@datadog/datadog-api-client
Version:
OpenAPI client for Datadog APIs
51 lines • 3.6 kB
JavaScript
/**
* Unless explicitly stated otherwise all files in this repository are licensed under the Apache-2.0 License.
* This product includes software developed at Datadog (https://www.datadoghq.com/).
* Copyright 2020-Present Datadog, Inc.
*/
Object.defineProperty(exports, "__esModule", { value: true });
exports.XSS = exports.X_PATH_INJECTION = exports.X_CONTENT_TYPE_HEADER_MISSING = exports.WEAK_RANDOMNESS = exports.WEAK_HASH = exports.WEAK_CIPHER = exports.VERB_TAMPERING = exports.UNVALIDATED_REDIRECT = exports.UNTRUSTED_DESERIALIZATION = exports.UNMAINTAINED = exports.TRUST_BOUNDARY_VIOLATION = exports.STACK_TRACE_LEAK = exports.SSRF = exports.SQL_INJECTION = exports.SESSION_TIMEOUT = exports.SESSION_REWRITING = exports.RISKY_LICENSE = exports.REFLECTION_INJECTION = exports.PATH_TRAVERSAL = exports.NO_SQL_MONGO_DB_INJECTION = exports.NO_SAME_SITE_COOKIE = exports.NO_HTTP_ONLY_COOKIE = exports.MANDATORY_REMEDIATION = exports.MALICIOUS_PACKAGE = exports.LDAP_INJECTION = exports.INSECURE_JSP_LAYOUT = exports.INSECURE_COOKIE = exports.INSECURE_AUTH_PROTOCOL = exports.HSTS_HEADER_MISSING = exports.HEADER_INJECTION = exports.HARDCODED_SECRET = exports.HARDCODED_PASSWORD = exports.END_OF_LIFE = exports.EMAIL_HTML_INJECTION = exports.DIRECTORY_LISTING_LEAK = exports.DEFAULT_HTML_ESCAPE_INVALID = exports.DEFAULT_APP_DEPLOYED = exports.DANGEROUS_WORKFLOWS = exports.COMPONENT_WITH_KNOWN_VULNERABILITY = exports.COMMAND_INJECTION = exports.CODE_INJECTION = exports.ADMIN_CONSOLE_ACTIVE = void 0;
exports.ADMIN_CONSOLE_ACTIVE = "AdminConsoleActive";
exports.CODE_INJECTION = "CodeInjection";
exports.COMMAND_INJECTION = "CommandInjection";
exports.COMPONENT_WITH_KNOWN_VULNERABILITY = "ComponentWithKnownVulnerability";
exports.DANGEROUS_WORKFLOWS = "DangerousWorkflows";
exports.DEFAULT_APP_DEPLOYED = "DefaultAppDeployed";
exports.DEFAULT_HTML_ESCAPE_INVALID = "DefaultHtmlEscapeInvalid";
exports.DIRECTORY_LISTING_LEAK = "DirectoryListingLeak";
exports.EMAIL_HTML_INJECTION = "EmailHtmlInjection";
exports.END_OF_LIFE = "EndOfLife";
exports.HARDCODED_PASSWORD = "HardcodedPassword";
exports.HARDCODED_SECRET = "HardcodedSecret";
exports.HEADER_INJECTION = "HeaderInjection";
exports.HSTS_HEADER_MISSING = "HstsHeaderMissing";
exports.INSECURE_AUTH_PROTOCOL = "InsecureAuthProtocol";
exports.INSECURE_COOKIE = "InsecureCookie";
exports.INSECURE_JSP_LAYOUT = "InsecureJspLayout";
exports.LDAP_INJECTION = "LdapInjection";
exports.MALICIOUS_PACKAGE = "MaliciousPackage";
exports.MANDATORY_REMEDIATION = "MandatoryRemediation";
exports.NO_HTTP_ONLY_COOKIE = "NoHttpOnlyCookie";
exports.NO_SAME_SITE_COOKIE = "NoSameSiteCookie";
exports.NO_SQL_MONGO_DB_INJECTION = "NoSqlMongoDbInjection";
exports.PATH_TRAVERSAL = "PathTraversal";
exports.REFLECTION_INJECTION = "ReflectionInjection";
exports.RISKY_LICENSE = "RiskyLicense";
exports.SESSION_REWRITING = "SessionRewriting";
exports.SESSION_TIMEOUT = "SessionTimeout";
exports.SQL_INJECTION = "SqlInjection";
exports.SSRF = "Ssrf";
exports.STACK_TRACE_LEAK = "StackTraceLeak";
exports.TRUST_BOUNDARY_VIOLATION = "TrustBoundaryViolation";
exports.UNMAINTAINED = "Unmaintained";
exports.UNTRUSTED_DESERIALIZATION = "UntrustedDeserialization";
exports.UNVALIDATED_REDIRECT = "UnvalidatedRedirect";
exports.VERB_TAMPERING = "VerbTampering";
exports.WEAK_CIPHER = "WeakCipher";
exports.WEAK_HASH = "WeakHash";
exports.WEAK_RANDOMNESS = "WeakRandomness";
exports.X_CONTENT_TYPE_HEADER_MISSING = "XContentTypeHeaderMissing";
exports.X_PATH_INJECTION = "XPathInjection";
exports.XSS = "Xss";
//# sourceMappingURL=VulnerabilityType.js.map
;