Skip to content

Commit 1b9bec6

Browse files
authored
Merge pull request #3550 from CVEProject/int
4/29/25 Release: INT to MAIN
2 parents eb5a778 + dbc186f commit 1b9bec6

3 files changed

Lines changed: 120 additions & 68 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 79 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -7335,7 +7335,7 @@
73357335
"advisories": [
73367336
{
73377337
"label": "Advisories",
7338-
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
7338+
"url": "https://url.sap/sapsecuritypatchday"
73397339
}
73407340
]
73417341
},
@@ -8705,7 +8705,7 @@
87058705
"shortName": "tibco",
87068706
"cnaID": "CNA-2017-0001",
87078707
"organizationName": "TIBCO Software Inc.",
8708-
"scope": "TIBCO, Talarian, Spotfire, Data Synapse, Foresight, Kabira, Proginet, LogLogic, StreamBase, JasperSoft, and Mashery products/brands only.",
8708+
"scope": "TIBCO issues only.",
87098709
"contact": [
87108710
{
87118711
"email": [
@@ -10214,32 +10214,46 @@
1021410214
"shortName": "PingIdentity",
1021510215
"cnaID": "CNA-2021-0042",
1021610216
"organizationName": "Ping Identity Corporation",
10217-
"scope": "All Ping Identity products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by Ping Identity that are not in another CNA’s scope.",
10217+
"scope": "All Ping Identity and ForgeRock products (supported products and end-of-life/end-of-service products), as well as vulnerabilities in third-party software discovered by Ping Identity or ForgeRock that are not in another CNA’s scope.",
1021810218
"contact": [
1021910219
{
1022010220
"email": [
1022110221
{
10222-
"label": "Email",
10223-
"emailAddr": "responsible-disclosure@pingidentity.com"
10222+
"label": "Security Email",
10223+
"emailAddr": "security@pingidentity.com"
10224+
},
10225+
{
10226+
"label": "PSIRT Email",
10227+
"emailAddr": "psirt@pingidentity.com"
10228+
}
10229+
],
10230+
"contact": [
10231+
{
10232+
"label": "Bug Bounty Program",
10233+
"url": "https://hackerone.com/pingidentity"
1022410234
}
1022510235
],
10226-
"contact": [],
1022710236
"form": []
1022810237
}
1022910238
],
1023010239
"disclosurePolicy": [
1023110240
{
1023210241
"label": "Policy",
10233-
"language": "English",
10242+
"language": "",
1023410243
"url": "https://www.pingidentity.com/en/company/security-at-ping-identity.html"
10244+
},
10245+
{
10246+
"label": "Ping Identity PGP Keys",
10247+
"language": "",
10248+
"url": "https://www.pingidentity.com/.well-known/security.txt"
1023510249
}
1023610250
],
1023710251
"securityAdvisories": {
1023810252
"alerts": [],
1023910253
"advisories": [
1024010254
{
1024110255
"label": "Advisories",
10242-
"url": "https://support.pingidentity.com/"
10256+
"url": "https://docs.pingidentity.com/pingam/latest/release-notes/security-advisories.html"
1024310257
}
1024410258
]
1024510259
},
@@ -10732,63 +10746,6 @@
1073210746
},
1073310747
"country": "USA"
1073410748
},
10735-
{
10736-
"shortName": "ForgeRock",
10737-
"cnaID": "CNA-2021-0046",
10738-
"organizationName": "ForgeRock, Inc.",
10739-
"scope": "ForgeRock issues only.",
10740-
"contact": [
10741-
{
10742-
"email": [
10743-
{
10744-
"label": "Email",
10745-
"emailAddr": "psirt@forgerock.com"
10746-
}
10747-
],
10748-
"contact": [],
10749-
"form": []
10750-
}
10751-
],
10752-
"disclosurePolicy": [
10753-
{
10754-
"label": "Policy",
10755-
"language": "English",
10756-
"url": "https://www.forgerock.com/vulnerability-disclosure"
10757-
}
10758-
],
10759-
"securityAdvisories": {
10760-
"alerts": [],
10761-
"advisories": [
10762-
{
10763-
"label": "Advisories",
10764-
"url": "https://backstage.forgerock.com/knowledge/kb/book/b21824339"
10765-
}
10766-
]
10767-
},
10768-
"resources": [],
10769-
"CNA": {
10770-
"isRoot": false,
10771-
"root": {
10772-
"shortName": "n/a",
10773-
"organizationName": "n/a"
10774-
},
10775-
"type": [
10776-
"Vendor",
10777-
"Open Source"
10778-
],
10779-
"TLR": {
10780-
"shortName": "mitre",
10781-
"organizationName": "MITRE Corporation"
10782-
},
10783-
"roles": [
10784-
{
10785-
"helpText": "",
10786-
"role": "CNA"
10787-
}
10788-
]
10789-
},
10790-
"country": "USA"
10791-
},
1079210749
{
1079310750
"shortName": "ASUSTOR",
1079410751
"cnaID": "CNA-2021-0048",
@@ -26059,5 +26016,62 @@
2605926016
]
2606026017
},
2606126018
"country": "USA"
26019+
},
26020+
{
26021+
"shortName": "Insyde",
26022+
"cnaID": "CNA-2025-0022",
26023+
"organizationName": "Insyde Software",
26024+
"scope": "Vulnerabilities in all of Insyde Software’s firmware and software products, as well as vulnerabilities discovered by Insyde Software that are not covered by another CNA’s scope.",
26025+
"contact": [
26026+
{
26027+
"email": [
26028+
{
26029+
"label": "Email",
26030+
"emailAddr": "security.report@insyde.com"
26031+
}
26032+
],
26033+
"contact": [],
26034+
"form": []
26035+
}
26036+
],
26037+
"disclosurePolicy": [
26038+
{
26039+
"label": "Policy",
26040+
"language": "",
26041+
"url": "https://www.insyde.com/security-pledge/"
26042+
}
26043+
],
26044+
"securityAdvisories": {
26045+
"alerts": [],
26046+
"advisories": [
26047+
{
26048+
"label": "Advisories",
26049+
"url": "https://www.insyde.com/security-pledge/"
26050+
}
26051+
]
26052+
},
26053+
"resources": [],
26054+
"CNA": {
26055+
"isRoot": false,
26056+
"root": {
26057+
"shortName": "n/a",
26058+
"organizationName": "n/a"
26059+
},
26060+
"roles": [
26061+
{
26062+
"helpText": "",
26063+
"role": "CNA"
26064+
}
26065+
],
26066+
"TLR": {
26067+
"shortName": "mitre",
26068+
"organizationName": "MITRE Corporation"
26069+
},
26070+
"type": [
26071+
"Vendor",
26072+
"Researcher"
26073+
]
26074+
},
26075+
"country": "USA"
2606226076
}
2606326077
]

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1141,7 +1141,7 @@
11411141
},
11421142
{
11431143
"month": "April",
1144-
"value": "6"
1144+
"value": "7"
11451145
},
11461146
{
11471147
"month": "May",

src/assets/data/news.json

Lines changed: 40 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,43 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 514,
5+
"newsType": "news",
6+
"title": "Insyde Software Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "Insyde Software Added as CNA",
8+
"date": "2025-04-29",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/Insyde'>Insyde Software</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in all of Insyde Software’s firmware and software products, as well as vulnerabilities discovered by Insyde Software that are not covered by another CNA’s scope."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>453 CNAs</a> (450 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Insyde Software is the 244th CNA from USA."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "Insyde Software’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 513,
26+
"newsType": "news",
27+
"title": "Minutes from CVE Board Teleconference Meeting on April 2 Now Available",
28+
"urlKeywords": "CVE Board Minutes from April 2",
29+
"date": "2025-04-29",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on April 2, 2025. Read the <a href='https://cve.mitre.org/community/board/meeting_summaries/02_April_2025.pdf' target='_blank'>meeting minutes summary</a>."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
38+
}
39+
]
40+
},
341
{
442
"id": 512,
543
"newsType": "news",
@@ -2965,15 +3003,15 @@
29653003
},
29663004
{
29673005
"contentnewsType": "paragraph",
2968-
"content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/ASUS'>ASUSTeK Computer Incorporation</a> - ASUS issues only (Taiwan)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cytiva'>Cytiva</a> - Cytiva branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Pall'>Pall Corporation</a> - Pall branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Stryker'>Stryker Corporation</a> - All products of Stryker or a Stryker company including end-of-life/end-of-service products, and vulnerabilities in third-party software used in Stryker products that are not in another CNA’s scope (USA)</li></ul>"
3006+
"content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/ASUS'>ASUSTeK Computer Incorporation</a> - ASUS issues only (Taiwan)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cytiva'>Cytiva</a> - Cytiva branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/LMS'>Leica Microsystems</a> - Leica Microsystems products as listed on <a href='https://www.leica-microsystems.com/products' target='_blank'>https://www.leica-microsystems.com/products</a> (Germany)</li><li><a href='/PartnerInformation/ListofPartners/partner/Pall'>Pall Corporation</a> - Pall branded products only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Stryker'>Stryker Corporation</a> - All products of Stryker or a Stryker company including end-of-life/end-of-service products, and vulnerabilities in third-party software used in Stryker products that are not in another CNA’s scope (USA)</li></ul>"
29693007
},
29703008
{
29713009
"contentnewsType": "paragraph",
29723010
"content": "<strong><a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE TL-Root</a>:</strong>"
29733011
},
29743012
{
29753013
"contentnewsType": "paragraph",
2976-
"content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/AMZN'>Amazon</a> - All Amazon and AWS products (including subsidiaries, supported, and EOL/EOS products), as well as vulnerabilities in third party software discovered by Amazon/AWS that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Arxscan'>Arxscan, Inc.</a> - Arxscan issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cato'>Cato Networks</a> - All Cato Networks products and vulnerabilities in third-party products affecting Cato products unless covered by the scope of another CNA (Israel)</li><li><a href='/PartnerInformation/ListofPartners/partner/Forescout'>Forescout Technologies</a> - Forescout issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Huntress'>Huntress Labs Inc.</a> - All Huntress products, as well as vulnerabilities in third-party software discovered by Huntress that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/imaginationtech'>Imagination Technologies</a> - Imagination Technologies branded products and technologies and Imagination Technologies (IMG) managed open source projects (UK)</li><li><a href='/PartnerInformation/ListofPartners/partner/Intigriti'>Intigriti</a> - Vulnerabilities in Intigriti products and vulnerabilities discovered by, or reported to, Intigriti that are not in another CNA’s scope (Belgium)</li><li><a href='/PartnerInformation/ListofPartners/partner/ivanti'>Ivanti</a> - Vulnerabilities in supported Ivanti products and infrastructure, excluding third-party components, and meeting severity thresholds defined in Ivanti’s Disclosure Policy found <a href='https://www.ivanti.com/support/contact-security' target='_blank'>here</a> (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Kong'>Kong Inc.</a> - Kong products; Kong Konnect, Kong Enterprise, Kong Mesh, and Kong Insomnia, including Kong Opensource; Kong Gateway, Kuma, Insomnia (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/LMS'>Leica Microsystems</a> - Leica Microsystems products as listed on <a href='https://www.leica-microsystems.com/products' target='_blank'>https://www.leica-microsystems.com/products</a> (Germany)</li><li><a href='/PartnerInformation/ListofPartners/partner/MON-CSIRT'>Monash University - Cyber Security Incident Response Team</a> - Vulnerabilities in any Monash University developed products, or vulnerabilities identified in third-party vendor products used by Monash University, unless covered by the scope of another CNA (Australia)</li><li><a href='/PartnerInformation/ListofPartners/partner/PlexTrac'>PlexTrac, Inc.</a> - Vulnerabilities within PlexTrac’s products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Proton'>Proton AG</a> - Proton AG issues only (Switzerland)</li><li><a href='/PartnerInformation/ListofPartners/partner/RealPage'>RealPage</a> - Vulnerabilities in RealPage products and services including but not limited to: Keyready, Knock CRM, HomeWiseDocs, REDS (Real Estate Data Solutions), G5, WhiteSky Communications, Chirp Systems, STRATIS IoT, Modern Message (Community Rewards), Hipercept, Investor Management Services, AIM, FUEL, Buildium, All Property Management, SimpleBills, DepositIQ, Rentlytics, ClickPay, LeaseLabs, PEX, On-Site, American Utility Management (AUM), Axiometrics, Lease Rent Optimization (LRO), AssetEye, NWP Services Corporation, Indatus, ActiveBuilding, RentMineOnline (RMO), MyNewPlace, Compliance Depot, SeniorLiving.net, eREI, Domin-8, Level One, Propertyware, Opstechnology, LeasingDesk, and YieldStar (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/seal'>Seal Security</a> - Vulnerabilities in Seal products or services and vulnerabilities discovered in open-source libraries unless covered by the scope of another CNA (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Supermicro'>Super Micro Computer, Inc.</a> - Supermicro branded products, managed system, or software projects (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/upKeeper'>upKeeper Solutions</a> - All upKeeper Solutions products, excluding end-of-life (EOL) as listed in the upKeeper Solutions End of Life Policy (Sweden)</li><li><a href='/PartnerInformation/ListofPartners/partner/watchdog'>WatchDogDevelopment.com, LLC</a> - All WatchDog products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Wiz'>Wiz, Inc.</a> - Vulnerabilities identified in Wiz products, and vulnerabilities discovered by, or reported to, Wiz that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/9front'>9front Systems</a> - All software produced as part of the Plan9front open source operating system, as well as its applications and cyberinfrastructure. Vulnerabilities discovered by or reported to 9front Systems for all Plan 9 software not covered by the scope of another CNA (USA)</li></ul>"
3014+
"content": "<ul><li><a href='/PartnerInformation/ListofPartners/partner/AMZN'>Amazon</a> - All Amazon and AWS products (including subsidiaries, supported, and EOL/EOS products), as well as vulnerabilities in third party software discovered by Amazon/AWS that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Arxscan'>Arxscan, Inc.</a> - Arxscan issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Cato'>Cato Networks</a> - All Cato Networks products and vulnerabilities in third-party products affecting Cato products unless covered by the scope of another CNA (Israel)</li><li><a href='/PartnerInformation/ListofPartners/partner/Forescout'>Forescout Technologies</a> - Forescout issues only (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Huntress'>Huntress Labs Inc.</a> - All Huntress products, as well as vulnerabilities in third-party software discovered by Huntress that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/imaginationtech'>Imagination Technologies</a> - Imagination Technologies branded products and technologies and Imagination Technologies (IMG) managed open source projects (UK)</li><li><a href='/PartnerInformation/ListofPartners/partner/Intigriti'>Intigriti</a> - Vulnerabilities in Intigriti products and vulnerabilities discovered by, or reported to, Intigriti that are not in another CNA’s scope (Belgium)</li><li><a href='/PartnerInformation/ListofPartners/partner/ivanti'>Ivanti</a> - Vulnerabilities in supported Ivanti products and infrastructure, excluding third-party components, and meeting severity thresholds defined in Ivanti’s Disclosure Policy found <a href='https://www.ivanti.com/support/contact-security' target='_blank'>here</a> (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Kong'>Kong Inc.</a> - Kong products; Kong Konnect, Kong Enterprise, Kong Mesh, and Kong Insomnia, including Kong Opensource; Kong Gateway, Kuma, Insomnia (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/MON-CSIRT'>Monash University - Cyber Security Incident Response Team</a> - Vulnerabilities in any Monash University developed products, or vulnerabilities identified in third-party vendor products used by Monash University, unless covered by the scope of another CNA (Australia)</li><li><a href='/PartnerInformation/ListofPartners/partner/PlexTrac'>PlexTrac, Inc.</a> - Vulnerabilities within PlexTrac’s products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Proton'>Proton AG</a> - Proton AG issues only (Switzerland)</li><li><a href='/PartnerInformation/ListofPartners/partner/RealPage'>RealPage</a> - Vulnerabilities in RealPage products and services including but not limited to: Keyready, Knock CRM, HomeWiseDocs, REDS (Real Estate Data Solutions), G5, WhiteSky Communications, Chirp Systems, STRATIS IoT, Modern Message (Community Rewards), Hipercept, Investor Management Services, AIM, FUEL, Buildium, All Property Management, SimpleBills, DepositIQ, Rentlytics, ClickPay, LeaseLabs, PEX, On-Site, American Utility Management (AUM), Axiometrics, Lease Rent Optimization (LRO), AssetEye, NWP Services Corporation, Indatus, ActiveBuilding, RentMineOnline (RMO), MyNewPlace, Compliance Depot, SeniorLiving.net, eREI, Domin-8, Level One, Propertyware, Opstechnology, LeasingDesk, and YieldStar (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/seal'>Seal Security</a> - Vulnerabilities in Seal products or services and vulnerabilities discovered in open-source libraries unless covered by the scope of another CNA (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Supermicro'>Super Micro Computer, Inc.</a> - Supermicro branded products, managed system, or software projects (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/upKeeper'>upKeeper Solutions</a> - All upKeeper Solutions products, excluding end-of-life (EOL) as listed in the upKeeper Solutions End of Life Policy (Sweden)</li><li><a href='/PartnerInformation/ListofPartners/partner/watchdog'>WatchDogDevelopment.com, LLC</a> - All WatchDog products (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/Wiz'>Wiz, Inc.</a> - Vulnerabilities identified in Wiz products, and vulnerabilities discovered by, or reported to, Wiz that are not in another CNA’s scope (USA)</li><li><a href='/PartnerInformation/ListofPartners/partner/9front'>9front Systems</a> - All software produced as part of the Plan9front open source operating system, as well as its applications and cyberinfrastructure. Vulnerabilities discovered by or reported to 9front Systems for all Plan 9 software not covered by the scope of another CNA (USA)</li></ul>"
29773015
},
29783016
{
29793017
"contentnewsType": "paragraph",

0 commit comments

Comments
 (0)