Skip to main content
Vidoc detects security vulnerabilities across two main categories: Attack Vulnerabilities and Compliance Issues.

Category Types

Attack Vulnerabilities

Direct security threats that can be actively exploited by attackers. These represent code that allows unauthorized actions when malicious input is provided. Examples: SQL Injection, XSS, Command Injection, SSRF View all Attack Vulnerabilities →

Compliance Issues

Security weaknesses, misconfigurations, and violations of security best practices. These may not be directly exploitable but weaken your security posture. Examples: Hardcoded Secrets, Weak Cryptography, Insecure Transport View all Compliance Issues →

Severity Levels

Each issue is assigned a severity based on potential impact and exploitability:
SeverityDescriptionResponse
CriticalImmediately exploitable, high impactFix immediately
HighEasily exploitable, significant impactFix soon
MediumExploitable with conditions, moderate impactPlan to fix
LowDifficult to exploit, limited impactFix when convenient
InformativeBest practice suggestionConsider improving

Attack Vulnerabilities Summary

CategoryDescriptionTypical Severity
SQL InjectionUser input in SQL queriesCritical
XSSUnsanitized output to browsersHigh
Command InjectionUser input in system commandsCritical
RCERemote code executionCritical
SSRFServer-side request forgeryHigh
Path TraversalFile access with user inputHigh
IDORDirect object referenceHigh
CSRFCross-site request forgeryMedium
XXEXML external entity injectionHigh
Open RedirectRedirect to untrusted URLsMedium
Full list with details →

Compliance Issues Summary

CategoryDescriptionTypical Severity
Hardcoded SecretsCredentials in source codeHigh
Weak CryptographyInsecure algorithmsMedium
Weak RandomnessPredictable random valuesMedium
Insecure TransportMissing HTTPS/TLSMedium
Information DisclosureSensitive data exposureMedium
MisconfigurationInsecure settingsVaries
Supply Chain RiskVulnerable dependenciesVaries
Full list with details →

Detection Confidence

Vidoc uses AI to validate findings, resulting in confidence levels:
ConfidenceMeaning
ConfirmedAI validated the vulnerability exists
LikelyStrong indicators, needs manual review
PossiblePotential issue, investigate further

How Categories Are Assigned