Software Vulnerability Research

Release Notes

November 2019


Software Vulnerability Research reimagines how software is secured by closing the gap between IT Security and IT Operations by providing industry leading security research, risk assessment and remediation through Software Vulnerability Research’s key components:

Research: Keep up with the latest software vulnerability research and advisories from Secunia Research
Assessment: Discover where software vulnerabilities are installed across your organization
Patching: Remediate software vulnerabilities in third-party applications

New Features and Enhancements

The following table lists new features and enhancements for Software Vulnerability Research. The Affected Module(s) column refers to the specific Software Vulnerability Research module(s) affected by the new feature or enhancement.

Affected Module(s)

Feature or Enhancement Description

Reference Number

Vulnerability Manager

Under Vulnerability Manager > Watch Lists & Advisories > Watch Lists, when a user who is not authorized to see all advisories, created a watch list and try editing a watch list to select the Receive all advisories checkbox then the error message (Receive All role not assigned to this user) appears.

Note • Admin user can not enable the Receive all advisories checkbox for Watch Lists, which are created by non authorized users.



Under Settings > User Management > Roles, new roles are added with the below descriptions:

Watch List Manager - Can create / edit / clone Watch Lists.
Watch List Subscription Manager - Can create / edit / clone Watch Lists for own user group.
Watch List Subscription Manager Local - Can enforce subscription Watch Lists for all user groups.

Note • Admin user can create a new user groups with the above newly added roles in Settings > User Management > User Groups.


Resolved Issues

No resolved issues were included in this release.

Product Feedback

Have a suggestion for how we can improve this product? Please come share direct feedback with the product team and vote on ideas submitted by other users in our Customer Community feedback page for Software Vulnerability Research

Note • You will need your Flexera Customer Community credentials to enter feedback.

You can also submit feedback through the Software Vulnerability Research user interface by clicking the feedback icon in the upper-right-hand corner of each module.

System Requirements

Software Vulnerability Research’s User Interface will resize and adapt when being used on different devices. You can access the system from anywhere using any device, such as a smartphone or tablet, running Internet Explorer 11 or higher, Chrome, Opera, Firefox, Safari and mobile browsers with an Internet connection capable of connecting to

Legal Information

Copyright Notice

Copyright © 2019 Flexera.

This publication contains proprietary and confidential information and creative works owned by Flexera and its licensors, if any. Any use, copying, publication, distribution, display, modification, or transmission of such publication in whole or in part in any form or by any means without the prior express written permission of Flexera is strictly prohibited. Except where expressly provided by Flexera in writing, possession of this publication shall not be construed to confer any license or rights under any Flexera intellectual property rights, whether by estoppel, implication, or otherwise.

All copies of the technology and related information, if allowed by Flexera, must display this notice of copyright and ownership in full.

Intellectual Property

For a list of trademarks and patents that are owned by Flexera, see All other brand and product names mentioned in Flexera products, product documentation, and marketing materials are the trademarks and registered trademarks of their respective owners.

Restricted Rights Legend

The Software is commercial computer software. If the user or licensee of the Software is an agency, department, or other entity of the United States Government, the use, duplication, reproduction, release, modification, disclosure, or transfer of the Software, or any related documentation of any kind, including technical data and manuals, is restricted by a license agreement or by the terms of this Agreement in accordance with Federal Acquisition Regulation 12.212 for civilian purposes and Defense Federal Acquisition Regulation Supplement 227.7202 for military purposes. The Software was developed fully at private expense. All other use is prohibited.