Skip to main content

Viewing Results

Checkmarx One shows data for all the environments in your tenant account as defined in Access Control. The Environments page (Applications and Projects Environment tab) shows a table listing all of your environments.

You can also drill down to view the Environments page for an individual environment, which shows information about the scans currently running or that have finished. You can drill down further to view the All risks view, which shows detailed information about each risk identified in the last scan.

Viewing DAST Results in the Risk Table

Note

Please see here for details on triaging your DAST results.

Alerts and Paths

Before viewing your risk table, note that there are two ways Checkmarx organizes DAST results: Alerts and Paths. Alerts are the default setting for new Checkmarx users. Alerts groups DAST results by vulnerability type, while Paths organize each vulnerability by the result's path. Perform the following to switch between the Alerts view and the Paths view:

  1. Navigate to Global Settings.

  2. Select DAST.

  3. Select the display mode: By Vulnerability or By Path.

  4. Click Save when done.

In the Alerts view, clicking a result's View opens a panel displaying all its related instances. Clicking on a specific instance will provide more details and the evidence of the vulnerability.

Note

For organizational ease, Checkmarx recommends the Alerts view.

Overview Tab

Clicking image__8_.png at the end of a result's row opens the result's overview. The overview tab displays an at‑a‑glance summary of an environment, including associated applications, groups, and users; scan dates and times; and high‑level dashboards of the discovered vulnerabilities and compliance postures. You can run a new scan for the environment by clicking Scan at the top of the page. Clicking actions_project_settings.png will open the settings for that environment. Clicking Vertical_Ellipsis.png will open a dropdown of all the other actions for the environment.

dastoverview.png

Results Table Tab

Click Results at the end of an environment row to open the Results Table tab alongside the Site Tree tab. The results table lists all vulnerabilities in your environment and organizes them by the following columns: Severity, Vulnerability Type, Instances, Compliance, State, Status, and Notes.

  • Severity - the vulnerability severity level: Critical critical_icon.png, HighHigh_Severity.png, MediumMedium_Severity.png, LowLow_Severity.png, or InfoInfo_Severity.png

  • Vulnerability Type - the vulnerability type.

  • Instances - the number of instances the vulnerability appears

  • Compliance - when marked, the results failed to comply with one of the following standards: HIPAAhipaa_icon.png, OWASP Top 10owasp_top_10_icon.png, PCI-DSSpcidss_compliant.png

  • State - the vulnerability state: To Verify, Confirmed, Urgent, Proposed Not Exploitable, Not Exploitable

  • Status - the vulnerability status: New or Recurrent

  • Notes - Any notes on the vulnerability.

By default, the table displays 10 rows, but you can change this to 20 or 50 in the dropdown. The table is paginated, and you can save your preferred view by selecting Set as Default.

You can also group or filter the data. To group results, add a grouping category such as Severity or Vulnerability Type. To filter results, hover over a column header, select filtericon.png, and choose your filter options from the drop‑down menu. Columns can also be sorted in ascending or descending order by clicking the header.

resultstableviewdast.png

Accessing Risk Details

To access the risk details, click on the row for the risk you need details on. A new window will open, presenting a brief description of the risk and its resolution.

6790251135.png

To access more information regarding the risks:

1. Click on the Severity button.

6790251132.png

The following additional fields are displayed:

  • State

  • Risk level

  • Compliance

  • Confidence

  • Method

  • Param

  • URI

  • Evidence

  • Attack

6790251120.png

2. In the Description pane, click View More to display a full explanation of the risk.

6790251129.png
6790251111.png

3. In the Resolution pane, click View More to display a full explanation of how to resolve the risk.

6790251126.png

4. Click View Findings to open a side panel with the following information:

  • Risk Level

  • Risk State

  • Request Headers

  • Response Body and Headers

6790251123.png
6790251105.png

Site Tree View Tab

The Site Tree visually maps your application's structures and scanned paths. It helps you visualize the hierarchy of URLs and their scans, so you can see which parts of the web application were scanned and how they are organized. A new Site Tree is created for each successful scan and appears in the Site Tree tab, separate from the Results Table.

The Site Tree is displayed in a resizable panel, enabling you to adjust the view according to your preference or screen size. Any paths where vulnerabilities are detected are visually marked with severity indicators.

Clicking on a path in the Sites Tree reveals detailed information about that node.

site_tree.png

Scan History

The Scan History tab provides access to the results of all successful scans. Similar to adjusting results on the Results Table, you can adjust the severity or status of results in Scan History, and any changes will automatically affect other related scans.

image-20250122-110944.png

After completing a scan, the latest results are displayed in the Results Table, while previous results are moved to and can be viewed in the Scan History tab. No specific role is required to access scan history, and you can access it through the Environment by selecting View on a scan with results. This opens the environment's scan results page, where you can access Scan History via the top-right menu.

image-20250121-130901.png

There are three statuses for scans: Completed, Failed, and Partial Scans. Completed scans are successful scans, while Failed scans are those scans that failed to run. Partial scans are scans that have been completed but contain errors. Download the scan logs to see what went wrong in the scan by clicking Vertical_Ellipsis.png at the end of the result's row and then Download Scan Log