Wapiti is able to generate a complete report with HTML format that includes interesting information about the vulnerabilities detected.
Summary of vulnerabilities found
In this section is shown a table with a summary of the vulnerabilities found classified by category and level of risk.
The reports contains a column chart to see graphically a comparative of the vulnerabilities found
This is the most important section, shows the details of the successful attacks grouped by type. Each type have a description, possibles solution to avoid this kind of attack and some references to learn more about the attack and how to solve the vulnerability.
For each successful attack is shown a table with the URL used in the attack, the parameter in which was injected the string character and information about the attack.