![Image 1 — [VulnPath Update] New Feature: "My Tech Stack"](https://preview.redd.it/o7bzlo8c3ewg1.png?width=1308&format=png&auto=webp&s=110306e752ed0f3d839a26a9f2499f5f4769f359)
![Image 2 — [VulnPath Update] New Feature: "My Tech Stack"](https://preview.redd.it/8sh1co8c3ewg1.png?width=974&format=png&auto=webp&s=8fd20917838a0346fea6d6a44f104b2219d0394e)
[VulnPath Update] New Feature: "My Tech Stack"
Happy Monday!
I spent some this weekend working on a new feature called "My Tech Stack" for VulnPath (CVE visualization tool that let's you see the attack chain; see my past post for the backstory).
What is it?
You can now add any library, vendor, and/or framework used in your tech stack to then let VulnPath flag any CVEs impacting your environment(s).
Why?
If you spend a lot of time digging through CVEs, you know that one of the first questions that come to mind is "Does this impact me?". My Tech Stack accelerates this validation step by having VulnPath auto-flag any impacting CVEs during your search.
How can I start using it?
- Once signed in, head over to your "Dashboard"
- Scroll to the "My Tech Stack" section
- The "Actively Tracking" section at the top shows you what you're currently monitoring (screenshot #1)
- Use the input box to add your lib, vendor, etc, or use the "Quick Add" feature to quickly add some of the more common software (screenshot #1)
- That's it! Now when you lookup any CVEs, VulnPath will flag any that impact your stack through the middle graph UI (screenshot #2)
As always, I'm open to what everyone thinks so let me know your thoughts and suggestions!