-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
3 changed files
with
11 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,11 +1,11 @@ | ||
Release Date : 21.12.2023 | ||
Release Notes : 4.8.4 | ||
Release Date : 23.01.2024 | ||
Release Notes : 4.8.5 | ||
|
||
New feature list: | ||
1) Vulnerabilities Trend Report Page: Introducing a new page that allows users to track the fluctuation in the number of vulnerabilities over a selected time period. This feature provides enhanced visibility into security trends, helping users to better understand and manage vulnerabilities in their systems. | ||
2) Vulnerability Trends Chart Modal Window: A new interactive feature on the dashboard. Clicking on a date in the Vulnerability Trends chart now opens a modal window displaying a list of applications contributing to that count. This enhancement provides a more detailed and user-friendly way to inspect specific data points. | ||
1) CLI Scan Default Branch Option: We have introduced a new option for the CLI scan, allowing users to instantly set a branch as the default. This feature enhances the flexibility and efficiency of the CLI scanning process. | ||
2) Enhanced SCA Results Sorting: In a significant update to our SCA (Software Composition Analysis) feature, vulnerabilities within the same severity level are now sorted based on their exploitability. This new sorting methodology provides a more nuanced and practical view of the vulnerabilities, helping users prioritize their remediation efforts more effectively. | ||
|
||
Improvements: | ||
1) Enhanced Scan Logic: We have improved the scanning logic for better stability under heavy loads. This upgrade ensures more reliable and efficient scanning, reducing the likelihood of errors and interruptions during large-scale operations. | ||
2) Fixed Vulnerabilities Report Filter Bug: Resolved an issue with the filter on the Vulnerabilities report page. Users can now expect a smoother, error-free filtering experience, enhancing the usability and accuracy of the report. | ||
3) Resolved Integration Deletion Error with CloudSec: Fixed a bug that caused errors during the deletion of integrations with CloudSec. This fix streamlines the integration management process, ensuring a more seamless and error-free user experience. | ||
1) Fixed Vulnerability Dashboard Display Issue: We have resolved an issue affecting the proper display of the Vulnerability Dashboard. Users can now expect an accurate and user-friendly interface for monitoring their system's security status. | ||
2) Corrected JS SCA Scan for Yarn Files: Fixed a problem where the JavaScript SCA (Software Composition Analysis) was not functioning correctly during the scanning of yarn files. This correction ensures more accurate and reliable vulnerability detection in JavaScript projects using yarn. | ||
3) Updated Dependency Search in GoLang: The dependency search mechanism in GoLang has been updated, significantly speeding up the scanning process. This improvement enhances the performance and efficiency of GoLang scans, reducing the time and resources required for comprehensive security assessments. |