Wapiti vulnerability report

Target: ${target}

Date of the scan: ${scan_date}. Scope of the scan: ${scan_scope}


Summary

% for i, vuln_name in enumerate(vulnerabilities): % endfor % for i, anomaly_name in enumerate(anomalies): % endfor
Category Number of vulnerabilities found
% if len(vulnerabilities[vuln_name]): ${vuln_name} % else: ${vuln_name} % endif ${len(vulnerabilities[vuln_name])}
% if len(anomalies[anomaly_name]): ${anomaly_name} % else: ${anomaly_name} % endif ${len(anomalies[anomaly_name])}

% for i, vuln_name in enumerate(vulnerabilities): % if len(vulnerabilities[vuln_name]):

${vuln_name}

Description
${flaws[vuln_name]["desc"] | h}
% for j, vulnerability in enumerate(vulnerabilities[vuln_name]):

Vulnerability found in ${vulnerability["path"] | h}

${vulnerability["info"] | h}
${vulnerability["http_request"] | h}
${vulnerability["curl_command"] | h}
% endfor
Solutions
${flaws[vuln_name]["sol"]}
References


% endif % endfor % for i, anomaly_name in enumerate(anomalies): % if len(anomalies[anomaly_name]):

${anomaly_name}

Description
${flaws[anomaly_name]["desc"] | h}
% for j, anomaly in enumerate(anomalies[anomaly_name]):

Anomaly found in ${anomaly["path"] | h}

${anomaly["info"] | h}
${anomaly["http_request"] | h}
${anomaly["curl_command"] | h}
% endfor
Solutions
${flaws[anomaly_name]["sol"]}
References


% endif % endfor