Skip to main content

Release notes details

Find details about changes announced in the release notes.

18 February 2025

Vulnerability tag changes

Previous tagCurrent tagNotes
Most wanted*Known active exploitRenamed
N/APredicted exploitAdded
Imminent threatImminent threat
Remote exploitRemote exploit
Threat actorN/ARemoved because the data is now available in the new Threat actors column.
Ransomware groupN/ARemoved because the data is now available in the new Ransomware groups column.

* We also updated the Most wanted tag to Known active exploit on the Services page.

28 January 2025

Organization filter

We added the Organization filter to the following tables:

TablePage
Hierarchy tableOrganization
Networks tableNetworks
Ports tablePorts
Services tableServices
Vulnerabilities tableVulnerabilities
IP addresses for port #Port details
Instances of serviceService details
Instances of productProduct details
Instances of versionVersion details
IP address with CVEVulnerability details
Ports for IP addressIP address details
Vulnerabilities for IP addressIP address details
info

The Domains table on the Attack surface page and the IP addresses table on the IP addresses and Network details pages do not currently include the new filter.

18 December 2024

Table changes

Key: New*, Removed**

PageCurrent table namePrevious list nameCurrent columns and filtersPrevious columns and filters
OrganizationHierarchy tableHierarchy listLevel, Organization, Service count, Origin count, Port count, Vulnerability instance count, Descendant countLevel, Organization, Services, Origins, Ports, IP addresses**, Vulnerabilities, Descendants
Attack surfaceDomains tableDomain listDepth, Domain, IP address count, Descendant count, Domain tags*Depth (# domains), Domain name, IP addresses, Descendants
NetworksNetworks tableSubnet listNetwork, Origin, Origin category tag, ASN, IP address count, Port count, Vulnerability instance count, Organization count*Subnet, Origin, Origin category, ASN, IP addresses, Ports, Vulnerabilities, Source**
Network detailsIP addresses for networkSubnet IP addressesIP address, RDNS, FDNS count*, Port count, Service count*, Vulnerability instance count, IP address tags, Network count* FDNS*IP address, RDNS, Ports, Vulnerabilities, Tag, Source**
PortsPorts tablePort listPort, IPv4 count, IPv6 count, Port range, IP address*, Service*, Product*, Version*, Service tags*Port #, IPv4 count, IPv6 count, Range
Port detailsN/AIP addresses for port #IP address*, Service*, Product*, Version*, Vulnerability instance count*, Service tags*N/A
ServicesServices tableServices listService, Product, Version, Service tags, Instance count, IP address count, Ports, Vulnerability instance count, IP address*Service, Product, Version, Tag, Instances, IP addresses, Ports, Vulnerabilities, Source**
Service/Product/Version detailsInstancesInstances of Service/Product/VersionIP address, FDNS count*, RDNS, Port, Port range*, Service tags, Vulnerability instance count, Product, Version, Organization count*IP address, FDNS**, RDNS, Port, Tag, Vulnerabilities, Product, Version, Source**
VulnerabilitiesVulnerabilities tableVulnerabilities instance listCVE, CVSS score, CVSS severity, EPSS score % *, Vulnerability tags*, IP address count, Port count, IP address*CVE, Score, Remote exploitable**, Severity, IP addresses, Ports, Service**, Source**
Vulnerability detailsIP addresses with CVEServices by IP addressIP address, Port, Service, Product*, VersionIP address, Port, Service, Version, Source**,
IP addressesIP addresses tableIP address listIP address, RDNS, FDNS count*, Port count, Service count, Vulnerability instance count, IP address tags, Network count*, FDNS*IP address, RDNS, Ports, Services, Vulnerabilities, Tag, Source**
IP address detailsPorts for IP addressIP address by open portPort, Service, Product, Version, Vulnerability instance count, Service tags*, Port range*Port, Service, Version, Vulnerabilities
IP address detailsVulnerabilities for IP addressIP address by vulnerabilityCVE, Port, Service, Product, VersionCVE, Score**, Port, Service

Overview section changes

Key: New*, Removed**

PageCurrent fieldsPrevious fields
Network detailsNetwork, Origin, Origin category tag*, ASN, IP address count, Vulnerability instance count, Port count*, Organization count*Subnet, Origin, Origin category**, ASN, IP addresses, Vulnerabilities
Port detailsPort*, Port range*, IPv4 count*, IPv6 count*N/A
Service detailsService, Product count, Version count, Service instance count, Vulnerability instance count, Vulnerability count, IP address countService, Products, Versions, Service instances, Unique vulnerabilities, Vulnerabilities, IP addresses running service, Tag**
Product detailsService, Product, Version count, Product instance count, Vulnerability instance count, Vulnerability count, IP address countService, Product, Versions, Product instances,Unique vulnerabilities, Vulnerabilities, IP addresses running service, Tag**
Version detailsService, Product, Version, Version instance count, Vulnerability instance count, Vulnerability count, IP address countService, Product, Version, Version instances, Unique vulnerabilities, Vulnerabilities, IP addresses running service, Tag**
Vulnerability detailsCVSS severity*, CVSS score, NIST detailsVersions detected**, CVSS score, NIST details
IP address detailsIP address*, RDNS, ASN, Primary network, Port count*Service count*, Vulnerability instance count*, IP address tag*FDNS**, RDNS, ASN, Subnet/Prefix, Origin**, Source**

Removed UI sections

PageTop sectionChart
NetworkTop originsOverall vulnerability space
ServicesMost common services, Least common servicesServices running on most unique ports, Services with the most unique versions
VulnerabilitiesMost common vulnerabilities, Highest severity scorePercentage of severity, Percentage of attack vector, Exploit code maturity, Remediation level

Terminology changes

PreviousNew
SubnetNetwork
SourceOrganization
ListTable