Hi Ethan,
Thank you for using Wazuh!!!
The results you see on the last picture are the vulnerabilities that have changed since the db was populated with an initial scan, the changes in this case was that 12 of the existent vulnerabilities were solved and 1 new vulnerability was detected.
This behaviour is expected since version 4.3 to prevent all the alerts from being shown every time a scan runs which in big environments could be a problem, the way of seeing all the alerts is only by agent and you can check them out on the vulnerability module dashboard in the Wazuh app, from there you can see all the events in the event tab and generate a report if you need.
Another way of pulling alerts (also by agent) is through API calls, which can be included in a script to pull all the active agents, for example, and use that list to run the get vulnerabilities API endpoing.
Here is the reference for the vulnerability API endpoint (change the version on the top right corner to match yours if needed):
Here is the instructive on how to use the API endpoints from the command line for example, also there are some script samples:
As an alternative, to generate all the vulnerabilities you may delete the agent/s databases to force the full scan to run again and generate, for this you will need to stop the wazuh-manager service and delete all the <id>.db (for example 002.db) which correspond to agents, then restart the service (you need to execute on all the manager nodes where the agents connect).
To stop and restart the manager service you can use the command:
systemctl stop wazuh-manager
or
systemctl start wazuh-manager
(respectively)
Let me know if this helps.
Regards.