Skip to main content

Changelog 2026-01

Updated yesterday

[CORE] New design for report actions

Key changes

The “Report actions” section of the Vulnerability reports has been updated as part of our ongoing design improvements.

Usage

  • Go to the “Vulnerability Center”

  • Select the report of your choice

  • Click on “Actions” to display the new design


[CORE] Embedded FAQ in the platform

Key changes

Organisations can now access a FAQ to their most frequent requests for reports that have already been “assessed” or “closed”, directly in the platform.

When these templates are not sufficient, organisations can still submit a custom question to ensure they receive the support they need.

Impact

  • Organisations access answers for the most common questions directly in their report actions.

Audience

  • Organisations with “assessed” or “done” reports in their vulnerability Center.

Usage

As a user of the platform with a question about an assessed or closed report:

  • Go to the “Vulnerability Center”

  • Open the given report

  • Go to “Quick actions”

  • Click on “Comment for triagers”

  • Select the purpose of your request among a list of pre-configured ones

  • Find a pre-filled response to your inquiry:

  • If the answer does not address your problem, click on “Tell us more” and it will open a comment window

  • If the topic of your request does not appear in the dropdown list, select “The answer to my question is not listed” to send your comment

  • Write your comment

  • Click on “Post comment to triagers”

  • Your message will appear in the comments thread


[ASM] Most exploitable CVE checkpoints tab

Key changes

A new table listing the 10 most exploitable vulnerability checkpoints is now available in the Attack Surface tab overview.

Impact

  • Organisations can now quickly identify the most critical checkpoints and their status, allowing them to easily decide whether to activate or deactivate them.

Audience

  • Organisations with an active ASM product combined with Security Check enabled.

Usage

  • Go to the “Attack Surface” tab

  • The “Most Exploitable Vulnerability Checkpoints” appear in the “Overview” tab

  • This tab displays key information of these checkpoints:

    • CVE-ID

    • CVE name

    • EPSS

    • CVSS

    • KEV (icon visible only if applicable)

    • Checkpoint activated/deactivated

ℹ️ The data is filtered to display only CVEs associated with a checkpoint.


⬆️[ASM] Vulnerability Reports from Technology Instances

Key changes

Organisations can create reports directly from technology instances to quickly identify vulnerabilities affecting specific versions. These reports include all CVEs along with their associated technical metadata.

Impact

  • Organisations can now better understand and track potential vulnerabilities associated with a specific technology version.

Audience

  • Business Unit (BU) Owner, BU Manager, and BU Surface Manager with an active ASM product.

Usage

1.A. From the "Technologies" tab:

  • Go to the “Attack Surface” tab

  • Click on “Technologies”

  • Select the “Instances” tab

  • Click on the “create report” icon on the right side

1.B. From the "Hosts" tab:

  • Go to the “Attack Surface” Tab

  • Click on the “Hosts” tab and choose a Host

  • Click on “Technologies”

  • Find the new “Create report” icon on the right

  • Click on it to create a new report from a Technology

2. Vulnerability Center

  • A new report has been created in the Vulnerability Center which displays the list of associated CVEs


⬆️[ASM] Filter by KEV

Key changes

A new “KEV” filter is now available on the following pages of the YesWeHack platform:

  • Vulnerability Center > Detected issues

  • Vulnerability Center > Potential CVE

  • Vulnpedia

  • CVE alerts

  • Hosts > Detected issues

  • Hosts > Potential CVEs

Impact

  • Organisations can now actively prioritise vulnerabilities listed in the KEV catalog during their remediation process.

Audience

  • All customers with an active ASM product.

Usage

This new filter has two options:

  • Known (listed in the KEV catalog)

  • Unknown (not listed in the KEV catalog)

ℹ️ The filter can be combined with other filters.


⬆️[ASM] Priority calculation of KEV listed vulnerabilities

Key changes

In addition to CVSS, EPSS, and Asset value, the presence of a CVE in KEV listing will now increase the priority levels of the finding.

Impact

  • This new calculation rule ensures that the vulnerability prioritisation also reflects current exploitation in addition to theoretical ones.

Audience

  • All customers with an active ASM product.


[MISC]

  • [HUNTERS] The max image resolution in a report has been increased (up to 8K) to enable Hunters to upload larger files when describing the identified vulnerability and the steps to reproduce it.

  • [ORGANISATIONS] A new KEV icon is now displayed to identify CVEs that are listed in the KEV database (Known Exploited Vulnerabilities).

  • [ORGANISATIONS] Managers can now sort reports by triage indication using the status column, allowing them to see assessed reports first:

Did this answer your question?