Mon 01 July 2024
This update introduces bug fixes, detection improvements, and attack surface enhancements to provide a more seamless user experience.
π‘οΈ Scanning
- Show source code for the detected vulnerabilities in the vulnerability details page.

Source code for detected vulnerabilities
π οΈ Remediation
- Customized the weekly email for attack surface auditors to only contain their data.

The weekly email for attack surface auditors
πΈοΈ Attack Surface & Inventory
- Added autocomplete for tags in assets.

Autocomplete for tags in asset - Enabled filtering of assets by ownership type.

Filter the assets by the ownership type
π¦ Detection
- Added detection for
CVE-2022-24816: A remote code execution vulnerability in the JT-JIFFLE extension of Geoserver allows remote attackers to execute arbitrary code. - Added detection for
CVE-2024-34470: An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.
π Bug Fixes
- Fixed the search function with inputs that included a schema.

Searching scans using a specific schema - Fixed the iOS search issue when searching for common apps like Facebook.

Searching for common apps like Facebook - Fixed the issue where excluded values were still appearing in the graph during PDF generation.