|
|
134
|
-
VulnerabilityCode["COOKIE_SAMESITE_NONE_WITHOUT_SECURE"] = "COOKIE_SAMESITE_NONE_WITHOUT_SECURE";
|
|
135
|
-
VulnerabilityCode["COOKIE_SESSION_MISSING_SECURE"] = "COOKIE_SESSION_MISSING_SECURE";
|
|
136
|
-
VulnerabilityCode["COOKIE_MISSING_SECURE"] = "COOKIE_MISSING_SECURE";
|
|
137
|
-
VulnerabilityCode["COOKIE_SESSION_MISSING_HTTPONLY"] = "COOKIE_SESSION_MISSING_HTTPONLY";
|
|
138
|
-
VulnerabilityCode["COOKIE_MISSING_HTTPONLY"] = "COOKIE_MISSING_HTTPONLY";
|
|
139
|
-
VulnerabilityCode["COOKIE_MISSING_SAMESITE"] = "COOKIE_MISSING_SAMESITE";
|
|
140
|
-
VulnerabilityCode["COOKIE_HOST_PREFIX_INVALID"] = "COOKIE_HOST_PREFIX_INVALID";
|
|
141
|
-
VulnerabilityCode["COOKIE_SECURE_PREFIX_INVALID"] = "COOKIE_SECURE_PREFIX_INVALID";
|
|
142
|
-
VulnerabilityCode["HEADER_DRIFT_CSP"] = "HEADER_DRIFT_CSP";
|
|
143
|
-
VulnerabilityCode["HEADER_DRIFT_HSTS"] = "HEADER_DRIFT_HSTS";
|
|
144
|
-
VulnerabilityCode["HEADER_DRIFT_XCONTENT_TYPE"] = "HEADER_DRIFT_XCONTENT_TYPE";
|
|
145
|
-
VulnerabilityCode["HEADER_DRIFT_REFERRER_POLICY"] = "HEADER_DRIFT_REFERRER_POLICY";
|
|
146
|
-
VulnerabilityCode["HEADER_DRIFT_XFRAME"] = "HEADER_DRIFT_XFRAME";
|
|
147
|
-
VulnerabilityCode["HEADER_DRIFT_PERMISSIONS_POLICY"] = "HEADER_DRIFT_PERMISSIONS_POLICY";
|
|
148
|
-
VulnerabilityCode["HEADER_DRIFT_COOP"] = "HEADER_DRIFT_COOP";
|
|
149
|
-
VulnerabilityCode["HEADER_DRIFT_COEP"] = "HEADER_DRIFT_COEP";
|
|
150
|
-
VulnerabilityCode["HEADER_DRIFT_CORP"] = "HEADER_DRIFT_CORP";
|
|
151
|
-
// ========================================
|
|
152
|
-
// HOST HEADER INJECTION (HOST_*)
|
|
153
|
-
// ========================================
|
|
154
|
-
VulnerabilityCode["HOST_CACHE_POISONING"] = "HOST_CACHE_POISONING";
|
|
155
|
-
VulnerabilityCode["HOST_PASSWORD_RESET"] = "HOST_PASSWORD_RESET";
|
|
156
|
-
VulnerabilityCode["HOST_REDIRECT"] = "HOST_REDIRECT";
|
|
157
|
-
// ========================================
|
|
158
|
-
// DIRECTORY BROWSING (DIRBROWSE_*)
|
|
159
|
-
// ========================================
|
|
160
|
-
VulnerabilityCode["DIRBROWSE_ENABLED"] = "DIRBROWSE_ENABLED";
|
|
161
|
-
VulnerabilityCode["DIRBROWSE_SENSITIVE"] = "DIRBROWSE_SENSITIVE";
|
|
162
|
-
// ========================================
|
|
163
|
-
// MASS ASSIGNMENT (MASSASSIGN_*)
|
|
164
|
-
// ========================================
|
|
165
|
-
VulnerabilityCode["MASSASSIGN_PROTOTYPE_POLLUTION"] = "MASSASSIGN_PROTOTYPE_POLLUTION";
|
|
166
|
-
VulnerabilityCode["MASSASSIGN_ROLE_ESCALATION"] = "MASSASSIGN_ROLE_ESCALATION";
|
|
167
|
-
VulnerabilityCode["MASSASSIGN_HIDDEN_FIELD"] = "MASSASSIGN_HIDDEN_FIELD";
|
|
168
|
-
// ========================================
|
|
169
|
-
// DESERIALIZATION (DESER_*)
|
|
170
|
-
// ========================================
|
|
171
|
-
VulnerabilityCode["DESER_JAVA"] = "DESER_JAVA";
|
|
172
|
-
VulnerabilityCode["DESER_PHP"] = "DESER_PHP";
|
|
173
|
-
VulnerabilityCode["DESER_PYTHON"] = "DESER_PYTHON";
|
|
174
|
-
VulnerabilityCode["DESER_DOTNET"] = "DESER_DOTNET";
|
|
175
|
-
VulnerabilityCode["DESER_RUBY"] = "DESER_RUBY";
|
|
176
|
-
VulnerabilityCode["DESER_NODE"] = "DESER_NODE";
|
|
177
|
-
// ========================================
|
|
178
|
-
// SENSITIVE PATH SCOUT - CRITICAL (SENS_CRIT_*)
|
|
179
|
-
// ========================================
|
|
180
|
-
VulnerabilityCode["SENS_CRIT_AWS_CREDENTIALS"] = "SENS_CRIT_AWS_CREDENTIALS";
|
|
181
|
-
VulnerabilityCode["SENS_CRIT_SSH_PRIVATE_KEY"] = "SENS_CRIT_SSH_PRIVATE_KEY";
|
|
182
|
-
VulnerabilityCode["SENS_CRIT_SSL_PRIVATE_KEY"] = "SENS_CRIT_SSL_PRIVATE_KEY";
|
|
183
|
-
VulnerabilityCode["SENS_CRIT_RAILS_MASTER_KEY"] = "SENS_CRIT_RAILS_MASTER_KEY";
|
|
184
|
-
VulnerabilityCode["SENS_CRIT_TERRAFORM_STATE"] = "SENS_CRIT_TERRAFORM_STATE";
|
|
185
|
-
VulnerabilityCode["SENS_CRIT_FIREBASE_ADMIN_SDK"] = "SENS_CRIT_FIREBASE_ADMIN_SDK";
|
|
186
|
-
VulnerabilityCode["SENS_CRIT_KUBE_CONFIG"] = "SENS_CRIT_KUBE_CONFIG";
|
|
187
|
-
VulnerabilityCode["SENS_CRIT_AZURE_STORAGE_KEY"] = "SENS_CRIT_AZURE_STORAGE_KEY";
|
|
188
|
-
VulnerabilityCode["SENS_CRIT_CONSUL_KV"] = "SENS_CRIT_CONSUL_KV";
|
|
189
|
-
VulnerabilityCode["SENS_CRIT_VAULT_SECRET"] = "SENS_CRIT_VAULT_SECRET";
|
|
190
|
-
VulnerabilityCode["SENS_CRIT_DOCKER_SECRET"] = "SENS_CRIT_DOCKER_SECRET";
|
|
191
|
-
// ========================================
|
|
192
|
-
// SENSITIVE PATH SCOUT - HIGH (SENS_HIGH_*)
|
|
193
|
-
// ========================================
|
|
194
|
-
VulnerabilityCode["SENS_HIGH_GIT_EXPOSED"] = "SENS_HIGH_GIT_EXPOSED";
|
|
195
|
-
VulnerabilityCode["SENS_HIGH_GIT_CONFIG"] = "SENS_HIGH_GIT_CONFIG";
|
|
196
|
-
VulnerabilityCode["SENS_HIGH_WORDPRESS_CONFIG"] = "SENS_HIGH_WORDPRESS_CONFIG";
|
|
197
|
-
VulnerabilityCode["SENS_HIGH_SPRING_ACTUATOR"] = "SENS_HIGH_SPRING_ACTUATOR";
|
|
198
|
-
VulnerabilityCode["SENS_HIGH_SPRING_HEAPDUMP"] = "SENS_HIGH_SPRING_HEAPDUMP";
|
|
199
|
-
VulnerabilityCode["SENS_HIGH_DATABASE_BACKUP"] = "SENS_HIGH_DATABASE_BACKUP";
|
|
200
|
-
VulnerabilityCode["SENS_HIGH_PHPINFO"] = "SENS_HIGH_PHPINFO";
|
|
201
|
-
VulnerabilityCode["SENS_HIGH_LARAVEL_DEBUG"] = "SENS_HIGH_LARAVEL_DEBUG";
|
|
202
|
-
VulnerabilityCode["SENS_HIGH_GCP_SERVICE_ACCOUNT"] = "SENS_HIGH_GCP_SERVICE_ACCOUNT";
|
|
203
|
-
VulnerabilityCode["SENS_HIGH_GRAPHQL_INTROSPECTION"] = "SENS_HIGH_GRAPHQL_INTROSPECTION";
|
|
204
|
-
VulnerabilityCode["SENS_HIGH_PHPMYADMIN"] = "SENS_HIGH_PHPMYADMIN";
|
|
205
|
-
VulnerabilityCode["SENS_HIGH_MONGODB_CONFIG"] = "SENS_HIGH_MONGODB_CONFIG";
|
|
206
|
-
VulnerabilityCode["SENS_HIGH_JAVA_KEYSTORE"] = "SENS_HIGH_JAVA_KEYSTORE";
|
|
207
|
-
VulnerabilityCode["SENS_HIGH_PHP_SESSION"] = "SENS_HIGH_PHP_SESSION";
|
|
208
|
-
VulnerabilityCode["SENS_HIGH_ENV_FILE"] = "SENS_HIGH_ENV_FILE";
|
|
209
|
-
VulnerabilityCode["SENS_HIGH_BACKUP_FILE"] = "SENS_HIGH_BACKUP_FILE";
|
|
210
|
-
VulnerabilityCode["SENS_HIGH_HTPASSWD"] = "SENS_HIGH_HTPASSWD";
|
|
211
|
-
VulnerabilityCode["SENS_HIGH_DS_STORE"] = "SENS_HIGH_DS_STORE";
|
|
212
|
-
// ========================================
|
|
213
|
-
// SENSITIVE PATH SCOUT - MEDIUM (SENS_MED_*)
|
|
214
|
-
// ========================================
|
|
215
|
-
VulnerabilityCode["SENS_MED_SWAGGER_DOCS"] = "SENS_MED_SWAGGER_DOCS";
|
|
216
|
-
VulnerabilityCode["SENS_MED_APACHE_STATUS"] = "SENS_MED_APACHE_STATUS";
|
|
217
|
-
VulnerabilityCode["SENS_MED_PROMETHEUS_METRICS"] = "SENS_MED_PROMETHEUS_METRICS";
|
|
218
|
-
VulnerabilityCode["SENS_MED_DOCKERFILE"] = "SENS_MED_DOCKERFILE";
|
|
219
|
-
VulnerabilityCode["SENS_MED_FIREBASE_CONFIG"] = "SENS_MED_FIREBASE_CONFIG";
|
|
220
|
-
VulnerabilityCode["SENS_MED_SOURCE_MAP"] = "SENS_MED_SOURCE_MAP";
|
|
221
|
-
VulnerabilityCode["SENS_MED_ELASTICSEARCH"] = "SENS_MED_ELASTICSEARCH";
|
|
222
|
-
VulnerabilityCode["SENS_MED_ADMIN_PANEL"] = "SENS_MED_ADMIN_PANEL";
|
|
223
|
-
VulnerabilityCode["SENS_MED_COMPOSER_LOCK"] = "SENS_MED_COMPOSER_LOCK";
|
|
224
|
-
VulnerabilityCode["SENS_MED_PACKAGE_LOCK"] = "SENS_MED_PACKAGE_LOCK";
|
|
225
|
-
VulnerabilityCode["SENS_MED_GEMFILE_LOCK"] = "SENS_MED_GEMFILE_LOCK";
|
|
226
|
-
VulnerabilityCode["SENS_MED_ROBOTS_TXT"] = "SENS_MED_ROBOTS_TXT";
|
|
227
|
-
VulnerabilityCode["SENS_MED_SITEMAP"] = "SENS_MED_SITEMAP";
|
|
228
|
-
VulnerabilityCode["SENS_MED_CROSSDOMAIN_XML"] = "SENS_MED_CROSSDOMAIN_XML";
|
|
229
|
-
// ========================================
|
|
230
|
-
// SENSITIVE PATH SCOUT - LOW (SENS_LOW_*)
|
|
231
|
-
// ========================================
|
|
232
|
-
VulnerabilityCode["SENS_LOW_TRAVIS_CI"] = "SENS_LOW_TRAVIS_CI";
|
|
233
|
-
VulnerabilityCode["SENS_LOW_JENKINSFILE"] = "SENS_LOW_JENKINSFILE";
|
|
234
|
-
VulnerabilityCode["SENS_LOW_CIRCLECI"] = "SENS_LOW_CIRCLECI";
|
|
235
|
-
VulnerabilityCode["SENS_LOW_GITLAB_CI"] = "SENS_LOW_GITLAB_CI";
|
|
236
|
-
VulnerabilityCode["SENS_LOW_README"] = "SENS_LOW_README";
|
|
237
|
-
VulnerabilityCode["SENS_LOW_CHANGELOG"] = "SENS_LOW_CHANGELOG";
|
|
238
|
-
VulnerabilityCode["SENS_LOW_LICENSE"] = "SENS_LOW_LICENSE";
|
|
239
|
-
// ========================================
|
|
240
|
-
// SENSITIVE PATH SCOUT - EXTENDED
|
|
241
|
-
// ========================================
|
|
242
|
-
// HIGH
|
|
243
|
-
VulnerabilityCode["SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED"] = "SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED";
|
|
244
|
-
VulnerabilityCode["SENS_HIGH_APPSETTINGS_JSON_EXPOSED"] = "SENS_HIGH_APPSETTINGS_JSON_EXPOSED";
|
|
245
|
-
VulnerabilityCode["SENS_HIGH_SPRING_CONFIG_EXPOSED"] = "SENS_HIGH_SPRING_CONFIG_EXPOSED";
|
|
246
|
-
VulnerabilityCode["SENS_HIGH_NPMRC_EXPOSED"] = "SENS_HIGH_NPMRC_EXPOSED";
|
|
247
|
-
VulnerabilityCode["SENS_HIGH_RAILS_DATABASE_YML_EXPOSED"] = "SENS_HIGH_RAILS_DATABASE_YML_EXPOSED";
|
|
248
|
-
VulnerabilityCode["SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED"] = "SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED";
|
|
249
|
-
VulnerabilityCode["SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED"] = "SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED";
|
|
250
|
-
VulnerabilityCode["SENS_HIGH_JOLOKIA_EXPOSED"] = "SENS_HIGH_JOLOKIA_EXPOSED";
|
|
251
|
-
VulnerabilityCode["SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED"] = "SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED";
|
|
252
|
-
VulnerabilityCode["SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED"] = "SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED";
|
|
253
|
-
VulnerabilityCode["SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED"] = "SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED";
|
|
254
|
-
VulnerabilityCode["SENS_HIGH_REDIS_RDB_DUMP_DETECTED"] = "SENS_HIGH_REDIS_RDB_DUMP_DETECTED";
|
|
255
|
-
VulnerabilityCode["SENS_HIGH_TRACE_AXD"] = "SENS_HIGH_TRACE_AXD";
|
|
256
|
-
VulnerabilityCode["SENS_HIGH_ELMAH_AXD_EXPOSED"] = "SENS_HIGH_ELMAH_AXD_EXPOSED";
|
|
257
|
-
VulnerabilityCode["SENS_HIGH_SQLITE_DATABASE_DETECTED"] = "SENS_HIGH_SQLITE_DATABASE_DETECTED";
|
|
258
|
-
VulnerabilityCode["SENS_HIGH_AWS_CONFIG_EXPOSED"] = "SENS_HIGH_AWS_CONFIG_EXPOSED";
|
|
259
|
-
VulnerabilityCode["SENS_HIGH_AZURE_CREDENTIALS_EXPOSED"] = "SENS_HIGH_AZURE_CREDENTIALS_EXPOSED";
|
|
260
|
-
VulnerabilityCode["SENS_HIGH_HELM_VALUES_EXPOSED"] = "SENS_HIGH_HELM_VALUES_EXPOSED";
|
|
261
|
-
VulnerabilityCode["SENS_HIGH_TERRAFORM_VARS_EXPOSED"] = "SENS_HIGH_TERRAFORM_VARS_EXPOSED";
|
|
262
|
-
VulnerabilityCode["SENS_HIGH_LARAVEL_LOG_EXPOSED"] = "SENS_HIGH_LARAVEL_LOG_EXPOSED";
|
|
263
|
-
VulnerabilityCode["SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED"] = "SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED";
|
|
264
|
-
VulnerabilityCode["SENS_HIGH_ADMINER_EXPOSED"] = "SENS_HIGH_ADMINER_EXPOSED";
|
|
265
|
-
VulnerabilityCode["SENS_HIGH_DEBUG_ENDPOINT_EXPOSED"] = "SENS_HIGH_DEBUG_ENDPOINT_EXPOSED";
|
|
266
|
-
VulnerabilityCode["SENS_HIGH_GO_DEBUG_VARS_EXPOSED"] = "SENS_HIGH_GO_DEBUG_VARS_EXPOSED";
|
|
267
|
-
VulnerabilityCode["SENS_HIGH_GO_PPROF_EXPOSED"] = "SENS_HIGH_GO_PPROF_EXPOSED";
|
|
268
|
-
VulnerabilityCode["SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED"] = "SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED";
|
|
269
|
-
VulnerabilityCode["SENS_HIGH_MONGO_RC_EXPOSED"] = "SENS_HIGH_MONGO_RC_EXPOSED";
|
|
270
|
-
// MEDIUM
|
|
271
|
-
VulnerabilityCode["SENS_MED_UN_PROTECTED_CONFIG_JSON"] = "SENS_MED_UN_PROTECTED_CONFIG_JSON";
|
|
272
|
-
VulnerabilityCode["SENS_MED_MERCURIAL_REPOSITORY_FOUND"] = "SENS_MED_MERCURIAL_REPOSITORY_FOUND";
|
|
273
|
-
VulnerabilityCode["SENS_MED_MERCURIAL_HGRC_EXPOSED"] = "SENS_MED_MERCURIAL_HGRC_EXPOSED";
|
|
274
|
-
VulnerabilityCode["SENS_MED_CVS_ROOT_EXPOSED"] = "SENS_MED_CVS_ROOT_EXPOSED";
|
|
275
|
-
VulnerabilityCode["SENS_MED_CVS_ENTRIES_EXPOSED"] = "SENS_MED_CVS_ENTRIES_EXPOSED";
|
|
276
|
-
VulnerabilityCode["SENS_MED_BAZAAR_REPO_EXPOSED"] = "SENS_MED_BAZAAR_REPO_EXPOSED";
|
|
277
|
-
VulnerabilityCode["SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED"] = "SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED";
|
|
278
|
-
VulnerabilityCode["SENS_MED_LARAVEL_LOG_VIEWER_ENABLED"] = "SENS_MED_LARAVEL_LOG_VIEWER_ENABLED";
|
|
279
|
-
VulnerabilityCode["SENS_MED_APACHE_HTACCESS_FILE_DETECTED"] = "SENS_MED_APACHE_HTACCESS_FILE_DETECTED";
|
|
280
|
-
VulnerabilityCode["SENS_MED_APACHE_SERVER_INFO_EXPOSED"] = "SENS_MED_APACHE_SERVER_INFO_EXPOSED";
|
|
281
|
-
VulnerabilityCode["SENS_MED_PACKAGE_DEPENDENCIES_DETECTED"] = "SENS_MED_PACKAGE_DEPENDENCIES_DETECTED";
|
|
282
|
-
VulnerabilityCode["SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED"] = "SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED";
|
|
283
|
-
VulnerabilityCode["SENS_MED_SSH_PUBLIC_KEY_EXPOSED"] = "SENS_MED_SSH_PUBLIC_KEY_EXPOSED";
|
|
284
|
-
VulnerabilityCode["SENS_MED_SSL_CERTIFICATE_EXPOSED"] = "SENS_MED_SSL_CERTIFICATE_EXPOSED";
|
|
285
|
-
VulnerabilityCode["SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED"] = "SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED";
|
|
286
|
-
VulnerabilityCode["SENS_MED_GRAPHI_QL_EXPOSED"] = "SENS_MED_GRAPHI_QL_EXPOSED";
|
|
287
|
-
VulnerabilityCode["SENS_MED_TERRAFORM_LOCK_EXPOSED"] = "SENS_MED_TERRAFORM_LOCK_EXPOSED";
|
|
288
|
-
VulnerabilityCode["SENS_MED_ERROR_LOG_EXPOSED"] = "SENS_MED_ERROR_LOG_EXPOSED";
|
|
289
|
-
VulnerabilityCode["SENS_MED_ACCESS_LOG_EXPOSED"] = "SENS_MED_ACCESS_LOG_EXPOSED";
|
|
290
|
-
VulnerabilityCode["SENS_MED_DEBUG_LOG_EXPOSED"] = "SENS_MED_DEBUG_LOG_EXPOSED";
|
|
291
|
-
VulnerabilityCode["SENS_MED_APPLICATION_LOG_EXPOSED"] = "SENS_MED_APPLICATION_LOG_EXPOSED";
|
|
292
|
-
VulnerabilityCode["SENS_MED_WSDL_EXPOSED"] = "SENS_MED_WSDL_EXPOSED";
|
|
293
|
-
VulnerabilityCode["SENS_MED_WORD_PRESS_XML_RPC_EXPOSED"] = "SENS_MED_WORD_PRESS_XML_RPC_EXPOSED";
|
|
294
|
-
// LOW
|
|
295
|
-
VulnerabilityCode["SENS_LOW_TOML_PROJECT_FILE_EXPOSED"] = "SENS_LOW_TOML_PROJECT_FILE_EXPOSED";
|
|
296
|
-
VulnerabilityCode["SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED";
|
|
297
|
-
VulnerabilityCode["SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED"] = "SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED";
|
|
298
|
-
VulnerabilityCode["SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED"] = "SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED";
|
|
299
|
-
VulnerabilityCode["SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED"] = "SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED";
|
|
300
|
-
VulnerabilityCode["SENS_LOW_PYTHON_REQUIREMENTS_DETECTED"] = "SENS_LOW_PYTHON_REQUIREMENTS_DETECTED";
|
|
301
|
-
VulnerabilityCode["SENS_LOW_TEST_ENDPOINT_EXPOSED"] = "SENS_LOW_TEST_ENDPOINT_EXPOSED";
|
|
302
|
-
VulnerabilityCode["SENS_LOW_STAGING_ENDPOINT_EXPOSED"] = "SENS_LOW_STAGING_ENDPOINT_EXPOSED";
|
|
303
|
-
VulnerabilityCode["SENS_LOW_EDITOR_BACKUP_FILE_DETECTED"] = "SENS_LOW_EDITOR_BACKUP_FILE_DETECTED";
|
|
304
|
-
VulnerabilityCode["SENS_LOW_VIM_SWAP_FILE_DETECTED"] = "SENS_LOW_VIM_SWAP_FILE_DETECTED";
|
|
305
|
-
VulnerabilityCode["SENS_LOW_DIRECTORY_LISTING_ENABLED"] = "SENS_LOW_DIRECTORY_LISTING_ENABLED";
|
|
306
|
-
VulnerabilityCode["SENS_LOW_AWSSAM_TEMPLATE_EXPOSED"] = "SENS_LOW_AWSSAM_TEMPLATE_EXPOSED";
|
|
307
|
-
VulnerabilityCode["SENS_LOW_SERVERLESS_CONFIG_EXPOSED"] = "SENS_LOW_SERVERLESS_CONFIG_EXPOSED";
|
|
308
|
-
VulnerabilityCode["SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED"] = "SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED";
|
|
309
|
-
// ========================================
|
|
310
|
-
// CLICKJACKING (CLICK_*)
|
|
311
|
-
// ========================================
|
|
312
|
-
VulnerabilityCode["CLICK_FRAMEABLE"] = "CLICK_FRAMEABLE";
|
|
313
|
-
VulnerabilityCode["CLICK_PARTIAL_PROTECTION"] = "CLICK_PARTIAL_PROTECTION";
|
|
314
|
-
})(VulnerabilityCode || (exports.VulnerabilityCode = VulnerabilityCode = {}));
|
|
315
|
-
exports.default = VulnerabilityCode;
|
package/src/error-codes.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"error-codes.js","sourceRoot":"","sources":["error-codes.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,MAAM,CAAN,IAAY,iBAoUX;AApUD,WAAY,iBAAiB;IACzB,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,0DAAqC,CAAA;IACrC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IACrC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,oDAA+B,CAAA;IAC/B,8CAAyB,CAAA;IACzB,oDAA+B,CAAA;IAC/B,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,kDAA6B,CAAA;IAC7B,4DAAuC,CAAA;IACvC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IACzC,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,4DAAuC,CAAA;IACvC,sDAAiC,CAAA;IACjC,kEAA6C,CAAA;IAC7C,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,sDAAiC,CAAA;IACjC,wDAAmC,CAAA;IACnC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,uCAAuC;IACvC,2CAA2C;IAC3C,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,wEAAmD,CAAA;IACnD,sDAAiC,CAAA;IACjC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wDAAmC,CAAA;IACnC,oDAA+B,CAAA;IAC/B,sDAAiC,CAAA;IACjC,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,0CAAqB,CAAA;IACrB,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAE7B,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,gDAA2B,CAAA;IAC3B,4CAAuB,CAAA;IACvB,wCAAmB,CAAA;IACnB,wDAAmC,CAAA;IACnC,kEAA6C,CAAA;IAE7C,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,gDAA2B,CAAA;IAC3B,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,+BAA+B;IAC/B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,4DAAuC,CAAA;IACvC,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,6BAA6B;IAC7B,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IAEjD,2CAA2C;IAC3C,gCAAgC;IAChC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,sEAAiD,CAAA;IACjD,0CAAqB,CAAA;IAErB,2CAA2C;IAC3C,8BAA8B;IAC9B,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,gEAA2C,CAAA;IAC3C,oEAA+C,CAAA;IAC/C,kFAA6D,CAAA;IAC7D,oFAA+D,CAAA;IAC/D,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,wDAAmC,CAAA;IACnC,4EAAuD,CAAA;IACvD,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,kFAA6D,CAAA;IAC7D,gFAA2D,CAAA;IAC3D,wFAAmE,CAAA;IACnE,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,oEAA+C,CAAA;IAC/C,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,wEAAmD,CAAA;IACnD,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,0DAAqC,CAAA;IACrC,4DAAuC,CAAA;IACvC,8EAAyD,CAAA;IACzD,kFAA6D,CAAA;IAC7D,gEAA2C,CAAA;IAC3C,wFAAmE,CAAA;IACnE,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IACvC,4DAAuC,CAAA;IAEvC,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,kEAA6C,CAAA;IAC7C,gEAA2C,CAAA;IAC3C,oDAA+B,CAAA;IAE/B,2CAA2C;IAC3C,mCAAmC;IACnC,2CAA2C;IAC3C,4DAAuC,CAAA;IACvC,gEAA2C,CAAA;IAE3C,2CAA2C;IAC3C,iCAAiC;IACjC,2CAA2C;IAC3C,sFAAiE,CAAA;IACjE,8EAAyD,CAAA;IACzD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4BAA4B;IAC5B,2CAA2C;IAC3C,8CAAyB,CAAA;IACzB,4CAAuB,CAAA;IACvB,kDAA6B,CAAA;IAC7B,kDAA6B,CAAA;IAC7B,8CAAyB,CAAA;IACzB,8CAAyB,CAAA;IAEzB,2CAA2C;IAC3C,gDAAgD;IAChD,2CAA2C;IAC3C,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,oEAA+C,CAAA;IAC/C,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,wEAAmD,CAAA;IAEnD,2CAA2C;IAC3C,4CAA4C;IAC5C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,kEAA6C,CAAA;IAC7C,8EAAyD,CAAA;IACzD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4EAAuD,CAAA;IACvD,4DAAuC,CAAA;IACvC,wEAAmD,CAAA;IACnD,oFAA+D,CAAA;IAC/D,wFAAmE,CAAA;IACnE,kEAA6C,CAAA;IAC7C,0EAAqD,CAAA;IACrD,wEAAmD,CAAA;IACnD,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,oEAA+C,CAAA;IAC/C,8DAAyC,CAAA;IACzC,8DAAyC,CAAA;IAEzC,2CAA2C;IAC3C,6CAA6C;IAC7C,2CAA2C;IAC3C,oEAA+C,CAAA;IAC/C,sEAAiD,CAAA;IACjD,gFAA2D,CAAA;IAC3D,gEAA2C,CAAA;IAC3C,0EAAqD,CAAA;IACrD,gEAA2C,CAAA;IAC3C,sEAAiD,CAAA;IACjD,kEAA6C,CAAA;IAC7C,sEAAiD,CAAA;IACjD,oEAA+C,CAAA;IAC/C,oEAA+C,CAAA;IAC/C,gEAA2C,CAAA;IAC3C,0DAAqC,CAAA;IACrC,0EAAqD,CAAA;IAErD,2CAA2C;IAC3C,0CAA0C;IAC1C,2CAA2C;IAC3C,8DAAyC,CAAA;IACzC,kEAA6C,CAAA;IAC7C,4DAAuC,CAAA;IACvC,8DAAyC,CAAA;IACzC,wDAAmC,CAAA;IACnC,8DAAyC,CAAA;IACzC,0DAAqC,CAAA;IAErC,2CAA2C;IAC3C,kCAAkC;IAClC,2CAA2C;IAC3C,OAAO;IACP,0HAAqG,CAAA;IACrG,8FAAyE,CAAA;IACzE,wFAAmE,CAAA;IACnE,wEAAmD,CAAA;IACnD,kGAA6E,CAAA;IAC7E,oGAA+E,CAAA;IAC/E,4FAAuE,CAAA;IACvE,4EAAuD,CAAA;IACvD,gHAA2F,CAAA;IAC3F,0GAAqF,CAAA;IACrF,4GAAuF,CAAA;IACvF,4FAAuE,CAAA;IACvE,gEAA2C,CAAA;IAC3C,gFAA2D,CAAA;IAC3D,8FAAyE,CAAA;IACzE,kFAA6D,CAAA;IAC7D,gGAA2E,CAAA;IAC3E,oFAA+D,CAAA;IAC/D,0FAAqE,CAAA;IACrE,oFAA+D,CAAA;IAC/D,sGAAiF,CAAA;IACjF,4EAAuD,CAAA;IACvD,0FAAqE,CAAA;IACrE,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,sGAAiF,CAAA;IACjF,8EAAyD,CAAA;IACzD,SAAS;IACT,4FAAuE,CAAA;IACvE,gGAA2E,CAAA;IAC3E,wFAAmE,CAAA;IACnE,4EAAuD,CAAA;IACvD,kFAA6D,CAAA;IAC7D,kFAA6D,CAAA;IAC7D,sHAAiG,CAAA;IACjG,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gGAA2E,CAAA;IAC3E,sGAAiF,CAAA;IACjF,gHAA2F,CAAA;IAC3F,wFAAmE,CAAA;IACnE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,8EAAyD,CAAA;IACzD,wFAAmE,CAAA;IACnE,8EAAyD,CAAA;IACzD,gFAA2D,CAAA;IAC3D,8EAAyD,CAAA;IACzD,0FAAqE,CAAA;IACrE,oEAA+C,CAAA;IAC/C,gGAA2E,CAAA;IAC3E,MAAM;IACN,8FAAyE,CAAA;IACzE,oJAA+H,CAAA;IAC/H,wHAAmG,CAAA;IACnG,8GAAyF,CAAA;IACzF,4GAAuF,CAAA;IACvF,oGAA+E,CAAA;IAC/E,sFAAiE,CAAA;IACjE,4FAAuE,CAAA;IACvE,kGAA6E,CAAA;IAC7E,wFAAmE,CAAA;IACnE,8FAAyE,CAAA;IACzE,0FAAqE,CAAA;IACrE,8FAAyE,CAAA;IACzE,4GAAuF,CAAA;IAEvF,2CAA2C;IAC3C,yBAAyB;IACzB,2CAA2C;IAC3C,wDAAmC,CAAA;IACnC,0EAAqD,CAAA;AACzD,CAAC,EApUW,iBAAiB,KAAjB,iBAAiB,QAoU5B;AAED,eAAe,iBAAiB,CAAC"}
|
package/src/index.d.ts
DELETED
|
@@ -1,60 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Vulnerability Registry - Main Entry Point
|
|
3
|
-
*
|
|
4
|
-
* Exports all vulnerability codes, definitions, and lookup utilities
|
|
5
|
-
*/
|
|
6
|
-
import { VulnerabilityCode } from './error-codes.js';
|
|
7
|
-
import type { VulnerabilityDefinition, VulnerabilityLookup, Severity, VulnerabilityCategory } from './types.js';
|
|
8
|
-
import { INJECTION_VULNERABILITIES } from './categories/injection.js';
|
|
9
|
-
import { XSS_VULNERABILITIES } from './categories/xss.js';
|
|
10
|
-
import { SSRF_VULNERABILITIES } from './categories/ssrf.js';
|
|
11
|
-
import { AUTH_VULNERABILITIES } from './categories/authentication.js';
|
|
12
|
-
import { CONFIG_VULNERABILITIES } from './categories/configuration.js';
|
|
13
|
-
import { SENSITIVE_PATH_VULNERABILITIES } from './categories/sensitive-paths.js';
|
|
14
|
-
/**
|
|
15
|
-
* Complete vulnerability registry combining all categories
|
|
16
|
-
*/
|
|
17
|
-
export declare const VULNERABILITY_REGISTRY: Record<string, VulnerabilityDefinition>;
|
|
18
|
-
/**
|
|
19
|
-
* Get vulnerability definition by code
|
|
20
|
-
*/
|
|
21
|
-
export declare function getVulnerabilityDefinition(code: VulnerabilityCode | string): VulnerabilityLookup;
|
|
22
|
-
/**
|
|
23
|
-
* Get all vulnerabilities for a specific scanner
|
|
24
|
-
*/
|
|
25
|
-
export declare function getVulnerabilitiesByScanner(scanner: string): VulnerabilityDefinition[];
|
|
26
|
-
/**
|
|
27
|
-
* Get all vulnerabilities for a specific category
|
|
28
|
-
*/
|
|
29
|
-
export declare function getVulnerabilitiesByCategory(category: VulnerabilityCategory): VulnerabilityDefinition[];
|
|
30
|
-
/**
|
|
31
|
-
* Get all vulnerabilities for a specific severity
|
|
32
|
-
*/
|
|
33
|
-
export declare function getVulnerabilitiesBySeverity(severity: Severity): VulnerabilityDefinition[];
|
|
34
|
-
/**
|
|
35
|
-
* Get all vulnerability codes
|
|
36
|
-
*/
|
|
37
|
-
export declare function getAllVulnerabilityCodes(): VulnerabilityCode[];
|
|
38
|
-
/**
|
|
39
|
-
* Get total count of registered vulnerabilities
|
|
40
|
-
*/
|
|
41
|
-
export declare function getVulnerabilityCount(): number;
|
|
42
|
-
/**
|
|
43
|
-
* Create a finding with vulnerability definition
|
|
44
|
-
*/
|
|
45
|
-
export declare function createFinding(code: VulnerabilityCode | string, overrides?: Partial<VulnerabilityDefinition>): VulnerabilityDefinition | null;
|
|
46
|
-
export { VulnerabilityCode } from './error-codes.js';
|
|
47
|
-
export type { VulnerabilityDefinition, VulnerabilityLookup, CVSSProfile, CWEReference, OWASPReference, Severity, VulnerabilityCategory, } from './types.js';
|
|
48
|
-
export { INJECTION_VULNERABILITIES, XSS_VULNERABILITIES, SSRF_VULNERABILITIES, AUTH_VULNERABILITIES, CONFIG_VULNERABILITIES, SENSITIVE_PATH_VULNERABILITIES, };
|
|
49
|
-
declare const _default: {
|
|
50
|
-
VulnerabilityCode: typeof VulnerabilityCode;
|
|
51
|
-
VULNERABILITY_REGISTRY: Record<string, VulnerabilityDefinition>;
|
|
52
|
-
getVulnerabilityDefinition: typeof getVulnerabilityDefinition;
|
|
53
|
-
getVulnerabilitiesByScanner: typeof getVulnerabilitiesByScanner;
|
|
54
|
-
getVulnerabilitiesByCategory: typeof getVulnerabilitiesByCategory;
|
|
55
|
-
getVulnerabilitiesBySeverity: typeof getVulnerabilitiesBySeverity;
|
|
56
|
-
getAllVulnerabilityCodes: typeof getAllVulnerabilityCodes;
|
|
57
|
-
getVulnerabilityCount: typeof getVulnerabilityCount;
|
|
58
|
-
createFinding: typeof createFinding;
|
|
59
|
-
};
|
|
60
|
-
export default _default;
|
package/src/index.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACrD,OAAO,KAAK,EAAE,uBAAuB,EAAE,mBAAmB,EAA6C,QAAQ,EAAE,qBAAqB,EAAE,MAAM,YAAY,CAAC;AAG3J,OAAO,EAAE,yBAAyB,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAE,MAAM,gCAAgC,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,8BAA8B,EAAE,MAAM,iCAAiC,CAAC;AAEjF;;GAEG;AACH,eAAO,MAAM,sBAAsB,EAAE,MAAM,CAAC,MAAM,EAAE,uBAAuB,CAO1E,CAAC;AAEF;;GAEG;AACH,wBAAgB,0BAA0B,CAAC,IAAI,EAAE,iBAAiB,GAAG,MAAM,GAAG,mBAAmB,CAMhG;AAED;;GAEG;AACH,wBAAgB,2BAA2B,CAAC,OAAO,EAAE,MAAM,GAAG,uBAAuB,EAAE,CAEtF;AAED;;GAEG;AACH,wBAAgB,4BAA4B,CAAC,QAAQ,EAAE,qBAAqB,GAAG,uBAAuB,EAAE,CAEvG;AAED;;GAEG;AACH,wBAAgB,4BAA4B,CAAC,QAAQ,EAAE,QAAQ,GAAG,uBAAuB,EAAE,CAE1F;AAED;;GAEG;AACH,wBAAgB,wBAAwB,IAAI,iBAAiB,EAAE,CAE9D;AAED;;GAEG;AACH,wBAAgB,qBAAqB,IAAI,MAAM,CAE9C;AAED;;GAEG;AACH,wBAAgB,aAAa,CACzB,IAAI,EAAE,iBAAiB,GAAG,MAAM,EAChC,SAAS,CAAC,EAAE,OAAO,CAAC,uBAAuB,CAAC,GAC7C,uBAAuB,GAAG,IAAI,CAUhC;AAGD,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AACrD,YAAY,EACR,uBAAuB,EACvB,mBAAmB,EACnB,WAAW,EACX,YAAY,EACZ,cAAc,EACd,QAAQ,EACR,qBAAqB,GACxB,MAAM,YAAY,CAAC;AAGpB,OAAO,EACH,yBAAyB,EACzB,mBAAmB,EACnB,oBAAoB,EACpB,oBAAoB,EACpB,sBAAsB,EACtB,8BAA8B,GACjC,CAAC;;;;;;;;;;;;AAEF,wBAUE"}
|
package/src/index.js
DELETED
|
@@ -1,107 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* Vulnerability Registry - Main Entry Point
|
|
4
|
-
*
|
|
5
|
-
* Exports all vulnerability codes, definitions, and lookup utilities
|
|
6
|
-
*/
|
|
7
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
-
exports.SENSITIVE_PATH_VULNERABILITIES = exports.CONFIG_VULNERABILITIES = exports.AUTH_VULNERABILITIES = exports.SSRF_VULNERABILITIES = exports.XSS_VULNERABILITIES = exports.INJECTION_VULNERABILITIES = exports.VulnerabilityCode = exports.VULNERABILITY_REGISTRY = void 0;
|
|
9
|
-
exports.getVulnerabilityDefinition = getVulnerabilityDefinition;
|
|
10
|
-
exports.getVulnerabilitiesByScanner = getVulnerabilitiesByScanner;
|
|
11
|
-
exports.getVulnerabilitiesByCategory = getVulnerabilitiesByCategory;
|
|
12
|
-
exports.getVulnerabilitiesBySeverity = getVulnerabilitiesBySeverity;
|
|
13
|
-
exports.getAllVulnerabilityCodes = getAllVulnerabilityCodes;
|
|
14
|
-
exports.getVulnerabilityCount = getVulnerabilityCount;
|
|
15
|
-
exports.createFinding = createFinding;
|
|
16
|
-
const error_codes_js_1 = require("./error-codes.js");
|
|
17
|
-
// Import all category definitions
|
|
18
|
-
const injection_js_1 = require("./categories/injection.js");
|
|
19
|
-
Object.defineProperty(exports, "INJECTION_VULNERABILITIES", { enumerable: true, get: function () { return injection_js_1.INJECTION_VULNERABILITIES; } });
|
|
20
|
-
const xss_js_1 = require("./categories/xss.js");
|
|
21
|
-
Object.defineProperty(exports, "XSS_VULNERABILITIES", { enumerable: true, get: function () { return xss_js_1.XSS_VULNERABILITIES; } });
|
|
22
|
-
const ssrf_js_1 = require("./categories/ssrf.js");
|
|
23
|
-
Object.defineProperty(exports, "SSRF_VULNERABILITIES", { enumerable: true, get: function () { return ssrf_js_1.SSRF_VULNERABILITIES; } });
|
|
24
|
-
const authentication_js_1 = require("./categories/authentication.js");
|
|
25
|
-
Object.defineProperty(exports, "AUTH_VULNERABILITIES", { enumerable: true, get: function () { return authentication_js_1.AUTH_VULNERABILITIES; } });
|
|
26
|
-
const configuration_js_1 = require("./categories/configuration.js");
|
|
27
|
-
Object.defineProperty(exports, "CONFIG_VULNERABILITIES", { enumerable: true, get: function () { return configuration_js_1.CONFIG_VULNERABILITIES; } });
|
|
28
|
-
const sensitive_paths_js_1 = require("./categories/sensitive-paths.js");
|
|
29
|
-
Object.defineProperty(exports, "SENSITIVE_PATH_VULNERABILITIES", { enumerable: true, get: function () { return sensitive_paths_js_1.SENSITIVE_PATH_VULNERABILITIES; } });
|
|
30
|
-
/**
|
|
31
|
-
* Complete vulnerability registry combining all categories
|
|
32
|
-
*/
|
|
33
|
-
exports.VULNERABILITY_REGISTRY = {
|
|
34
|
-
...injection_js_1.INJECTION_VULNERABILITIES,
|
|
35
|
-
...xss_js_1.XSS_VULNERABILITIES,
|
|
36
|
-
...ssrf_js_1.SSRF_VULNERABILITIES,
|
|
37
|
-
...authentication_js_1.AUTH_VULNERABILITIES,
|
|
38
|
-
...configuration_js_1.CONFIG_VULNERABILITIES,
|
|
39
|
-
...sensitive_paths_js_1.SENSITIVE_PATH_VULNERABILITIES,
|
|
40
|
-
};
|
|
41
|
-
/**
|
|
42
|
-
* Get vulnerability definition by code
|
|
43
|
-
*/
|
|
44
|
-
function getVulnerabilityDefinition(code) {
|
|
45
|
-
const definition = exports.VULNERABILITY_REGISTRY[code];
|
|
46
|
-
if (definition) {
|
|
47
|
-
return { found: true, definition };
|
|
48
|
-
}
|
|
49
|
-
return { found: false };
|
|
50
|
-
}
|
|
51
|
-
/**
|
|
52
|
-
* Get all vulnerabilities for a specific scanner
|
|
53
|
-
*/
|
|
54
|
-
function getVulnerabilitiesByScanner(scanner) {
|
|
55
|
-
return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.scanner === scanner);
|
|
56
|
-
}
|
|
57
|
-
/**
|
|
58
|
-
* Get all vulnerabilities for a specific category
|
|
59
|
-
*/
|
|
60
|
-
function getVulnerabilitiesByCategory(category) {
|
|
61
|
-
return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.category === category);
|
|
62
|
-
}
|
|
63
|
-
/**
|
|
64
|
-
* Get all vulnerabilities for a specific severity
|
|
65
|
-
*/
|
|
66
|
-
function getVulnerabilitiesBySeverity(severity) {
|
|
67
|
-
return Object.values(exports.VULNERABILITY_REGISTRY).filter(v => v.severity === severity);
|
|
68
|
-
}
|
|
69
|
-
/**
|
|
70
|
-
* Get all vulnerability codes
|
|
71
|
-
*/
|
|
72
|
-
function getAllVulnerabilityCodes() {
|
|
73
|
-
return Object.values(error_codes_js_1.VulnerabilityCode);
|
|
74
|
-
}
|
|
75
|
-
/**
|
|
76
|
-
* Get total count of registered vulnerabilities
|
|
77
|
-
*/
|
|
78
|
-
function getVulnerabilityCount() {
|
|
79
|
-
return Object.keys(exports.VULNERABILITY_REGISTRY).length;
|
|
80
|
-
}
|
|
81
|
-
/**
|
|
82
|
-
* Create a finding with vulnerability definition
|
|
83
|
-
*/
|
|
84
|
-
function createFinding(code, overrides) {
|
|
85
|
-
const lookup = getVulnerabilityDefinition(code);
|
|
86
|
-
if (!lookup.found || !lookup.definition) {
|
|
87
|
-
return null;
|
|
88
|
-
}
|
|
89
|
-
return {
|
|
90
|
-
...lookup.definition,
|
|
91
|
-
...overrides,
|
|
92
|
-
};
|
|
93
|
-
}
|
|
94
|
-
// Re-export all types and enums
|
|
95
|
-
var error_codes_js_2 = require("./error-codes.js");
|
|
96
|
-
Object.defineProperty(exports, "VulnerabilityCode", { enumerable: true, get: function () { return error_codes_js_2.VulnerabilityCode; } });
|
|
97
|
-
exports.default = {
|
|
98
|
-
VulnerabilityCode: error_codes_js_1.VulnerabilityCode,
|
|
99
|
-
VULNERABILITY_REGISTRY: exports.VULNERABILITY_REGISTRY,
|
|
100
|
-
getVulnerabilityDefinition,
|
|
101
|
-
getVulnerabilitiesByScanner,
|
|
102
|
-
getVulnerabilitiesByCategory,
|
|
103
|
-
getVulnerabilitiesBySeverity,
|
|
104
|
-
getAllVulnerabilityCodes,
|
|
105
|
-
getVulnerabilityCount,
|
|
106
|
-
createFinding,
|
|
107
|
-
};
|
package/src/index.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAGrD,kCAAkC;AAClC,OAAO,EAAE,yBAAyB,EAAE,MAAM,2BAA2B,CAAC;AACtE,OAAO,EAAE,mBAAmB,EAAE,MAAM,qBAAqB,CAAC;AAC1D,OAAO,EAAE,oBAAoB,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAAE,oBAAoB,EAAE,MAAM,gCAAgC,CAAC;AACtE,OAAO,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AACvE,OAAO,EAAE,8BAA8B,EAAE,MAAM,iCAAiC,CAAC;AAEjF;;GAEG;AACH,MAAM,CAAC,MAAM,sBAAsB,GAA4C;IAC3E,GAAG,yBAAyB;IAC5B,GAAG,mBAAmB;IACtB,GAAG,oBAAoB;IACvB,GAAG,oBAAoB;IACvB,GAAG,sBAAsB;IACzB,GAAG,8BAA8B;CACpC,CAAC;AAEF;;GAEG;AACH,MAAM,UAAU,0BAA0B,CAAC,IAAgC;IACvE,MAAM,UAAU,GAAG,sBAAsB,CAAC,IAAI,CAAC,CAAC;IAChD,IAAI,UAAU,EAAE,CAAC;QACb,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,UAAU,EAAE,CAAC;IACvC,CAAC;IACD,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC;AAC5B,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,2BAA2B,CAAC,OAAe;IACvD,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,OAAO,CAAC,CAAC;AACpF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,4BAA4B,CAAC,QAA+B;IACxE,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;AACtF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,4BAA4B,CAAC,QAAkB;IAC3D,OAAO,MAAM,CAAC,MAAM,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,KAAK,QAAQ,CAAC,CAAC;AACtF,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,wBAAwB;IACpC,OAAO,MAAM,CAAC,MAAM,CAAC,iBAAiB,CAAC,CAAC;AAC5C,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,qBAAqB;IACjC,OAAO,MAAM,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,MAAM,CAAC;AACtD,CAAC;AAED;;GAEG;AACH,MAAM,UAAU,aAAa,CACzB,IAAgC,EAChC,SAA4C;IAE5C,MAAM,MAAM,GAAG,0BAA0B,CAAC,IAAI,CAAC,CAAC;IAChD,IAAI,CAAC,MAAM,CAAC,KAAK,IAAI,CAAC,MAAM,CAAC,UAAU,EAAE,CAAC;QACtC,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,OAAO;QACH,GAAG,MAAM,CAAC,UAAU;QACpB,GAAG,SAAS;KACf,CAAC;AACN,CAAC;AAED,gCAAgC;AAChC,OAAO,EAAE,iBAAiB,EAAE,MAAM,kBAAkB,CAAC;AAWrD,gDAAgD;AAChD,OAAO,EACH,yBAAyB,EACzB,mBAAmB,EACnB,oBAAoB,EACpB,oBAAoB,EACpB,sBAAsB,EACtB,8BAA8B,GACjC,CAAC;AAEF,eAAe;IACX,iBAAiB;IACjB,sBAAsB;IACtB,0BAA0B;IAC1B,2BAA2B;IAC3B,4BAA4B;IAC5B,4BAA4B;IAC5B,wBAAwB;IACxB,qBAAqB;IACrB,aAAa;CAChB,CAAC"}
|
package/src/types.d.ts
DELETED
|
@@ -1,86 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Vulnerability Registry - Core Types
|
|
3
|
-
*
|
|
4
|
-
* Central type definitions for all vulnerability definitions.
|
|
5
|
-
*/
|
|
6
|
-
/**
|
|
7
|
-
* Vulnerability severity levels
|
|
8
|
-
*/
|
|
9
|
-
export type Severity = 'critical' | 'high' | 'medium' | 'low' | 'info';
|
|
10
|
-
/**
|
|
11
|
-
* CVSS v3.1 severity ratings
|
|
12
|
-
*/
|
|
13
|
-
export type CVSSSeverity = 'CRITICAL' | 'HIGH' | 'MEDIUM' | 'LOW' | 'NONE';
|
|
14
|
-
/**
|
|
15
|
-
* Vulnerability categories
|
|
16
|
-
*/
|
|
17
|
-
export type VulnerabilityCategory = 'injection' | 'xss' | 'authentication' | 'access_control' | 'configuration' | 'information_disclosure' | 'cryptographic' | 'business_logic' | 'ssrf' | 'file_inclusion';
|
|
18
|
-
/**
|
|
19
|
-
* CVSS v3.1 Score data
|
|
20
|
-
*/
|
|
21
|
-
export interface CVSSProfile {
|
|
22
|
-
/** Base score (0.0 - 10.0) */
|
|
23
|
-
score: number;
|
|
24
|
-
/** Full CVSS vector string */
|
|
25
|
-
vector: string;
|
|
26
|
-
/** Severity rating derived from score */
|
|
27
|
-
severity: CVSSSeverity;
|
|
28
|
-
}
|
|
29
|
-
/**
|
|
30
|
-
* CWE (Common Weakness Enumeration) reference
|
|
31
|
-
*/
|
|
32
|
-
export interface CWEReference {
|
|
33
|
-
/** CWE ID (e.g., "CWE-89") */
|
|
34
|
-
id: string;
|
|
35
|
-
/** CWE name */
|
|
36
|
-
name: string;
|
|
37
|
-
/** URL to CWE definition */
|
|
38
|
-
url: string;
|
|
39
|
-
}
|
|
40
|
-
/**
|
|
41
|
-
* OWASP reference
|
|
42
|
-
*/
|
|
43
|
-
export interface OWASPReference {
|
|
44
|
-
/** OWASP ID (e.g., "A03:2021") */
|
|
45
|
-
id: string;
|
|
46
|
-
/** OWASP category name */
|
|
47
|
-
name: string;
|
|
48
|
-
/** URL to OWASP definition */
|
|
49
|
-
url: string;
|
|
50
|
-
}
|
|
51
|
-
/**
|
|
52
|
-
* Complete vulnerability definition
|
|
53
|
-
*/
|
|
54
|
-
export interface VulnerabilityDefinition {
|
|
55
|
-
/** Unique numeric identifier */
|
|
56
|
-
id: number;
|
|
57
|
-
/** Unique vulnerability code */
|
|
58
|
-
code: string;
|
|
59
|
-
/** Human-readable title */
|
|
60
|
-
title: string;
|
|
61
|
-
/** Detailed description (100+ characters) */
|
|
62
|
-
description: string;
|
|
63
|
-
/** Severity level */
|
|
64
|
-
severity: Severity;
|
|
65
|
-
/** Vulnerability category */
|
|
66
|
-
category: VulnerabilityCategory;
|
|
67
|
-
/** Scanner that detects this vulnerability */
|
|
68
|
-
scanner: string;
|
|
69
|
-
/** CVSS v3.1 profile */
|
|
70
|
-
cvss: CVSSProfile;
|
|
71
|
-
/** Associated CWE references */
|
|
72
|
-
cwe: CWEReference[];
|
|
73
|
-
/** Associated OWASP references */
|
|
74
|
-
owasp: OWASPReference[];
|
|
75
|
-
/** Remediation guidance */
|
|
76
|
-
remediation: string;
|
|
77
|
-
/** Additional reference URLs */
|
|
78
|
-
references?: string[];
|
|
79
|
-
}
|
|
80
|
-
/**
|
|
81
|
-
* Vulnerability registry lookup result
|
|
82
|
-
*/
|
|
83
|
-
export interface VulnerabilityLookup {
|
|
84
|
-
found: boolean;
|
|
85
|
-
definition?: VulnerabilityDefinition;
|
|
86
|
-
}
|
package/src/types.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["types.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH;;GAEG;AACH,MAAM,MAAM,QAAQ,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,GAAG,MAAM,CAAC;AAEvE;;GAEG;AACH,MAAM,MAAM,YAAY,GAAG,UAAU,GAAG,MAAM,GAAG,QAAQ,GAAG,KAAK,GAAG,MAAM,CAAC;AAE3E;;GAEG;AACH,MAAM,MAAM,qBAAqB,GAC3B,WAAW,GACX,KAAK,GACL,gBAAgB,GAChB,gBAAgB,GAChB,eAAe,GACf,wBAAwB,GACxB,eAAe,GACf,gBAAgB,GAChB,MAAM,GACN,gBAAgB,CAAC;AAEvB;;GAEG;AACH,MAAM,WAAW,WAAW;IACxB,8BAA8B;IAC9B,KAAK,EAAE,MAAM,CAAC;IACd,8BAA8B;IAC9B,MAAM,EAAE,MAAM,CAAC;IACf,yCAAyC;IACzC,QAAQ,EAAE,YAAY,CAAC;CAC1B;AAED;;GAEG;AACH,MAAM,WAAW,YAAY;IACzB,8BAA8B;IAC9B,EAAE,EAAE,MAAM,CAAC;IACX,eAAe;IACf,IAAI,EAAE,MAAM,CAAC;IACb,4BAA4B;IAC5B,GAAG,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,cAAc;IAC3B,kCAAkC;IAClC,EAAE,EAAE,MAAM,CAAC;IACX,0BAA0B;IAC1B,IAAI,EAAE,MAAM,CAAC;IACb,8BAA8B;IAC9B,GAAG,EAAE,MAAM,CAAC;CACf;AAED;;GAEG;AACH,MAAM,WAAW,uBAAuB;IACpC,gCAAgC;IAChC,EAAE,EAAE,MAAM,CAAC;IACX,gCAAgC;IAChC,IAAI,EAAE,MAAM,CAAC;IACb,2BAA2B;IAC3B,KAAK,EAAE,MAAM,CAAC;IACd,6CAA6C;IAC7C,WAAW,EAAE,MAAM,CAAC;IACpB,qBAAqB;IACrB,QAAQ,EAAE,QAAQ,CAAC;IACnB,6BAA6B;IAC7B,QAAQ,EAAE,qBAAqB,CAAC;IAChC,8CAA8C;IAC9C,OAAO,EAAE,MAAM,CAAC;IAEhB,wBAAwB;IACxB,IAAI,EAAE,WAAW,CAAC;IAElB,gCAAgC;IAChC,GAAG,EAAE,YAAY,EAAE,CAAC;IAEpB,kCAAkC;IAClC,KAAK,EAAE,cAAc,EAAE,CAAC;IAExB,2BAA2B;IAC3B,WAAW,EAAE,MAAM,CAAC;IAEpB,gCAAgC;IAChC,UAAU,CAAC,EAAE,MAAM,EAAE,CAAC;CACzB;AAED;;GAEG;AACH,MAAM,WAAW,mBAAmB;IAChC,KAAK,EAAE,OAAO,CAAC;IACf,UAAU,CAAC,EAAE,uBAAuB,CAAC;CACxC"}
|
package/src/types.js
DELETED
package/src/types.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"types.js","sourceRoot":"","sources":["types.ts"],"names":[],"mappings":"AAAA;;;;GAIG"}
|