|
1 | 1 | { |
2 | 2 | "currentNews": [ |
| 3 | + { |
| 4 | + "id": 514, |
| 5 | + "newsType": "news", |
| 6 | + "title": "Insyde Software Added as CVE Numbering Authority (CNA)", |
| 7 | + "urlKeywords": "Insyde Software Added as CNA", |
| 8 | + "date": "2025-04-29", |
| 9 | + "description": [ |
| 10 | + { |
| 11 | + "contentnewsType": "paragraph", |
| 12 | + "content": "<a href='/PartnerInformation/ListofPartners/partner/Insyde'>Insyde Software</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in all of Insyde Software’s firmware and software products, as well as vulnerabilities discovered by Insyde Software that are not covered by another CNA’s scope." |
| 13 | + }, |
| 14 | + { |
| 15 | + "contentnewsType": "paragraph", |
| 16 | + "content": "To date, <a href='/PartnerInformation/ListofPartners'>453 CNAs</a> (450 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Insyde Software is the 244th CNA from USA." |
| 17 | + }, |
| 18 | + { |
| 19 | + "contentnewsType": "paragraph", |
| 20 | + "content": "Insyde Software’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>." |
| 21 | + } |
| 22 | + ] |
| 23 | + }, |
| 24 | + { |
| 25 | + "id": 513, |
| 26 | + "newsType": "news", |
| 27 | + "title": "Minutes from CVE Board Teleconference Meeting on April 2 Now Available", |
| 28 | + "urlKeywords": "CVE Board Minutes from April 2", |
| 29 | + "date": "2025-04-29", |
| 30 | + "description": [ |
| 31 | + { |
| 32 | + "contentnewsType": "paragraph", |
| 33 | + "content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on April 2, 2025. Read the <a href='https://cve.mitre.org/community/board/meeting_summaries/02_April_2025.pdf' target='_blank'>meeting minutes summary</a>." |
| 34 | + }, |
| 35 | + { |
| 36 | + "contentnewsType": "paragraph", |
| 37 | + "content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information." |
| 38 | + } |
| 39 | + ] |
| 40 | + }, |
3 | 41 | { |
4 | 42 | "id": 512, |
5 | 43 | "newsType": "news", |
|
2965 | 3003 | }, |
2966 | 3004 | { |
2967 | 3005 | "contentnewsType": "paragraph", |
2968 | | - "content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/ASUS'>ASUSTeK Computer Incorporation</a> - ASUS issues only (Taiwan)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cytiva'>Cytiva</a> - Cytiva branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Pall'>Pall Corporation</a> - Pall branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Stryker'>Stryker Corporation</a> - All products of Stryker or a Stryker company including end-of-life/end-of-service products, and vulnerabilities in third-party software used in Stryker products that are not in another CNA’s scope (USA)</li></ul>" |
| 3006 | + "content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/ASUS'>ASUSTeK Computer Incorporation</a> - ASUS issues only (Taiwan)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cytiva'>Cytiva</a> - Cytiva branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/LMS'>Leica Microsystems</a> - Leica Microsystems products as listed on <a href='https://www.leica-microsystems.com/products' target='_blank'>https://www.leica-microsystems.com/products</a> (Germany)</li><li><a href='/PartnerInformation/ListofPartners/partner/Pall'>Pall Corporation</a> - Pall branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Stryker'>Stryker Corporation</a> - All products of Stryker or a Stryker company including end-of-life/end-of-service products, and vulnerabilities in third-party software used in Stryker products that are not in another CNA’s scope (USA)</li></ul>" |
2969 | 3007 | }, |
2970 | 3008 | { |
2971 | 3009 | "contentnewsType": "paragraph", |
2972 | 3010 | "content": "<strong><a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE TL-Root</a>:</strong>" |
2973 | 3011 | }, |
2974 | 3012 | { |
2975 | 3013 | "contentnewsType": "paragraph", |
2976 | | - "content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/AMZN'>Amazon</a> - All Amazon and AWS products (including subsidiaries, supported, and EOL/EOS products), as well as vulnerabilities in third party software discovered by Amazon/AWS that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Arxscan'>Arxscan, Inc.</a> - Arxscan issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cato'>Cato Networks</a> - All Cato Networks products and vulnerabilities in third-party products affecting Cato products unless covered by the scope of another CNA (Israel)</li><li><a href='/PartnerInformation/ListofPartners/partner/Forescout'>Forescout Technologies</a> - Forescout issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Huntress'>Huntress Labs Inc.</a> - All Huntress products, as well as vulnerabilities in third-party software discovered by Huntress that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/imaginationtech'>Imagination Technologies</a> - Imagination Technologies branded products and technologies and Imagination Technologies (IMG) managed open source projects (UK)</li><li><a href='/PartnerInformation/ListofPartners/partner/Intigriti'>Intigriti</a> - Vulnerabilities in Intigriti products and vulnerabilities discovered by, or reported to, Intigriti that are not in another CNA’s scope (Belgium)</li><li><a href='/PartnerInformation/ListofPartners/partner/ivanti'>Ivanti</a> - Vulnerabilities in supported Ivanti products and infrastructure, excluding third-party components, and meeting severity thresholds defined in Ivanti’s Disclosure Policy found <a href='https://www.ivanti.com/support/contact-security' target='_blank'>here</a> (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Kong'>Kong Inc.</a> - Kong products; Kong Konnect, Kong Enterprise, Kong Mesh, and Kong Insomnia, including Kong Opensource; Kong Gateway, Kuma, Insomnia (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/LMS'>Leica Microsystems</a> - Leica Microsystems products as listed on <a href='https://www.leica-microsystems.com/products' target='_blank'>https://www.leica-microsystems.com/products</a> (Germany)</li><li><a href='/PartnerInformation/ListofPartners/partner/MON-CSIRT'>Monash University - Cyber Security Incident Response Team</a> - Vulnerabilities in any Monash University developed products, or vulnerabilities identified in third-party vendor products used by Monash University, unless covered by the scope of another CNA (Australia)</li><li><a href='/PartnerInformation/ListofPartners/partner/PlexTrac'>PlexTrac, Inc.</a> - Vulnerabilities within PlexTrac’s products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Proton'>Proton AG</a> - Proton AG issues only (Switzerland)</li><li><a href='/PartnerInformation/ListofPartners/partner/RealPage'>RealPage</a> - Vulnerabilities in RealPage products and services including but not limited to: Keyready, Knock CRM, HomeWiseDocs, REDS (Real Estate Data Solutions), G5, WhiteSky Communications, Chirp Systems, STRATIS IoT, Modern Message (Community Rewards), Hipercept, Investor Management Services, AIM, FUEL, Buildium, All Property Management, SimpleBills, DepositIQ, Rentlytics, ClickPay, LeaseLabs, PEX, On-Site, American Utility Management (AUM), Axiometrics, Lease Rent Optimization (LRO), AssetEye, NWP Services Corporation, Indatus, ActiveBuilding, RentMineOnline (RMO), MyNewPlace, Compliance Depot, SeniorLiving.net, eREI, Domin-8, Level One, Propertyware, Opstechnology, LeasingDesk, and YieldStar (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/seal'>Seal Security</a> - Vulnerabilities in Seal products or services and vulnerabilities discovered in open-source libraries unless covered by the scope of another CNA (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Supermicro'>Super Micro Computer, Inc.</a> - Supermicro branded products, managed system, or software projects (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/upKeeper'>upKeeper Solutions</a> - All upKeeper Solutions products, excluding end-of-life (EOL) as listed in the upKeeper Solutions End of Life Policy (Sweden)</li><li><a href='/PartnerInformation/ListofPartners/partner/watchdog'>WatchDogDevelopment.com, LLC</a> - All WatchDog products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Wiz'>Wiz, Inc.</a> - Vulnerabilities identified in Wiz products, and vulnerabilities discovered by, or reported to, Wiz that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/9front'>9front Systems</a> - All software produced as part of the Plan9front open source operating system, as well as its applications and cyberinfrastructure. Vulnerabilities discovered by or reported to 9front Systems for all Plan 9 software not covered by the scope of another CNA (USA)</li></ul>" |
| 3014 | + "content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/AMZN'>Amazon</a> - All Amazon and AWS products (including subsidiaries, supported, and EOL/EOS products), as well as vulnerabilities in third party software discovered by Amazon/AWS that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Arxscan'>Arxscan, Inc.</a> - Arxscan issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cato'>Cato Networks</a> - All Cato Networks products and vulnerabilities in third-party products affecting Cato products unless covered by the scope of another CNA (Israel)</li><li><a href='/PartnerInformation/ListofPartners/partner/Forescout'>Forescout Technologies</a> - Forescout issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Huntress'>Huntress Labs Inc.</a> - All Huntress products, as well as vulnerabilities in third-party software discovered by Huntress that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/imaginationtech'>Imagination Technologies</a> - Imagination Technologies branded products and technologies and Imagination Technologies (IMG) managed open source projects (UK)</li><li><a href='/PartnerInformation/ListofPartners/partner/Intigriti'>Intigriti</a> - Vulnerabilities in Intigriti products and vulnerabilities discovered by, or reported to, Intigriti that are not in another CNA’s scope (Belgium)</li><li><a href='/PartnerInformation/ListofPartners/partner/ivanti'>Ivanti</a> - Vulnerabilities in supported Ivanti products and infrastructure, excluding third-party components, and meeting severity thresholds defined in Ivanti’s Disclosure Policy found <a href='https://www.ivanti.com/support/contact-security' target='_blank'>here</a> (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Kong'>Kong Inc.</a> - Kong products; Kong Konnect, Kong Enterprise, Kong Mesh, and Kong Insomnia, including Kong Opensource; Kong Gateway, Kuma, Insomnia (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/MON-CSIRT'>Monash University - Cyber Security Incident Response Team</a> - Vulnerabilities in any Monash University developed products, or vulnerabilities identified in third-party vendor products used by Monash University, unless covered by the scope of another CNA (Australia)</li><li><a href='/PartnerInformation/ListofPartners/partner/PlexTrac'>PlexTrac, Inc.</a> - Vulnerabilities within PlexTrac’s products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Proton'>Proton AG</a> - Proton AG issues only (Switzerland)</li><li><a href='/PartnerInformation/ListofPartners/partner/RealPage'>RealPage</a> - Vulnerabilities in RealPage products and services including but not limited to: Keyready, Knock CRM, HomeWiseDocs, REDS (Real Estate Data Solutions), G5, WhiteSky Communications, Chirp Systems, STRATIS IoT, Modern Message (Community Rewards), Hipercept, Investor Management Services, AIM, FUEL, Buildium, All Property Management, SimpleBills, DepositIQ, Rentlytics, ClickPay, LeaseLabs, PEX, On-Site, American Utility Management (AUM), Axiometrics, Lease Rent Optimization (LRO), AssetEye, NWP Services Corporation, Indatus, ActiveBuilding, RentMineOnline (RMO), MyNewPlace, Compliance Depot, SeniorLiving.net, eREI, Domin-8, Level One, Propertyware, Opstechnology, LeasingDesk, and YieldStar (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/seal'>Seal Security</a> - Vulnerabilities in Seal products or services and vulnerabilities discovered in open-source libraries unless covered by the scope of another CNA (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Supermicro'>Super Micro Computer, Inc.</a> - Supermicro branded products, managed system, or software projects (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/upKeeper'>upKeeper Solutions</a> - All upKeeper Solutions products, excluding end-of-life (EOL) as listed in the upKeeper Solutions End of Life Policy (Sweden)</li><li><a href='/PartnerInformation/ListofPartners/partner/watchdog'>WatchDogDevelopment.com, LLC</a> - All WatchDog products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Wiz'>Wiz, Inc.</a> - Vulnerabilities identified in Wiz products, and vulnerabilities discovered by, or reported to, Wiz that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/9front'>9front Systems</a> - All software produced as part of the Plan9front open source operating system, as well as its applications and cyberinfrastructure. Vulnerabilities discovered by or reported to 9front Systems for all Plan 9 software not covered by the scope of another CNA (USA)</li></ul>" |
2977 | 3015 | }, |
2978 | 3016 | { |
2979 | 3017 | "contentnewsType": "paragraph", |
|
0 commit comments