Ignoring Specific Vulnerabilities in Scans