You can create your own tech stack, your software inventory, and manage vulnerabilities affecting your tech stack easily. Creating a tech stack allows you to focus on relevant issues only. You can browse, filter vulnerabilities affecting your tech stack, view reports and timelines for your tech stack.

Tech stack dashboard

Tech stack dashboard provides users with an overview of their tech stack.

  • Vendor statistics: A pie chart showing number of products by vendors.
  • CVE statistics: A bar chart showing CVE statistics for the last month
  • Timeline: A timeline of events such as new CVEs, discovered exploits, CISA dates etc affecting your tech stack. Provides a quick overview of your vulnerabilities and timeline of changes.

Adding items to your tech stack

You can add either products or versions to your tech stack. Reports, statistics and dashboards for products and versions can be viewed separately. Using products to build your tech stack is recommended as it may not be feasible to keep versions up to date or track every single version of each product in your environment.

To add items to your tech stack you can use Tech stack links on product or version pages, or you can use the search form on the tech stack page to add items by searching. Locating the product by browsing and adding to a tech stack after reviewing the product/version is strongly recommended, over adding products/versions by using the search form. Browsing allows users to locate the correct product.

Multiple tech stacks for multi-user organizations

Users who are part of a multi-user organizations, i.e Business and Enterprise plan customers, can create multiple tech stacks, e.g for managing different groups of products.

Tech stack definitions can be shared with everyone in the organization or can be private (i.e visible to only the user who created the tech stack).

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!