package com.nvarghese.beowulf.common.webtest;
public enum ReportThreatType {
BRUTEFORCE("Brute Force", 8001),
INSUFFICIENT_AUTH("Insufficient Authentication", 8002),
WEAK_PASSWD("Weak Password Recovery Validation", 8003),
CRED_SESS_PREDICTION("Credential/Session Prediction", 8004),
INSUFFICIENT_AUTHZ("Insufficient Authorization", 8005),
INSUFFICENT_SESS_EXP("Insufficient Session Expiration", 8006),
SESS_FIXATION("Session Fixation", 8007),
INSECURE_DIRECT_OBJ_REF("Insecure Direct Object Reference", 8008),
CONTENT_SPOOFING("Content Spoofing", 8009),
XSS("Cross Site Scripting", 8010),
CSRF("Cross Site Request Forgery", 8011),
BUFFER_OVERFLOW("Buffer Overflow", 8012),
FORMAT_STRING_ATTACK("Format String Attack", 8013),
LDAP_INJ("LDAP Injection", 8014),
OS_COMMANDING("OS Commanding", 8015),
SQL_INJ("SQL Injection", 8016),
SSI_INJ("SSI Injection", 8017),
XPATH_INJ("XPATH Injection", 8018),
RFI("Remote File Inclusion", 8019),
DIRECTORY_INDEXING("Directory Indexing", 8020),
INFORMATION_LEAKAGE("Information Leakage", 8021),
PATH_TRAVERSAL("Path Traversal", 8022),
PRED_RESOURCE_LOCATION("Predictable Resource Location", 8023),
ABUSE_OF_FUNCTIONALITY("Abuse of Functionality", 8024),
DENIAL_OF_SERVICE("Denial of Service", 8025),
INSUFF_PROCESS_VALIDATION("Insufficient Process Validation", 8026);
private String name;
private long id;
ReportThreatType(String name, long id) {
this.name = name;
this.id = id;
}
public String getName() {
return name;
}
public long getId() {
return id;
}
}