The Summarized Results section of the Results page provides an excellent overview of all the flaws by severity and status, as well as a summary of the top risks and how your metrics data is trending.
At a glance, you can see the number and types of flaws the application currently contains.
|Very High||The offending line or lines of code is a very serious weakness and is an easy target for an attacker. The code should be modified immediately to avoid potential attacks.|
|High||The offending line or lines of code have significant weakness, and the code should be modified immediately to avoid potential attacks.|
|Medium||A weakness of average severity. These flaws should be fixed in high assurance software. You should consider fixing this weakness after you fix the very high and high flaws for medium assurance software.|
|Low||This is a low priority weakness that will have a small impact on the security of the software. You should consider fixing these flaws for high assurance software. Medium- and low-assurance software can ignore these flaws.|
|Very Low||Minor problems that some high assurance software may want to be aware of. These flaws can be safely ignored in medium- and low-assurance software.|
|Informational||Issues that have no impact on the security quality of the application but which may be of interest to the reviewer.|
Remediation Status data shows the number of flaws found in an application, characterized by remediation status.
Trend Data shows the history of the scans and their scores over time. You can hover over data points on the chart to view the name, date, and score of each scan.