VXDF Schema Reference
Complete Schema Reference
Comprehensive documentation of all VXDF objects, properties, enums, and evidence types
Enumerations
Predefined values and constants used throughout the VXDF schema
Vulnerabilities requiring immediate action with severe impact
Serious vulnerabilities with significant impact
Moderate vulnerabilities requiring attention
Minor vulnerabilities with limited impact
Information that may be useful but not directly exploitable
No security impact
Newly discovered, awaiting action
Being analyzed by security team
Fix is being implemented
Fix has been applied
Fix has been tested and verified
Determined to be non-exploitable
Risk has been formally accepted
Remediation postponed to future date
Custom status not covered above
Code file, line, function
HTTP parameter (query, body, etc.)
HTTP request/response header
HTTP cookie
Third-party library or dependency
Configuration file entry
File or directory on filesystem
Network service or port
Database table, column, procedure
System or application environment variable
Windows registry key or similar
Cloud service or resource
Function in compiled binary
Memory region in running process
UI component or element
Generic resource identifier
SQL, NoSQL, OS, LDAP injection vulnerabilities
Authorization and access control failures
Weak cryptography or missing encryption
Design and architectural flaws
Incorrect security settings
Using components with known vulnerabilities
Authentication weaknesses
Code and infrastructure integrity issues
Insufficient logging and monitoring
SSRF vulnerabilities
Vulnerabilities not fitting other categories
Initial interaction with data source
Data is transformed or modified
Data flows to another location
Conditional logic based on data
Final exploitation point
Attempted data validation
Configuration data accessed
Call to another component
System state modification
General intermediate step
Third-party library or package
Application module or component
Executable binary file
Operating system component
Hardware device or driver
Firmware component
Container or VM image
Configuration file
Network service endpoint
Router, switch, firewall
Cloud service component
Database or data store
Protocol implementation
Other component type
HTTP request that exploits the vulnerability
HTTP response showing exploitation
Vulnerable source code
Code where exploitation occurs
Additional code context
Proof-of-concept exploit script
Application log showing exploitation
System log entry
Web server log entry
Database log entry
Debugger output
Exception stack trace
Screenshot URL
Embedded screenshot
Manual test notes
Test payload that triggered vulnerability
Environment configuration
Network traffic capture
Static analysis flow
Control flow graph
Vulnerable configuration
Component scan results
Missing security artifact
Behavioral change observation
Database modification proof
File system modification
Command execution output
Sample of exfiltrated data
Leaked session information
External system interaction
Differential analysis results
Tool-specific output
Other evidence type
Static code analysis
Runtime testing exploitation
IAST exploitation
Manual code review
Manual penetration test
Automated exploit tool
SCA validation
Fuzzing crash analysis
Reverse engineering
Configuration audit
Log correlation analysis
Multiple validation methods
Other validation method
HTTP GET method
HTTP POST method
HTTP PUT method
HTTP DELETE method
HTTP PATCH method
HTTP OPTIONS method
HTTP HEAD method
HTTP CONNECT method
HTTP TRACE method
Other HTTP method
URL query parameter
Form-encoded body parameter
JSON body using JSON Pointer (RFC 6901)
XML body using XPath 1.0
Multipart form field
URL path segment
Amazon Web Services
Microsoft Azure
Google Cloud Platform
Oracle Cloud Infrastructure
Other cloud platform
Easily exploitable with common tools
Requires some expertise or specific conditions
Requires significant expertise or rare conditions
Proven possible but very difficult in practice
Exploitability not yet assessed
Evidence Data Structures
Structured data formats for different types of vulnerability evidence
Evidence TypeHTTP_REQUEST_LOG
HTTP request that demonstrates the vulnerability
Properties
method
HttpMethodEnum
HTTP method
url
string
Request URL
version
string
HTTP version
headers
array[HttpHeader]
Request headers
body
string
Request body content
bodyEncoding
HttpRequestBodyEncodingEnum
Body encoding
Default: plaintext
Example:
{
"method": "POST",
"url": "/api/login",
"headers": [
{
"name": "Content-Type",
"value": "application/json"
}
],
"body": "{\"username\":\"admin' OR '1'='1\",\"password\":\"any\"}",
"bodyEncoding": "json"
}
All Evidence Types
VXDF supports 33 evidence types for comprehensive vulnerability documentation:
- • HTTP Request/Response Logs
- • Screenshots (URL/Embedded)
- • Session Information Leaks
- • Code Snippets (Source/Sink/Context)
- • PoC Scripts
- • Test Payloads
- • Application/System/Web Server Logs
- • Database Logs
- • Debugger Output
- • Exception Traces
- • Static/Dynamic Analysis Results
- • Behavioral Changes
- • State Change Proofs
- • External Interactions