Show progress with reports
Copy link

Generate, share, and download app-level and scan-level reports to share your progress with stakeholders.

Which report should I generate?
Copy link

ReportDescription
Application Security (InsightAppSec) Applications (Apps) Executive ReportExecutive data on all the apps scanned by Application Security (InsightAppSec) for a selected calendar month.

Use this report to show a CISO or other executives the monthly progress you are making with your application security program, or highlight areas you may need to make greater investments in.
Application Security (InsightAppSec) and Vulnerability Management (InsightVM)Executive data on the apps and assets scanned by Application Security (InsightAppSec) and Vulnerability Management (InsightVM) for a selected calendar month.

Vulnerability management has many facets and, with this report, you can give your CISO or other executives a holistic view of your vulnerability management program.
Application Security (InsightAppSec) (App) Executive ReportExecutive data for an individual app scanned by Application Security (InsightAppSec) for a selected date range.
Vulnerabilities Summary ReportBasic or detailed vulnerability data on a scan run for a specific application.

Scan managers can use the Vulnerabilities Summary Report to get quick yet detailed insights into the most recent scan or particular scan they’re reporting on.

This report could also benefit engineering team managers planning for resource allocation, and identifying issues that need to be addressed.
Vulnerabilities with Remediation ReportThis report provides vulnerability data on a scan by Application Security (InsightAppSec) for a specific application along with remediation recommendations.
Scan compliance reportsYou can use the scan compliance reports to advise on your compliance with specific regulations. These reports allow you to see how the results of a scan compare with the regulations your organization must comply with.
⚠️

Application Security (InsightAppSec) reports are advisory only

If a report shows no vulnerabilities, or low severity or safe vulnerabilities, this should not necessarily be taken as affirmation of compliance.

Create a report for one or more apps
Copy link

You can generate executive-level reports containing data on all of your apps from the Apps page and for an individual app from within the app.

Generate a report for multiple apps

  1. Click Apps in the left navigation menu.
  2. Click Generate Report.
  3. From the Generate Executive Report screen, enter a Report Name and select a calendar month. The report pulls in data for completed calendar months only, so you have to wait until the beginning of the next month to generate the report. It may take up to 7 days from the start of each month for the previous month’s data to become available.
  4. In Report Types, select one of the following:
    • Application Security (InsightAppSec) All App Executive Report
    • Combined Application Security (InsightAppSec) and Vulnerability Management (InsightVM) Executive Report
  5. Click Generate Report.

Generate a report for one app

  1. Click Apps in the left navigation menu.
  2. Select an app from the Apps vulnerability table.
  3. Click Generate Report.
  4. On the Generate Report screen, enter a Report Name and select a date range.
  5. Select Executive Report under Report Types.
  6. Select a Format Type (PDF or HTML).
  7. Click Generate Report.
Format Type - Generate Report

Create a scan-level report to view vulnerabilities
Copy link

You can generate scan-level reports with vulnerability or compliance-related information from within an individual scan.

Generate an Application Security (InsightAppSec) scan level report

  1. Click Scans in the left navigation menu.
  2. Select a scan from the scan-level vulnerability table. You can also select scans from within an App.
  3. Click Generate Report.
  4. From the Generate Report screen, enter a Report Name and select a Report Type.
  5. Select a scan report.
  6. Select a Format.
  7. Click Generate Report.

Filter scan report data

You can add filters to a scan-level report to refine the data before generating the report.

  1. Go to the Scans page and select a scan.
  2. Select the filter criteria.
  3. Click Apply.
  4. Click Generate Report.

Applied filters are visible in a banner on the Vulnerabilities Summary and the Vulnerabilities with Remediation Report in PDF or HTML format when printed.

Vulnerability Report - Filter Banner

Download previously generated reports
Copy link

You can download reports created across all apps, including previously generated reports, from the Reports page located in the left navigation menu.

Types of reports you can download

You can access all app level reports for the apps that you are assigned, including:

  • Single app executive report
  • Scan-level vulnerability reports
  • Scan-level compliance reports

You can only download the multi-app executive level reports and the combined Application Security (InsightAppSec) Vulnerability Management (InsightVM) all apps reports that you generated.

Download reports

Only reports generated after March 28, 2022 are displayed on the Reports page. Historical reports are not available.

  1. Click Reports in the left navigation menu.
  2. Select the report(s) you want to download and click Download icon.

Learn more about reports
Copy link

App Reports

Application Security (InsightAppSec) Apps Executive Report
Copy link

This report provides an overview of all apps scanned during a selected month. The report contains the number of apps scanned, unreviewed vulnerabilities, high severity vulnerabilities and remediated vulnerabilities with each of these compared to the previous month. It also shows the top vulnerability types and the vulnerabilities by severity and status.

Combined Application Security (InsightAppSec) and Vulnerability Management (InsightVM) Executive Report
Copy link

This report provides an overview of the assets and apps scanned by Application Security (InsightAppSec) and InsightVM. The report contains sections relating to your overall vulnerability management programs, including details on apps and assets scanned along with the vulnerabilities found and remediation efforts. Where applicable, it also showcases details on location, owner, and criticality tags.

Vulnerability Reports

Vulnerabilities Summary
Copy link

The Vulnerabilities Summary is an overview of the vulnerabilities found in the app during the scan. The report is organized by vulnerability and the number of vulnerabilities found during the scan for the app.

Vulnerabilities with Remediation Report
Copy link

The Vulnerabilities with Remediation report contains all vulnerabilities found in an app from the chosen scan and the recommended remediation. Before making the report, you can use a filter to focus on certain vulnerabilities. Within the report, you can view the attack type, recommendation, and replay the attack using the Rapid7 Chrome Plugin.

Open Worldwide Application Security Project (OWASP) Reports

The OWASP foundation focused on helping organizations build more secure applications. They educate the community about top security risks to web applications along with top remediations. The OWASP Top 10 is a popular reference framework used by developers and web application security teams for guidance on the most critical security risks to web applications.

OWASP 2025 Web Application Report
Copy link

ℹ️

Still need OWASP 2021 Web Application reports?

If you are still using OWASP’s 2021 Web Application report, you can view details here.

The OWASP 2025 Report identifies their top 10 application security risks for the year. For each risk category, the report shows whether your scan passed or failed and shows web application vulnerabilities for these issues. Each web application vulnerability includes request and response data to support investigation and remediation.

OWASP Top 10 for LLM Applications 2025
Copy link

Based on scan data, the OWASP Top 10 for LLM applications - 2025 Report shows whether the LLM has passed or failed on each of the top 10 OWASP LLM risks and related attacks. It also shows vulnerabilities within each of the top 10 issues where coverage is provided along with the response and request data for the vulnerability.

OWASP TOP 10 API Security Risks - 2023
Copy link

Based on scan data, the OWASP Top 10 API Security Risks - 2023 Report shows whether the API passed or failed on each of the top 10 OWASP API security risks and related attacks. It also shows vulnerabilities within each of the top 10 issues along with the response and request data for the vulnerability.

Compliance Reports

Payment Card Industry Report (PCI Report)
Copy link

The Payment Card Industry report helps you prepare for an audit, an assessment, or a questionnaire around PCI compliance. Uncovering potential issues that will affect the outcome of any of these exercises allows you to take action and secure critical vulnerabilities on any assets that deal with payment card data.

SOX Report
Copy link

The SOX (Sarbanes-Oxley Compliance) details compliance issues and whether you passed or failed on each, for that particular scan. The report shows each requirement and the details of the vulnerabilities that caused you to fail, if you did.

HIPAA Compliance Results
Copy link

The HIPAA compliance report shows each requirement, if you passed or failed, and the details of the vulnerabilities that caused you to fail, if you did.

GDPR Report
Copy link

The GDPR report is an advisory report that shows how vulnerabilities in scanned targets might jeopardize your GDPR compliance and highlights which vulnerabilities need to be addressed.

Mapping OWASP Categories to Attack Modules

LLM Applications
Copy link

OWASP top 10 for LLM applications 2025Attack Modules
LLM01: 2025 Prompt InjectionLLMPromptInjection
LLM02: 2025 Sensitive Information DisclosureLLMSensitiveInformationDisclosure
LLM03: 2025 Supply Chain
LLM04: 2025 Data and Model Poisoning
LLM05: 2025 Improper Output HandlingLLMImproperOutputHandling
LLM06: 2025 Excessive Agency
LLM07: 2025 System Prompt LeakageLLMSystemPromptLeakage
LLM08: 2025 Vector and Embedding Weaknesses
LLM09: 2025 MisinformationLLMMisinformation
LLM10: 2025 Unbounded ConsumptionLLMUnboundedConsumption

Web Applications
Copy link

OWASP 2025 top 10 web application categoriesAttack Module
A01: Broken Access ControlAnonymous Access
Business logic abuse attacks
Collecting Sensitive Personal Information
Cross Origin Resources Sharing (CORS)
Cross-Site Request Forgery (CSRF)
Directory Indexing
Email Disclosure
File Inclusion
Forced Browsing
FrontPage Checks
HTTP User-Agent Check
Information Disclosure in response
Information Disclosure in scripts
Information Leakage in responses
Java Grinder
Local Storage Usage
Predictable Resource Location
Privacy Disclosure
Privilege Escalation
Reverse Proxy
Server Configuration
Server Side Request Forgery
Source Code Disclosure
Subdomain discovery
Unvalidated Redirect
X-Powered-By
A02: Security MisconfigurationASP.NET Misconfiguration
Autocomplete attribute
Clients Cross-Domain Policy Files
Content Security Policy Header
Cookie attributes
HTTP Strict Transport Security
JavaScript Memory Leaks
Web Beacon
XML External Entity Attack
A03: Software Supply Chain FailuresApache Struts 2 Framework Checks
Apache Struts Detection
Heartbleed Check
Nginx NULL code
Out of Band Log4Shell JNDI Injection (OOB Log4Shell JNDIi)
Remote Code Execution
A04: Cryptographic FailuresCredentials over an insecure channel
HTTPS Downgrade
HTTPS Everywhere
SSLStrength
Sensitive Data Exposure
Sensitive data over an insecure channel
Session Strength
A05: InjectionBlind LDAP Injection
Blind NoSQLi
Blind SQL
Command Injection
Cross-site scripting (XSS), (DOM based reflected via AJAX request)
Cross-site scripting (XSS), (DOM based)
Cross-site tracing (XST)
Expression Language Injection
HTTP Headers
HTTP Response Splitting
JSON Injection
LDAP Injection
LLM Improper Output Handling
LLM Misinformation
LLM Prompt Injection
LLM Sensitive Information Disclosure
LLM System Prompt Leakage
LLM Unbounded Consumption
NoSQLi Injection
Out of Band Cross-site scripting (XSS)
Out of Band SQL Injection (OOB SQLi)
Out of Band Stored Cross-site scripting (XSS)
PHP Code Execution
Parameter Fuzzing
Persistent Cross-site scripting (XSS) (passive)
Persistent Cross-site scripting (XSS), (active)
Reflected Cross-site scripting (XSS)
Reflected Cross-site scripting (XSS), (simple)
Reverse Clickjacking
SQL Injection
SQL Injection Auth Bypass
SQL Parameter Check
Server Side Include (SSI) Injection
Server Side Template Injection
Swagger UI XSS
Web DAV Flaws Check
XPath Injection
A06: Insecure DesignASP.NET ViewState security
Arbitrary File Upload
Browser Cache directive (leaking sensitive information)
Credentials stored in clear text in a cookie
HTTP Query Session Check
HTTP Verb Tampering
URL rewriting
Web Service Parameter Fuzzing
X-Content-Type-Options
X-Frame-Options
X-XSS-Protection
A07 Authentication FailuresBrute Force (Form Auth)
Brute Force (HTTP Auth)
Form Session Strength
HTTP Authentication over insecure channel
Information Disclosure in comments
JSON Web Token
Session Fixation
Session Upgrade
Swagger UI (DOM based)
A08: Software and Data Integrity FailuresASP.NET Serialization
Secure and non-secure content mix
Subresource Integrity
A09: Logging and Alerting Failures-
A10: Mishandling of Exceptional Conditions.NET Specific Exception (Information Leakage in responses)*
ASP Server.Execute Error (Information Leakage in responses)*
CFM error statement that prints full file path (Information Leakage in responses)*
CFM error that indicates file could not be opened from a parameter value (Information Leakage in responses)*
CFM error that indicates file could not be opened from a parameter value, but the file probably exists (Information Leakage in responses)*
Error produced within a Perl module (Foo.pm line 123) (Information Leakage in responses)*
Generic ASP.NET error (Information Leakage in responses)*
Generic CFM error (Information Leakage in responses)*
Generic MS VBScript error (Information Leakage in responses)*
Information Leakage .NET Stack Trace (Information Leakage in responses)*
JHTML error that indicates file could not be opened from a parameter value (Information Leakage in responses)*
Lotus Notes error (Information Leakage in responses)*
MS VBScript “File not found”, ASP Include file not found (Information Leakage in responses)*
PHP error that indicates a php source file could be opened from a parameter value, but doing so “stomps” on previously defined variables (Information Leakage in responses)*
PHP error that indicates file could not be opened from a parameter value (open_basedir) (Information Leakage in responses)*
PHP error that indicates file could not be opened from a parameter value (scanner) (Information Leakage in responses)*
PHP error that indicates file could not be opened from a parameter value (stream) (Information Leakage in responses)*
PHP include statement found in error strings (Information Leakage in responses)*
SQL Information Leakage
Verbose ASP.NET error (Information Leakage in responses)*
mkdir() failure (Information Leakage in responses)*

* - An individual Attack Variance from “Information Leakage in responses” has been mapped to this category

APIs
Copy link

OWASP 2023 top 10 categoriesAttack Module
API1: 2023-Broken object level authorization LogicAttack
API2: 2023-Broken authentication BruteForce
HTTPAuth
SessionFixation
SessionStrength
SessionUpgrade
API3: 2023-Broken object property level authorization EmailCheck
InformationDisclosure
InformationLeakage
PrivacyDisclosure
Server Configuration
SQLErrors
XPoweredByHeader
API4: 2023-Unrestricted resource consumption
API5: 2023-Broken function level authorization AnonymousAccess
Arbitrary File Upload
Cross Origin Resources Sharing (CORS)
CSRF
Forced Browsing
HTTPS Downgrade
API6: 2023-Unrestricted Access to Sensitive Business Flows ServerSideRequestForgery
API7: 2023-Server side request forgery CookieAttributes
HTTPHeaders
HTTPSEverywhere
SSLStrength
Unvalidated Redirect
X-Content-Type-Options
API8: 2023-Security misconfiguration
API9: 2023-Improper inventory management
API10: 2023-Unsafe consumption of APIs ASP.NET Serialization
BLDAPInjection
BSQLInjection
ExpressionLanguageInjection
LDAPInjection
NoSQLInjection
Blind NoSQLInjection
OSCommanding
OutOfBandLog4ShellJNDIInjection
Out of Band Cross-site scripting (XSS)
Out of Band Stored Cross-site scripting (XSS)
Out of Band SQL Injection (OOB SQLi)
ParameterTampering
SQLInjection
SQLInjection_Auth
SQL Information Leakage
SqlParameter
SQL Parameter Check
XMLExternalEntity
XPathInjection
XSS_Persistent

OWASP 2021 Web Application report

OWASP 2021 Web Application Report
Copy link

ℹ️

2025 Web Application report now available

For the most up-to-date version of this information, view the 2025 Web Application report.

The OWASP 2021 Report shows the top 10 risks in 2021 that OWASP determined. The report shows whether you passed or failed on each OWASP Top 10-based attack for the scan. It also shows vulnerabilities within each of the top 10 issues along with the response and request data for the vulnerability.

ℹ️

The Log4Shell attack is not included in our OWASP Top 10 2021 attack

Although the Log4Shell Out of Band (OOB) attack is listed in the OWASP Top Ten of 2021, we exclude this attack in the OWASP 2021 attack template for efficiency.

The OOB Injection for Log4j attack significantly extends scan times, so we kept it separate from the OWASP Top 10 and All Modules attack templates. To scan specifically for Log4shell, use the Out of Band Injection for Log4j attack.

OWASP 2021 top 10 web application categoriesAttack Module
A01: Broken Access ControlAnonymous Access
Business logic abuse attacks
Cross Origin Resources Sharing (CORS)
Cross-Site Request Forgery (CSRF)
Directory Indexing
Email Disclosure
File Inclusion
Forced Browsing
Information Disclosure in response
Information Disclosure in scripts
Information Leakage in responses
Java Grinder
Local Storage Usage
Predictable Resource Location
Privacy Disclosure
Privilege Escalation
Server Configuration
Source Code Disclosure
Unvalidated Redirect
X-Powered-By
A02: Cryptographic FailuresCredentials over an insecure channel
HTTPS Downgrade
HTTPS Everywhere
Sensitive Data Exposure
Sensitive data over an insecure channel
Session Strength
A03: InjectionBlind LDAP Injection
Blind NoSQLi
Blind SQL
Command Injection
Cross-site scripting (XSS), (DOM based reflected via AJAX request)
Cross-site scripting (XSS), (DOM based)
Cross-site tracing (XST)
Expression Language Injection
HTTP Response Splitting
JSON Injection
LDAP Injection
LLM Improper Output Handling
LLM Misinformation
LLM Prompt Injection
LLM Sensitive Information Disclosure
LLM System Prompt Leakage
LLM Unbounded Consumption
NoSQLi Injection
Out of Band Cross-site scripting (XSS)
Out of Band SQL Injection (OOB SQLi)
Out of Band Stored Cross-site scripting (XSS)
Parameter Fuzzing
Persistent Cross-site scripting (XSS) (passive)
Persistent Cross-site scripting (XSS), (active)
PHP Code Execution
Reflected Cross-site scripting (XSS)
Reflected Cross-site scripting (XSS), (simple)
Server Side Include (SSI) Injection
Server Side Template Injection
SQL Injection
SQL Injection Auth Bypass
SQL Parameter Check
Swagger UI XSS
XPath Injection
A04: Insecure Design FailuresArbitrary File Upload
ASP.NET ViewState security
Browser Cache directive (leaking sensitive information)
Credentials stored in clear text in a cookie
HTTP Query Session Check
SQL Information Leakage
URL rewriting
A05: Security MisconfigurationASP.NET Misconfiguration
Autocomplete attribute
Clients Cross-Domain Policy Files
Content Security Policy Header
Cookie attributes
FrontPage Checks
HTTP Strict Transport Security
Web Beacon
XML External Entity Attack
A06: Vulnerable and Outdated ComponentsApache Struts 2 Framework Checks
Apache Struts Detection
Heartbleed Check
Nginx NULL code
Out of Band Log4Shell JNDI Injection (OOB Log4Shell JNDIi)
Remote Code Execution
A07: Identification and Authentication FailuresBrute Force (Form Auth)
Brute Force (HTTP Auth)
Form Session Strength
HTTP Authentication over insecure channel
Information Disclosure in comments
JSON Web Token
Session Fixation
Session Upgrade
A08: Software and Data Integrity FailuresASP.NET Serialization
Secure and non-secure content mix
Subresource Integrity
A09: Security and Logging Failures-
A10: Server-Side Request Forgery (SSRF)Reverse Proxy
Server Side Request Forgery