diff --git a/MANIFEST b/MANIFEST
index dbab44d2b3c235d60f85f62c0f8aef7988671f81..d6cae1d0a39e684fec59e5cecdd4dded8f494fe9 100644
--- a/MANIFEST
+++ b/MANIFEST
@@ -1,3 +1,3 @@
-VERSION=v1.4.2
+VERSION=v1.4.3
 SERVICE=vat-genscan
 
diff --git a/wiser-wcs-reports/nmap.py b/wiser-wcs-reports/nmap.py
index 690c3bbf8ac7865a6ff0cdda0334ce9fcb4d6a3b..e3d97f36a7837ac325c78b86460b112aaa7f747b 100644
--- a/wiser-wcs-reports/nmap.py
+++ b/wiser-wcs-reports/nmap.py
@@ -33,12 +33,14 @@ class WiserNmapVulnerability(WiserVulnerability):
 			               _safe_get(report_port['service'], '@version'), _safe_get(report_port['service'], '@extrainfo'),
 			               _safe_get(report_port['service'], '@ostype'))
 		vuln.desc = re.sub('\\(\\)', '', vuln.desc).strip()
+		vuln.target = address
 		return vuln
 
 	@staticmethod
 	def from_host(address, state):
 		vuln = WiserNmapVulnerability()
 		vuln.short_desc = "Host %s appears to be %s." % (address, state)
+		vuln.target = address
 		return vuln
 
 
diff --git a/wiser-wcs-reports/w3af.py b/wiser-wcs-reports/w3af.py
index 19dce3833aa55990fe1f006995de5b3535bfdc47..dec7d1a6fa1bc17218784a6e6981baf4bee79e41 100644
--- a/wiser-wcs-reports/w3af.py
+++ b/wiser-wcs-reports/w3af.py
@@ -1,6 +1,7 @@
 from wiser import WiserReport, WiserVulnerability
 import re
 from collections import OrderedDict
+from urllib.parse import urlparse
 
 
 class WiserW3afVulnerability(WiserVulnerability):
@@ -29,6 +30,14 @@ class WiserW3afVulnerability(WiserVulnerability):
 							self.wascid = re.sub('[\[\]]', '', alert['@id'])
 		self.source_pentest="W3af"
 		self.set_wiser_risk_level()
+		if '@url' in alert and alert['@url'] and alert['@url'] != "None":
+			try:
+				self.target = urlparse(alert['@url']).netloc
+				if len(self.target.split(':')) > 1:
+					self.target = self.target.split(':')[0]
+			except:
+				pass
+
 
 	def set_wiser_risk_level(self):
 		if self.risk_level == "Information":
diff --git a/wiser-wcs-reports/wiser-wcs.cfg b/wiser-wcs-reports/wiser-wcs.cfg
index 3ca62f0c05ebc9b3161568cf94171cb3ed8349f6..62428c627872461e54a4391e93e9f71036140201 100644
--- a/wiser-wcs-reports/wiser-wcs.cfg
+++ b/wiser-wcs-reports/wiser-wcs.cfg
@@ -1,4 +1,2 @@
 [cscan_config]
-cscan_output=/service/cscan/output
-zap=True
-w3af=True
+cscan_output=/service/cscan/output/
diff --git a/wiser-wcs-reports/wiser.py b/wiser-wcs-reports/wiser.py
index 02ae0249b8f9238df1de656c04895cf196a78028..95628310118f89ae305259a9e7c2aef8ccc9c446 100644
--- a/wiser-wcs-reports/wiser.py
+++ b/wiser-wcs-reports/wiser.py
@@ -28,6 +28,8 @@ class WiserVulnerability(IterMixin):
 	wascid = dict()
 	"""  Source pen_test  """
 	source_pentest = dict()
+	"""  Target IP / domain  """
+	target = dict()
 
 	def __init__(self):
 		pass
diff --git a/wiser-wcs-reports/zap.py b/wiser-wcs-reports/zap.py
index 32e23f126061cdf391939f02a682c54233c729d6..f3e9418975c103dabad6a61c3b053ae6a516a751 100644
--- a/wiser-wcs-reports/zap.py
+++ b/wiser-wcs-reports/zap.py
@@ -1,5 +1,6 @@
 from wiser import WiserReport, WiserVulnerability
 import re
+from urllib.parse import urlparse
 
 
 class WiserZapVulnerability(WiserVulnerability):
@@ -21,6 +22,16 @@ class WiserZapVulnerability(WiserVulnerability):
 		if 'wascid' in alert:
 			self.wascid = alert['wascid']['$']
 		self.source_pentest="OWASP ZAP"
+		try:
+			if type(alert['instances']['instance'])==list:
+				t = self._pretty(alert['instances']['instance'][0]['uri']['$'])
+			else:
+				t = self._pretty(alert['instances']['instance']['uri']['$'])
+			self.target = urlparse(t).netloc
+			if len(self.target.split(':')) > 1:
+				self.target = self.target.split(':')[0]
+		except:
+			pass
 		self.set_wiser_risk_level()
 
 	def set_wiser_risk_level(self):