Viewing Web Application Scan Results
Overview
Learn how to view scan results, analyze vulnerabilities, and track security risks for web applications from the DeepTraQ dashboard.
This section helps you:
- Navigate web scan result views
- Understand vulnerability findings
- Filter and search results
- Perform triage actions
- Track trends over time
- Analyze security posture
Prerequisites
- At least one completed Web Application Scan
- Access to the Web Application Scans dashboard
Steps to View Scan Results
- Navigate to Web Application Scans → Projects
- Select the scan project (e.g., Demo Web Scan)
- Click the project name to open scan results
- You will land on the Vulnerabilities tab by default
Scan Result Tabs
Each scan provides multiple views for analysis:
1. Vulnerabilities (Default View)
- Displays all detected web application vulnerabilities
- Includes severity, affected endpoints, and risk details
- Primary workspace for analysis and triage
2. Summary
-
High-level overview of application security posture
-
Includes:
- Total findings
- Severity distribution
- Key risk insights
- Executive summary for stakeholders
3. Raw Output
- Provides technical scan output data
- Helps understand underlying detection details
- Useful for advanced analysis and debugging
4. History
- Track scan results over time
- View all past scans with timestamps
- Compare results to identify improvements and new risks
Filtering & Search
Use filters to quickly narrow down results:
- Search Bar → Find vulnerabilities by keywords
- Severity Filter → Focus on critical or high-risk issues
- Scan History Filter → View findings from previous scans
Click Apply to update results.
Viewing Vulnerability Details
- Click on a vulnerability
- Select Details
You can view:
- Description
- Severity and impact
- Affected endpoints
- Exploit potential
- Mitigation steps
- References
- Classification and scoring
Vulnerability Intelligence
Each vulnerability provides enriched context to support decision-making:
- Detailed technical explanation
- Risk scoring and classification
- References for further analysis
- Recommended remediation steps
Triage Actions
Take action directly on vulnerabilities:
- Accept Risk → Mark as acknowledged with justification
- Mark as False Positive → Exclude invalid findings
- Add Comments → Provide context and collaborate
These actions help prioritize and manage vulnerabilities effectively.
Tracking Trends & History
- Navigate to the History tab
- Review past scan executions with timestamps
- Compare current and previous scans
Analyze:
- Newly discovered vulnerabilities
- Resolved issues
- Security posture improvements
Security Insights & Summary
- Review executive-level summaries
- Understand overall security posture at a glance
- Identify key risk areas and priority vulnerabilities
Troubleshooting Scan Issues
- Review scan outputs in the Raw Output tab
- Analyze detection details and anomalies
- Use scan history to investigate inconsistencies
Refer to the troubleshooting guide for detailed steps.
Downloading Reports
To share results:
- Click the Download button
- Select report type and format
- Export the report
Reports include:
- Vulnerability details
- Severity classification
- Remediation guidance
Field Reference
| Field | Description | Example |
|---|---|---|
| Vulnerabilities | List of detected web vulnerabilities | SQL Injection |
| Summary | High-level scan insights | Severity distribution |
| Raw Output | Technical scan results | HTTP response details |
| History | Previous scan executions | Scan on Jan 10 |
| Search Bar | Keyword-based filtering | XSS |
| Filters | Narrow down vulnerability results | Severity filter |
| Details | In-depth vulnerability information | Remediation steps |
| Download | Export scan report |