Skip to main content

Changelog 2025-10

Updated yesterday

[CORE] CVE Details in a report

Key changes

A new text block has been added to all vulnerability reports which refer to a CVE. This block appears in the bug description section and is only visible to the organisation. This information, already accessible via Vulnpedia, is now fully integrated into vulnerability reports.

Impact

  • Organisations can now access to all CVE information in the report to facilitate both impact assessment and remediation.

Audience

  • All customers with an activated product and reports in the Vulnerability Center.

  • Security teams who want to quickly understand the vulnerability and save time in remediation.

Usage

At the end of the report description, a new grey text block now displays detailed CVE information:

  • A description of the CVE

  • Affected vendors

  • Inspection

  • Exploitation (if concerned)

Note: This information is also available on our API for your bug tracker integrations.

[ASM] Official release of the new UX!

Key changes

The preview phase of the new Attack Surface Management (ASM) experience has now ended. The toggle button allowing access to both the old and new versions has been removed. The new experience is now the default ASM user experience (UX).

As we move forward, YesWeHack will continue to enhance the user experience. Stay tuned!

Reminder

This redesign has been built to improve visibility and actionability across risks and assets. The Attack Surface Management page now contains 4 tabs:

  • Overview: Quickly assess your external exposure with key surface indicators, risk summaries, and asset coverage metrics. This view also highlights the Top 10 scopes requiring immediate attention, helping you prioritise where it matters most.

  • Primary Assets: Get a comprehensive view of your assets and their current coverage. Deep dive on each assets to discover its underlying hosts and technologies.

  • Hosts: Explore all the hosts across your assets. Pivot on this view to display the vulnerability reports & findings which involve these hosts, as well as services & technologies running on them. Seamlessly add your Hosts to Bug Bounty or Pentest program in a few clicks.

  • Technologies: Gain visibility into the technologies and software components deployed on your stack to spot potentially vulnerable technologies across your assets.

Did this answer your question?