VXDF Logo
VXDF

VXDF Format Comparison

Compare traditional vulnerability reports with VXDF's structured evidence approach

SQL Injection Example
Critical
CWE-89
Traditional Security Report

Potential SQL Injection

User input may not be properly sanitized before database query execution.

Confidence:
Low
Investigation:Manual investigation required
Location:LoginController.java:42
Evidence:None provided
Recommended Actions:
• Manual testing required to confirm exploitability
• Review code for potential input validation issues
• Consult security team for further analysis
Limitations:
  • Static analysis may produce false positives
  • Actual exploitability not verified
  • Impact assessment requires manual review
False Positive Likelihood: High uncertainty
VXDF Evidence-Based Report

Validated SQL Injection - Authentication Bypass

Demonstrated SQL injection allows authentication bypass and data extraction.

Confidence:
Confirmed
Investigation:Minimal verification needed
Data Flow:LoginController.java:42 → DatabaseUtils.java:156
Evidence:
HTTP Request: username=' OR '1'='1' --&password=test
Database Query: SELECT * FROM users WHERE username='' OR '1'='1' --' AND password='test'
Response: 200 OK with admin session token
Data Extracted: 15,432 user records including passwords
Remediation Steps:
  1. 1Replace string concatenation with prepared statements
  2. 2Implement input validation for username/password fields
  3. 3Add rate limiting to login endpoint
Validated & Actionable: Ready for immediate remediation
Structural Differences Comparison

Evidence Structure

Traditional:Unstructured text
VXDF:33 structured types
Structured data

Validation Requirement

Traditional:Not required
VXDF:Mandatory
Evidence-based

Remediation Guidance

Traditional:General advice
VXDF:Specific steps
Actionable details

Machine Readability

Traditional:Limited
VXDF:Full JSON Schema
API-friendly

Ready to Experience Evidence-Based Security?

Explore the full VXDF schema and see how it transforms vulnerability management