You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/releases/os_upgrading/2.51.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,6 +77,14 @@ If you already have a valid backup of the postgres 16 database, you can start at
77
77
78
78
_Note: If you are using a bound volume, the path has changed for Postgres18. It is now `/var/lib/postgresql/` instead of `/var/lib/postgresql/data`. Failure to change the path may result in errors about failure to create a shim task. See the discussion in [docker-library/postgres](https://github.com/docker-library/postgres/issues/1370)._
79
79
80
+
> **Postgres Data storage**
81
+
>
82
+
> PostgreSQL 18 changed its default `PGDATA` path from `/var/lib/postgresql/data` to `/var/lib/postgresql/18/docker`. Because the Docker volume was mounted at `/var/lib/postgresql/data`, data was written to the container's ephemeral layer instead of the volume.
83
+
>
84
+
> This has been fixed in 2.55.4 by explicitly setting `PGDATA: /var/lib/postgresql/data` in `docker-compose.yml`.
85
+
>
86
+
> If you customise the postgres service in your own `docker-compose.override.yml`, make sure `PGDATA` is set to the path where your volume is mounted.
87
+
80
88
### 0. Backup
81
89
82
90
Always back up your data before starting and save it somewhere.
Copy file name to clipboardExpand all lines: docs/content/releases/pro/changelog.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,20 @@ Here are the release notes for **DefectDojo Pro (Cloud Version)**. These release
10
10
11
11
For Open Source release notes, please see the [Releases page on GitHub](https://github.com/DefectDojo/django-DefectDojo/releases), or alternatively consult the Open Source [upgrade notes](/changelog/os_upgrading/upgrading_guide/).
12
12
13
-
## Feb 2025: v2.55
13
+
## Feb 2026: v2.55
14
+
15
+
### Feb 17, 2026: v2.55.3
16
+
17
+
***(Pro UI)** Added “Scheduled” status to Engagements to enhances the tracking and management of Engagements.
18
+
19
+
### Feb 10, 2026: v2.55.2
20
+
21
+
***(Pro UI)** Enhanced Organization addition permissions with configuration checks.
22
+
23
+
### Feb 4, 2026: v2.55.1
24
+
25
+
***(Pro UI)** Findings: Added support for Custom Fields; key-value pairs that can be added to Findings.
26
+
***(Pro UI)** Fixed an issue where a date filter could throw a 500 error.
Copy file name to clipboardExpand all lines: docs/content/triage_findings/findings_workflows/finding_status_definitions.md
+49Lines changed: 49 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,3 +89,52 @@ If you have a testing and remediation effort related to a specific aspect of you
89
89
Once you’ve reviewed a Finding, you might discover that the vulnerability reported does not actually exist. The False Positive status will be maintained by reimport and prevent matching findings from being opened or closed, which assists with noise reduction.
90
90
91
91
If a different scanning tool finds a similar Finding, it will not be recorded as a False Positive. DefectDojo can only compare Findings within the same tool to determine if a Finding has already been recorded.
92
+
93
+
## Severity vs Risk
94
+
Severity reflects the technical impact of an issue if exploited. Risk reflects the business urgency and required response, factoring in context such as exposure, exploitability, compensating controls, and operational impact.
95
+
96
+
97
+
## Risk Level Definitions
98
+
### Urgent
99
+
A finding that represents an immediate and unacceptable business risk.
100
+
101
+
High likelihood of exploitation or active exploitation observed
102
+
Direct exposure of critical systems, sensitive data, or customer environments
103
+
Limited or no compensating controls
104
+
Failure to act could result in severe business disruption, regulatory impact, or reputational damage
0 commit comments