[CORE] CVE Details in a report
Key changes
A new text block has been added to all vulnerability reports which refer to a CVE. This block appears in the bug description section and is only visible to the organisation. This information, already accessible via Vulnpedia, is now fully integrated into vulnerability reports.
Impact
Organisations can now access to all CVE information in the report to facilitate both impact assessment and remediation.
Audience
All customers with an activated product and reports in the Vulnerability Center.
Security teams who want to quickly understand the vulnerability and save time in remediation.
Usage
At the end of the report description, a new grey text block now displays detailed CVE information:
A description of the CVE
Affected vendors
Inspection
Exploitation (if concerned)
Note: This information is also available on our API for your bug tracker integrations.
[ASM] Official release of the new UX!
Key changes
The preview phase of the new Attack Surface Management (ASM) experience has now ended. The toggle button allowing access to both the old and new versions has been removed. The new experience is now the default ASM user experience (UX).
As we move forward, YesWeHack will continue to enhance the user experience. Stay tuned!
Reminder
This redesign has been built to improve visibility and actionability across risks and assets. The Attack Surface Management page now contains 4 tabs:
Overview: Quickly assess your external exposure with key surface indicators, risk summaries, and asset coverage metrics. This view also highlights the Top 10 scopes requiring immediate attention, helping you prioritise where it matters most.
Primary Assets: Get a comprehensive view of your assets and their current coverage. Deep dive on each assets to discover its underlying hosts and technologies.
Hosts: Explore all the hosts across your assets. Pivot on this view to display the vulnerability reports & findings which involve these hosts, as well as services & technologies running on them. Seamlessly add your Hosts to Bug Bounty or Pentest program in a few clicks.
Technologies: Gain visibility into the technologies and software components deployed on your stack to spot potentially vulnerable technologies across your assets.


