Skip to content

Commit 25d4e9b

Browse files
authored
Merge pull request #3618 from CVEProject/int
6/17/25 Release: INT to MAIN
2 parents 1a7c722 + c6f9231 commit 25d4e9b

6 files changed

Lines changed: 145 additions & 10 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 58 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17624,15 +17624,15 @@
1762417624
{
1762517625
"label": "Policy",
1762617626
"language": "",
17627-
"url": "https://www.securin.io/disclosure-policy/"
17627+
"url": "https://www.securin.io/disclosure-policy"
1762817628
}
1762917629
],
1763017630
"securityAdvisories": {
1763117631
"alerts": [],
1763217632
"advisories": [
1763317633
{
1763417634
"label": "Advisories",
17635-
"url": "https://www.securin.io/zero-days-list/"
17635+
"url": "https://www.securin.io/discover-zero-days"
1763617636
}
1763717637
]
1763817638
},
@@ -26140,5 +26140,61 @@
2614026140
]
2614126141
},
2614226142
"country": "USA"
26143+
},
26144+
{
26145+
"shortName": "Toreon",
26146+
"cnaID": "CNA-2025-0031",
26147+
"organizationName": "Toreon",
26148+
"scope": "Vulnerabilities discovered by or reported to Toreon that are not in another CNA’s scope.",
26149+
"contact": [
26150+
{
26151+
"email": [
26152+
{
26153+
"label": "Email",
26154+
"emailAddr": "disclosure@toreon.com"
26155+
}
26156+
],
26157+
"contact": [],
26158+
"form": []
26159+
}
26160+
],
26161+
"disclosurePolicy": [
26162+
{
26163+
"label": "Policy",
26164+
"language": "",
26165+
"url": "https://www.toreon.com/cna-disclosure-policy/"
26166+
}
26167+
],
26168+
"securityAdvisories": {
26169+
"alerts": [],
26170+
"advisories": [
26171+
{
26172+
"label": "Advisories",
26173+
"url": "https://www.toreon.com/news/"
26174+
}
26175+
]
26176+
},
26177+
"resources": [],
26178+
"CNA": {
26179+
"isRoot": false,
26180+
"root": {
26181+
"shortName": "n/a",
26182+
"organizationName": "n/a"
26183+
},
26184+
"roles": [
26185+
{
26186+
"helpText": "",
26187+
"role": "CNA"
26188+
}
26189+
],
26190+
"TLR": {
26191+
"shortName": "mitre",
26192+
"organizationName": "MITRE Corporation"
26193+
},
26194+
"type": [
26195+
"Researcher"
26196+
]
26197+
},
26198+
"country": "Belgium"
2614326199
}
2614426200
]

src/assets/data/NotificationBanner.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@
1818
},
1919
{
2020
"contentType": "paragraph",
21-
"content": "is now available in the search box above. Text searches may include CVE IDs (e.g., “CVE-2025-1234”), CWE-IDs (e.g., “CWE-123”), exact version strings (e.g., “6.17.4”), exact IPv4 strings, file names, URLs, combinations of search terms (e.g., “apache cwe-502 cve-2025”), and"
21+
"content": "is now available in the search box above. Learn more"
2222
},
2323
{
2424
"contentType": "internalLink",
2525
"link": "/Media/News/item/blog/2025/06/11/CVE-List-Keyword-Search-Updated",
26-
"linkText": "more"
26+
"linkText": "here"
2727
},
2828
{
2929
"contentType": "paragraph",

src/assets/data/faqs.json

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,14 @@
271271
"questionId": "search_cve",
272272
"questionText": "How do I search the CVE List",
273273
"questionResponseParagraphs": [
274-
"You may search using:<br/><ul><li><strong>IDs</strong><ul><li>CVE ID<ul><li>Specific <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE ID</a> (e.g., “CVE-2015-8405”)</li><li>Note that this returns records where there is a match for the CVE ID anywhere in the CVE Record (e.g., “CVE-2015-8405” returns the CVE named, as well as any CVEs that have that CVE ID in other fields, such as in the description)</li><li>The nominal CVE ID Year (e.g., “CVE-2025” returns all CVEs reserved in the CVE-2025 year series)</li><li>The year must be a full year (e.g., “CVE-202” is invalid and will produce no results)</li></ul></li><li>CWE ID<ul><li>Specific <a href='/About/RelatedEfforts#CWE'>Common Weakness Enumeration (CWE&trade;)</a> entries (e.g., “CWE-123”)</li></ul></li><li> CAPEC ID<ul><li>Specific <a href='/About/RelatedEfforts#CAPEC'>Common Attack Pattern Enumerations and Classification (CAPEC&trade;)</a> entries (e.g., “CAPEC-123”)</li></ul></li></ul></li><li><strong>General</strong><ul><li>All CVE Record fields are searched when using the search box on CVE.ORG. However, if the search comprises more than one keyword, all keywords must be present in a given field for the record to be returned</li><li>Note that if you provide multiple CVE IDs, the search will only return results that contain ALL CVE IDs you specify in each record, which may not be what you expect</li><li>Search terms are case-insensitive and may contain words of alphanumeric and Unicode characters</li><li>Supported search scenarios include:<ul><li>Hyphenated words (e.g., “man-in-the-middle”)</li><li>Exact version strings (e.g., “6.17.4”)<li>Exact IPv4 strings (e.g., “127.0.0.1”)</li><li>Exact filenames (e.g., “main.cpp”)</li><li>URLs (e.g., “http://www.ibm.com/support/docview.wss?uid”)</li><li>Combination of any of the above: by separating terms with a space you can search for CVEs that contain ALL of the specified search terms (e.g., “apache cwe-502 cve-2025” will return all CVEs each of which containing all 3 terms)</li></ul></li><li>Symbols currently not supported are:\u00a0\u00a0\u00a0() {} [] \" ' ` &lt;&gt; | ; ! ~ ^ * + %</li></ul></li></ul>"
274+
"You may search using:<br/><ul><li><strong>IDs</strong><ul><li>CVE ID<ul><li>Specific <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE ID</a> (e.g., “CVE-2015-8405”)</li><li>Note that this returns records where there is a match for the CVE ID anywhere in the CVE Record (e.g., “CVE-2015-8405” returns the CVE named, as well as any CVEs that have that CVE ID in other fields, such as in the description)</li><li>The nominal CVE ID Year (e.g., “CVE-2025” returns all CVEs reserved in the CVE-2025 year series)</li><li>The year must be a full year (e.g., “CVE-202” is invalid and will produce no results)</li></ul></li><li>CWE ID<ul><li>Specific <a href='/About/RelatedEfforts#CWE'>Common Weakness Enumeration (CWE&trade;)</a> entries (e.g., “CWE-123”)</li></ul></li><li> CAPEC ID<ul><li>Specific <a href='/About/RelatedEfforts#CAPEC'>Common Attack Pattern Enumerations and Classification (CAPEC&trade;)</a> entries (e.g., “CAPEC-123”)</li></ul></li></ul></li><li><strong>General</strong><ul><li>Note that if you provide multiple CVE IDs, the search will only return results that contain ALL CVE IDs you specify in each record, which may not be what you expect</li><li>Search terms are case-insensitive and may contain words of alphanumeric and Unicode characters</li><li>Supported search scenarios include:<ul><li>Hyphenated words (e.g., “man-in-the-middle”)</li><li>Exact version strings (e.g., “6.17.4”)<li>Exact IPv4 strings (e.g., “127.0.0.1”)</li><li>Exact filenames (e.g., “main.cpp”)</li><li>URLs (e.g., “http://www.ibm.com/support/docview.wss?uid”)</li></ul></li><li>Symbols currently not supported are:\u00a0\u00a0\u00a0() {} [] \" ' ` &lt;&gt; | ; ! ~ ^ * + %</li></ul></li></ul>"
275+
]
276+
},
277+
{
278+
"questionId": "search_cve_and",
279+
"questionText": "In the search box on CVE.ORG, what CVE Record fields are searched",
280+
"questionResponseParagraphs": [
281+
"All CVE Record fields are searched when using the search box on CVE.ORG. However, if the search comprises more than one keyword, all keywords must be present in a given field for the record to be returned."
275282
]
276283
},
277284
{

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1149,7 +1149,7 @@
11491149
},
11501150
{
11511151
"month": "June",
1152-
"value": "3"
1152+
"value": "4"
11531153
},
11541154
{
11551155
"month": "July",

src/assets/data/news.json

Lines changed: 74 additions & 2 deletions
Large diffs are not rendered by default.

src/views/ResourcesSupport/Resources.vue

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
</li>
5757
<li>
5858
<router-link to="/Resources/General/End-of-Life-EOL-Assignment-Process.pdf" target="_blank">
59-
End-of-Life (EOL) Assignment Policy (PDF, 0.3MB)
59+
End-of-Life (EOL) Assignment Process (PDF, 0.3MB)
6060
</router-link>
6161
<br/><span class="cve-help-text">Establishes the policy for the EOL CVE assignment process</span>
6262
</li>
@@ -135,7 +135,7 @@
135135
</li>
136136
<li>
137137
<router-link to="/Resources/General/End-of-Life-EOL-Assignment-Process.pdf" target="_blank">
138-
End-of-Life (EOL) Assignment Policy (PDF, 0.3MB)
138+
End-of-Life (EOL) Assignment Process (PDF, 0.3MB)
139139
</router-link>
140140
</li>
141141
<li>

0 commit comments

Comments
 (0)