Skip to main content

Dashboard version 2.12.0

Released on October 16th

Updated this week

New CVE Detail Page

A dedicated page for each CVE (Common Vulnerabilities and Exposures) is now available. It brings together key information such as its description, impact, affected technologies, and relevant references.

➤ Technologies & Associated CPE

Lists the vulnerable technologies and products, identified through their CPE (Common Platform Enumeration). Quickly see which software, versions, or systems are concerned by the CVE.

➤ Potentially Impacted Assets

Shows which assets (domains and IPs) in your scope may be affected, helping you understand the potential impact and prioritize remediation accordingly.

➤ CVSS Score

Access detailed CVSS information for each CVE, including the version, score, and vector.

➤ Exploitation Insights

Find information about known exploits associated with the vulnerability.

➤ References

All official sources (NVD, MITRE) are listed in one place, making it easier to consult and complete information.

Feature Improvements

  • Asset protection : Pentest slots and EASM credits are now automatically released if we detect that an asset is ineligible for scans (IPs from CDN, WAFs, or SaaS providers).

  • Asset imports : The file import size limit has been increased to 20 Mo.

  • Vulnerabilities / Campaigns : Auditor users can now access Attachments on vulnerabilities and campaigns.

Design Improvements

  • Asset : On asset pages, the “IP“, “Domains”, and “Subdomains“ tabs are now displayed at the top level for easier access.

  • Asset : It is no longer necessary to validate pentest conditions when disabling pentest on an asset.

Bug Fixes

  • Asset – IP : The last resolution date for archived IPs has been fixed, it previously showed the archiving date instead.

  • Asset – IP : Some IPs were not being archived correctly, this issue has now been resolved.

  • Organization : The displayed credit count has been corrected.

You can access the API Changelog for this version here.

Did this answer your question?