As mentioned in your question, you have modified the xml file with vulnerability scenario. So, try giving the that xml file instead of default uas file. For more information try sipp -help.
by default SIPP uses the uas scenario file which is just a normal scenario and use the following command:
/sipp -sf uas.xml -i <listening IP> -p <listening Port>