That will not be necessary.Thanks for the thoughtful comment, but personally I will not be exploiting, hacking, brute-forcing any of the systems found in the scans. It is merely a database project, but I can't promise you that no one else would take advantage of the of the reports.