Getting Started
Scan Results
Once a scan is completed in ZeroThreat, the results provide a detailed, actionable view of all detected vulnerabilities — from surface-level issues to deep security flaws found in authenticated and unauthenticated areas of your application.
ZeroThreat organizes results to help you prioritize, investigate, and resolve issues quickly and effectively.
Scanner
Displays real-time scan progress, including authenticated and unauthenticated crawling, along with OWASP Top 10 checks.Web App Vulnerabilities
Lists detected security issues in web applications, categorized by severity, with detailed remediation steps.Detected API's vulnerabilities
Identifies all the security flaws found in a particular API endpoint, showing affected requests and responses.Information Exposure
Highlights sensitive data leaks like PII, secret data leaks like credentials, and cloud misconfigurations.SSL Certificate Scan
Analyzes SSL/TLS configurations, checking for vulnerabilities, expiration status, and compliance issues.Vulnerable Version detection
Detects outdated JavaScript libraries and server-side technologies with known security risks.Server Ports Scan
Scans open ports on the server, assessing potential risks and providing mitigation strategies.Mail Configuration
Evaluates the mail server for misconfigurations like open relays and reverse DNS mismatches.In a scan report, Navigate to Vulnerabilities -> Web Application. Here you can access all the vulnerabilities found in your application. You can filter the vulnerabilities on the basis of severity: Critical, Medium, Low and Informational.
For each vulnerability, we provide comprehensive details to help you understand its context and impact:
- General Information:
- Information: Provides a high-level summary of the vulnerability, including what it means and its potential impact.
- Severity: Indicates the assigned severity level.
- CVSS v3.0 base score: Provides a standardized score based on the Common Vulnerability Scoring System (CVSS), helping you assess the severity and urgency of the issue.
- Detailed Information under 'Show more information': It provides detailed information like Common Consequences, CVEs, CWEs, NIST mapping, ISO mapping, References and more.
- Remediation Steps:
- We provide customized remediation guidance specific to the context of your application. This ensures that fixes are tailored to address the exact vulnerabilities present.
- Affected URIs:
- Lists all the impacted endpoints or web resources, making it easier to pinpoint and resolve issues across your application.
- Request Details and Evidence:
- Includes the HTTP request (method, URL), request headers, response headers, HTTP response body, and evidence of the vulnerability, such as error messages or abnormal behavior, which confirms the presence and impact of the issue.
Each vulnerability is categorized based on its potential impact, helping you prioritize actions:
- Critical:
- Critical vulnerabilities that can result in full control over your application or data. Immediate remediation is required to prevent severe damage, especially as these are often targeted by automated exploits.
- Medium:
- Vulnerabilities that attackers can exploit with moderate effort. These often involve misconfigurations or logical errors and can still lead to significant security issues.
- Low:
- Less critical vulnerabilities, often related to reconnaissance. While individually they pose less risk, they could support larger attack vectors if combined with other weaknesses.
- Informational:
- Insights into application behavior, configurations, or components that do not directly pose a threat but could aid attackers in gathering intelligence.
By leveraging this detailed information and applying tailored remediation, you can effectively address vulnerabilities and enhance your application’s security posture.
Scan completed and want to share the report with team members? See our guide on Share Scan Results.