Skip to main content

Viewing Web Application Scan Results

Overview

Learn how to view scan results, analyze vulnerabilities, and track security risks for web applications from the DeepTraQ dashboard.

This section helps you:

  • Navigate web scan result views
  • Understand vulnerability findings
  • Filter and search results
  • Perform triage actions
  • Track trends over time
  • Analyze security posture

Prerequisites

  • At least one completed Web Application Scan
  • Access to the Web Application Scans dashboard

Steps to View Scan Results

  1. Navigate to Web Application Scans → Projects
  2. Select the scan project (e.g., Demo Web Scan)
  3. Click the project name to open scan results
  4. You will land on the Vulnerabilities tab by default

Scan Result Tabs

Each scan provides multiple views for analysis:

1. Vulnerabilities (Default View)

  • Displays all detected web application vulnerabilities
  • Includes severity, affected endpoints, and risk details
  • Primary workspace for analysis and triage

2. Summary

  • High-level overview of application security posture

  • Includes:

    • Total findings
    • Severity distribution
    • Key risk insights
    • Executive summary for stakeholders

3. Raw Output

  • Provides technical scan output data
  • Helps understand underlying detection details
  • Useful for advanced analysis and debugging

4. History

  • Track scan results over time
  • View all past scans with timestamps
  • Compare results to identify improvements and new risks

Use filters to quickly narrow down results:

  • Search Bar → Find vulnerabilities by keywords
  • Severity Filter → Focus on critical or high-risk issues
  • Scan History Filter → View findings from previous scans

Click Apply to update results.


Viewing Vulnerability Details

  1. Click on a vulnerability
  2. Select Details

You can view:

  • Description
  • Severity and impact
  • Affected endpoints
  • Exploit potential
  • Mitigation steps
  • References
  • Classification and scoring

Vulnerability Intelligence

Each vulnerability provides enriched context to support decision-making:

  • Detailed technical explanation
  • Risk scoring and classification
  • References for further analysis
  • Recommended remediation steps

Triage Actions

Take action directly on vulnerabilities:

  • Accept Risk → Mark as acknowledged with justification
  • Mark as False Positive → Exclude invalid findings
  • Add Comments → Provide context and collaborate

These actions help prioritize and manage vulnerabilities effectively.


  • Navigate to the History tab
  • Review past scan executions with timestamps
  • Compare current and previous scans

Analyze:

  • Newly discovered vulnerabilities
  • Resolved issues
  • Security posture improvements

Security Insights & Summary

  • Review executive-level summaries
  • Understand overall security posture at a glance
  • Identify key risk areas and priority vulnerabilities

Troubleshooting Scan Issues

  • Review scan outputs in the Raw Output tab
  • Analyze detection details and anomalies
  • Use scan history to investigate inconsistencies

Refer to the troubleshooting guide for detailed steps.


Downloading Reports

To share results:

  1. Click the Download button
  2. Select report type and format
  3. Export the report

Reports include:

  • Vulnerability details
  • Severity classification
  • Remediation guidance

Field Reference

FieldDescriptionExample
VulnerabilitiesList of detected web vulnerabilitiesSQL Injection
SummaryHigh-level scan insightsSeverity distribution
Raw OutputTechnical scan resultsHTTP response details
HistoryPrevious scan executionsScan on Jan 10
Search BarKeyword-based filteringXSS
FiltersNarrow down vulnerability resultsSeverity filter
DetailsIn-depth vulnerability informationRemediation steps
DownloadExport scan reportPDF