hi @kac89 , with the recently change the report has issues this is a example of generate report
© Generated by VULNRΞPO
with an empty login and password."],"severity":"High","ref":"CVE-1999-0519\nhttp://xforce.iss.net/xforce/xfdb/2\nhttp://seclab.cs.ucdavis.edu/projects/testing/vulner/38.html\n","cvss":"7.5","cve":"","tags":[],"bounty":[],"date":"2023-04-17"},{"title":["PHP < 7.3.27, 7.4.x < 7.4.15, 8.0.x < 8.0.2 NULL Deference Vulnerability (Feb 2021) - Windows"],"poc":"443/tcp\n\n10.0.0.15","files":[],"desc":["Installed version: 5.6.40\nFixed version: 7.3.27\nInstallation\npath / port: 443/tcp"],"severity":"High","ref":"CVE-2021-21702\nhttps://www.php.net/ChangeLog-7.php#7.3.27\nhttps://www.php.net/ChangeLog-7.php#7.4.15\nhttps://www.php.net/ChangeLog-8.php#8.0.2\nWID-SEC-2022-2113\nCB-K21/0124\nDFN-CERT-2022-2639\nDFN-CERT-2022-2638\nDFN-CERT-2022-0904\nDFN-CERT-2021-2373\nDFN-CERT-2021-1645\nDFN-CERT-2021-1509\nDFN-CERT-2021-1453\nDFN-CERT-2021-0556\nDFN-CERT-2021-0380\nDFN-CERT-2021-0246\n","cvss":"7.5","cve":"","tags":[],"bounty":[],"date":"2023-04-17"},{"title":["PHP < 7.2.32, 7.3 < 7.3.20, 7.4 < 7.4.8 libcurl Vulnerability - May20 (Windows)"],"poc":"443/tcp\n\n10.0.0.15","files":[],"desc":["Installed version: 5.6.40\nFixed version: 7.2.32\nInstallation\npath / port: 443/tcp"],"severity":"High","ref":"CVE-2020-8169\nhttps://www.php.net/ChangeLog-7.php#7.2.32\nhttps://www.php.net/ChangeLog-7.php#7.3.20\nhttps://www.php.net/ChangeLog-7.php#7.4.8\nCB-K20/0684\nCB-K20/0619\nDFN-CERT-2021-1329\nDFN-CERT-2021-0807\nDFN-CERT-2021-0663\nDFN-CERT-2020-1347\n","cvss":"7.5","cve":"","tags":[],"bounty":[],"date":"2023-04-17"},{"title":["SSL/TLS: Report Vulnerable Cipher Suites for HTTPS"],"poc":"443/tcp\n\n192.168.15.248","files":[],"desc":["'Vulnerable' cipher suites accepted by this service via the TLSv1.2 protocol:\n\nTLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)\nTLS_DH_anon_WITH_3DES_EDE_CBC_SHA (SWEET32)\nTLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)\nTLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (SWEET32)\nTLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)"],"severity":"High","ref":"CVE-2016-2183\nCVE-2016-6329\nCVE-2020-12872\nhttps://bettercrypto.org/\nhttps://mozilla.github.io/server-side-tls/ssl-config-generator/\nhttps://sweet32.info/\nWID-SEC-2022-2226\nWID-SEC-2022-1955\nCB-K21/1094\nCB-K20/1023\nCB-K20/0321\nCB-K20/0314\nCB-K20/0157\nCB-K19/0618\nCB-K19/0615\nCB-K18/0296\nCB-K17/1980\nCB-K17/1871\nCB-K17/1803\nCB-K17/1753\nCB-K17/1750\nCB-K17/1709\nCB-K17/1558\nCB-K17/1273\nCB-K17/1202\nCB-K17/1196\nCB-K17/1055\nCB-K17/1026\nCB-K17/0939\nCB-K17/0917\nCB-K17/0915\nCB-K17/0877\nCB-K17/0796\nCB-K17/0724\nCB-K17/0661\nCB-K17/0657\nCB-K17/0582\nCB-K17/0581\nCB-K17/0506\nCB-K17/0504\nCB-K17/0467\nCB-K17/0345\nCB-K17/0098\nCB-K17/0089\nCB-K17/0086\nCB-K17/0082\nCB-K16/1837\nCB-K16/1830\nCB-K16/1635\nCB-K16/1630\nCB-K16/1624\nCB-K16/1622\nCB-K16/1500\nCB-K16/1465\nCB-K16/1307\nCB-K16/1296\nDFN-CERT-2021-1618\nDFN-CERT-2021-0775\nDFN-CERT-2021-0770\nDFN-CERT-2021-0274\nDFN-CERT-2020-2141\nDFN-CERT-2020-0368\nDFN-CERT-2019-1455\nDFN-CERT-2019-0068\nDFN-CERT-2018-1296\nDFN-CERT-2018-0323\nDFN-CERT-2017-2070\nDFN-CERT-2017-1954\nDFN-CERT-2017-1885\nDFN-CERT-2017-1831\nDFN-CERT-2017-1821\nDFN-CERT-2017-1785\nDFN-CERT-2017-1626\nDFN-CERT-2017-1326\nDFN-CERT-2017-1239\nDFN-CERT-2017-1238\nDFN-CERT-2017-1090\nDFN-CERT-2017-1060\nDFN-CERT-2017-0968\nDFN-CERT-2017-0947\nDFN-CERT-2017-0946\nDFN-CERT-2017-0904\nDFN-CERT-2017-0816\nDFN-CERT-2017-0746\nDFN-CERT-2017-0677\nDFN-CERT-2017-0675\nDFN-CERT-2017-0611\nDFN-CERT-2017-0609\nDFN-CERT-2017-0522\nDFN-CERT-2017-0519\nDFN-CERT-2017-0482\nDFN-CERT-2017-0351\nDFN-CERT-2017-0090\nDFN-CERT-2017-0089\nDFN-CERT-2017-0088\nDFN-CERT-2017-0086\nDFN-CERT-2016-1943\nDFN-CERT-2016-1937\nDFN-CERT-2016-1732\nDFN-CERT-2016-1726\nDFN-CERT-2016-1715\nDFN-CERT-2016-1714\nDFN-CERT-2016-1588\nDFN-CERT-2016-1555\nDFN-CERT-2016-1391\nDFN-CERT-2016-1378\n","cvss":"7.5","cve":"","tags":[],"bounty":[],"date":"2023-04-17"},{"title":["PHP < 7.2.30, 7.3 < 7.3.17, 7.4 < 7.4.5 DoS Vulnerability - Apr20 (Windows)"],"poc":"443/tcp\n\n10.0.0.15","files":[],"desc":["Installed version: 5.6.40\nFixed version: 7.2.30\nInstallation\npath / port: 443/tcp"],"severity":"High","ref":"CVE-2020-7067\nhttps://www.php.net/ChangeLog-7.php#7.2.30\nhttps://www.php.net/ChangeLog-7.php#7.3.17\nhttps://www.php.net/ChangeLog-7.php#7.4.5\nCB-K20/1199\nCB-K20/0336\nDFN-CERT-2020-1438\nDFN-CERT-2020-0851\nDFN-CERT-2020-0751\n","cvss":"7.5","cve":"","tags":[],"bounty":[],"date":"2023-04-17"},{"title":["SSH Brute Force Logins With Default Credentials Reporting"],"poc":"22/tcp\n\n10.0.0.4","files":[],"desc":["It was possible to login with the following credentials :\n\nadmin:admin"],"severity":"High","ref":"CVE-1999-0501\nCVE-1999-0502\nCVE-1999-0507\nCVE-1999-0508\n","cvss":"7.5","cve":"","tags":[],"bounty":[],"date":"2023-04-17"},{"title":["Riello NetMan 204 Default Credentials (SSH)"],"poc":"22/tcp\n\n10.0.0.4","files":[],"desc":["It was possible to login as user 'admin' with password 'admin' and to execute 'cat /etc/passwd'.