4 years ago
Request Verification by Vulnerability
Now, on Integrates, it is possible to request the verification by vulnerabilities rather than by findings.
- From this day, when you press the “Request verification” button, you will see the list of vulnerabilities, and you will be able to choose which ones you want our hackers to verify.
- After you select the vulnerabilities, you have to press the “Request verification” button below the vulnerabilities and you will be prompted to enter a justification.
- The “Verification” column in the vulnerabilities table indicates the verification status.
You may find a more precise explanation of the new process in the following GIF:
- The comment places the vulnerabilities that are going to be verified before the justification.
- With this functionality, our analysts are able to perform a partial verification, so if there is an event that affects the verification of some of the vulnerabilities for which it was requested, they can do so only for those they can access.