Date of the scan: ${scan_date}. Scope of the scan: ${scan_scope}. Crawled pages: ${crawled_pages_nbr}
            Url: ${auth_dict["url"]}
            Logged in: ${auth_dict["logged_in"]}
            % if auth_form_dict != None and len(auth_form_dict) > 0:
            Login field: ${auth_form_dict["login_field"]}
            Password field: ${auth_form_dict["password_field"]}
            % endif
        
| Category | Number of vulnerabilities found | 
|---|---|
| % if len(vulnerabilities[vuln_name]): ${vuln_name} % else: ${vuln_name} % endif | ${len(vulnerabilities[vuln_name])} | 
| % if len(anomalies[anomaly_name]): ${anomaly_name} % else: ${anomaly_name} % endif | ${len(anomalies[anomaly_name])} | 
| % if len(additionals[additional_name]): ${additional_name} % else: ${additional_name} % endif | ${len(additionals[additional_name])} | 
${vulnerability["info"] | h}
                        
                                % for line in vulnerability["http_request"].split("\n"):
                                    ${line | h}
                                    
                                % endfor
                            
                        
                                    HTTP ${vulnerability["detail"]["response"]["status_code"] | h}
                                    % if vulnerability["detail"]["response"]["headers"] is not None:
                                        % for header in vulnerability["detail"]["response"]["headers"]:
                                            ${header[0] | h}: ${header[1] | h}
                                        %endfor
                                    %endif
                                    
                                    ${vulnerability["detail"]["response"]["body"] | h}
                                
                            ${vulnerability["curl_command"] | h}
                        ${vulnerability["wstg"] | h}
                        ${anomaly["info"] | h}
                        
                                % for line in anomaly["http_request"].split("\n"):
                                    ${line | h}
                                    
                                % endfor
                            
                        
                                    HTTP ${anomaly["detail"]["response"]["status_code"] | h}
                                    % if anomaly["detail"]["response"]["headers"] is not None:
                                        % for header in anomaly["detail"]["response"]["headers"]:
                                            ${header[0] | h}: ${header[1] | h}
                                        %endfor
                                    %endif
                                    
                                    ${anomaly["detail"]["response"]["body"] | h}
                                
                            ${anomaly["curl_command"] | h}
                        ${anomaly["wstg"] | h}
                        ${additional["info"] | h}
                        
                                % for line in additional["http_request"].split("\n"):
                                    ${line | h}
                                    
                                % endfor
                            
                        
                                    HTTP ${additional["detail"]["response"]["status_code"] | h}
                                    % if additional["detail"]["response"]["headers"] is not None:
                                        % for header in additional["detail"]["response"]["headers"]:
                                            ${header[0] | h}: ${header[1] | h}
                                        %endfor
                                    %endif
                                    
                                    ${additional["detail"]["response"]["body"] | h}
                                
                            ${additional["curl_command"] | h}
                        ${additional["wstg"] | h}