[CORE] New design for report actions
Key changes
The “Report actions” section of the Vulnerability reports has been updated as part of our ongoing design improvements.
Usage
Go to the “Vulnerability Center”
Select the report of your choice
Click on “Actions” to display the new design
[CORE] Embedded FAQ in the platform
Key changes
Organisations can now access a FAQ to their most frequent requests for reports that have already been “assessed” or “closed”, directly in the platform.
When these templates are not sufficient, organisations can still submit a custom question to ensure they receive the support they need.
Impact
Organisations access answers for the most common questions directly in their report actions.
Audience
Organisations with “assessed” or “done” reports in their vulnerability Center.
Usage
As a user of the platform with a question about an assessed or closed report:
Go to the “Vulnerability Center”
Open the given report
Go to “Quick actions”
Click on “Comment for triagers”
Select the purpose of your request among a list of pre-configured ones
Find a pre-filled response to your inquiry:
If the answer does not address your problem, click on “Tell us more” and it will open a comment window
If the topic of your request does not appear in the dropdown list, select “The answer to my question is not listed” to send your comment
Write your comment
Click on “Post comment to triagers”
Your message will appear in the comments thread
[ASM] Most exploitable CVE checkpoints tab
Key changes
A new table listing the 10 most exploitable vulnerability checkpoints is now available in the Attack Surface tab overview.
Impact
Organisations can now quickly identify the most critical checkpoints and their status, allowing them to easily decide whether to activate or deactivate them.
Audience
Organisations with an active ASM product combined with Security Check enabled.
Usage
Go to the “Attack Surface” tab
The “Most Exploitable Vulnerability Checkpoints” appear in the “Overview” tab
This tab displays key information of these checkpoints:
CVE-ID
CVE name
EPSS
CVSS
KEV (icon visible only if applicable)
Checkpoint activated/deactivated
ℹ️ The data is filtered to display only CVEs associated with a checkpoint.
⬆️[ASM] Vulnerability Reports from Technology Instances
Key changes
Organisations can create reports directly from technology instances to quickly identify vulnerabilities affecting specific versions. These reports include all CVEs along with their associated technical metadata.
Impact
Organisations can now better understand and track potential vulnerabilities associated with a specific technology version.
Audience
Business Unit (BU) Owner, BU Manager, and BU Surface Manager with an active ASM product.
Usage
1.A. From the "Technologies" tab:
Go to the “Attack Surface” tab
Click on “Technologies”
Select the “Instances” tab
Click on the “create report” icon on the right side
1.B. From the "Hosts" tab:
Go to the “Attack Surface” Tab
Click on the “Hosts” tab and choose a Host
Click on “Technologies”
Find the new “Create report” icon on the right
Click on it to create a new report from a Technology
2. Vulnerability Center
A new report has been created in the Vulnerability Center which displays the list of associated CVEs
⬆️[ASM] Filter by KEV
Key changes
A new “KEV” filter is now available on the following pages of the YesWeHack platform:
Vulnerability Center > Detected issues
Vulnerability Center > Potential CVE
Vulnpedia
CVE alerts
Hosts > Detected issues
Hosts > Potential CVEs
Impact
Organisations can now actively prioritise vulnerabilities listed in the KEV catalog during their remediation process.
Audience
All customers with an active ASM product.
Usage
This new filter has two options:
Known (listed in the KEV catalog)
Unknown (not listed in the KEV catalog)
ℹ️ The filter can be combined with other filters.
⬆️[ASM] Priority calculation of KEV listed vulnerabilities
Key changes
In addition to CVSS, EPSS, and Asset value, the presence of a CVE in KEV listing will now increase the priority levels of the finding.
Impact
This new calculation rule ensures that the vulnerability prioritisation also reflects current exploitation in addition to theoretical ones.
Audience
All customers with an active ASM product.
[MISC]
[HUNTERS] The max image resolution in a report has been increased (up to 8K) to enable Hunters to upload larger files when describing the identified vulnerability and the steps to reproduce it.
[ORGANISATIONS] A new KEV icon is now displayed to identify CVEs that are listed in the KEV database (Known Exploited Vulnerabilities).
[ORGANISATIONS] Managers can now sort reports by triage indication using the status column, allowing them to see assessed reports first:











