Skip to content

Commit 3376ecf

Browse files
authored
Merge pull request #3566 from CVEProject/int
5/20/25 Release: INT to MAIN
2 parents 3b447f0 + e706904 commit 3376ecf

9 files changed

Lines changed: 224 additions & 55 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 64 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2423,7 +2423,7 @@
24232423
"shortName": "Esri",
24242424
"cnaID": "CNA-2021-0011",
24252425
"organizationName": "Environmental Systems Research Institute, Inc.",
2426-
"scope": "All Esri products only.",
2426+
"scope": "All Esri products only, including ArcGIS.",
24272427
"contact": [
24282428
{
24292429
"email": [
@@ -19141,16 +19141,16 @@
1914119141
"country": "Austria"
1914219142
},
1914319143
{
19144-
"shortName": "OTORIO",
19144+
"shortName": "Armis",
1914519145
"cnaID": "CNA-2023-0074",
19146-
"organizationName": "OTORIO LTD.",
19147-
"scope": "All OTORIO products, as well as vulnerabilities in third-party software discovered by OTORIO that are not in another CNA’s scope.",
19146+
"organizationName": "Armis, Inc.",
19147+
"scope": "All Armis products, as well as vulnerabilities in third-party software discovered by Armis that are not in another CNA’s scope.",
1914819148
"contact": [
1914919149
{
1915019150
"email": [
1915119151
{
1915219152
"label": "Email",
19153-
"emailAddr": "productcert@otorio.com"
19153+
"emailAddr": "security@armis.com"
1915419154
}
1915519155
],
1915619156
"contact": [],
@@ -19161,15 +19161,15 @@
1916119161
{
1916219162
"label": "Policy",
1916319163
"language": "",
19164-
"url": "https://www.otorio.com/vulnerability-disclosure-policy/"
19164+
"url": "https://www.armis.com/legal-compliance/vulnerability-disclosure-policy/"
1916519165
}
1916619166
],
1916719167
"securityAdvisories": {
1916819168
"alerts": [],
1916919169
"advisories": [
1917019170
{
1917119171
"label": "Advisories",
19172-
"url": "https://www.otorio.com/vulnerability-disclosure/"
19172+
"url": "https://www.armis.com/legal-compliance/security-advisories/"
1917319173
}
1917419174
]
1917519175
},
@@ -19195,7 +19195,7 @@
1919519195
"Researcher"
1919619196
]
1919719197
},
19198-
"country": "Israel"
19198+
"country": "USA"
1919919199
},
1920019200
{
1920119201
"shortName": "SmileDigitalHealth",
@@ -26243,5 +26243,61 @@
2624326243
]
2624426244
},
2624526245
"country": "Germany"
26246+
},
26247+
{
26248+
"shortName": "ExtremeNetworks",
26249+
"cnaID": "CNA-2025-0026",
26250+
"organizationName": "Extreme Networks, Inc.",
26251+
"scope": "Vulnerabilities discovered in Extreme Networks, Inc.’s products and services.",
26252+
"contact": [
26253+
{
26254+
"email": [
26255+
{
26256+
"label": "Email",
26257+
"emailAddr": "psirt@extremenetworks.com"
26258+
}
26259+
],
26260+
"contact": [],
26261+
"form": []
26262+
}
26263+
],
26264+
"disclosurePolicy": [
26265+
{
26266+
"label": "Policy",
26267+
"language": "",
26268+
"url": "https://www.extremenetworks.com/support/psirt"
26269+
}
26270+
],
26271+
"securityAdvisories": {
26272+
"alerts": [],
26273+
"advisories": [
26274+
{
26275+
"label": "Advisories",
26276+
"url": "https://extreme-networks.my.site.com/ExtrSearch#q=cve&t=Knowledge&sort=relevancy&f:@sfrecordtypename=[Security_Advisory]"
26277+
}
26278+
]
26279+
},
26280+
"resources": [],
26281+
"CNA": {
26282+
"isRoot": false,
26283+
"root": {
26284+
"shortName": "n/a",
26285+
"organizationName": "n/a"
26286+
},
26287+
"roles": [
26288+
{
26289+
"helpText": "",
26290+
"role": "CNA"
26291+
}
26292+
],
26293+
"TLR": {
26294+
"shortName": "mitre",
26295+
"organizationName": "MITRE Corporation"
26296+
},
26297+
"type": [
26298+
"Vendor"
26299+
]
26300+
},
26301+
"country": "USA"
2624626302
}
2624726303
]

src/assets/data/cnaRules.json

Lines changed: 23 additions & 18 deletions
Large diffs are not rendered by default.

src/assets/data/events.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,15 +46,15 @@
4646
"id": 32,
4747
"title": "Vulnerability Conference and Events Working Group (VCEWG)",
4848
"location": "Virtual",
49-
"description": "Focused on planning and managing collaborative events, such as workshops and conferences, especially the annual “VulnCon” conferences co-hosted by the CVE Program and FIRST.",
49+
"description": "Focused on planning and managing collaborative events, especially the annual “VulnCon” (spring) conferences co-hosted by the CVE Program and FIRST and the “CVE Program Workshops” (autumn) for CNAs.<br/><br/>Meetings are scheduled as needed in the lead up to events.",
5050
"permission": "private",
5151
"url": "/ProgramOrganization/WorkingGroups#VulnerabilityConferenceandEventsWorkingGroupVCEWG",
5252
"date": {
5353
"start": "2025-01-01",
5454
"end": "2025-12-31",
5555
"repeat": {
56-
"day": "Tuesday",
57-
"recurrence": "weekly"
56+
"day": "As Needed",
57+
"recurrence": ""
5858
}
5959
}
6060
},

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1145,7 +1145,7 @@
11451145
},
11461146
{
11471147
"month": "May",
1148-
"value": "3"
1148+
"value": "4"
11491149
},
11501150
{
11511151
"month": "June",

src/assets/data/news.json

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,102 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 523,
5+
"displayOnHomepageOrder": 1,
6+
"newsType": "blog",
7+
"title": "“CNA Rules v4.1.0” Now in Effect",
8+
"urlKeywords": "“CNA Rules v4 1 0 in Effect",
9+
"date": "2025-05-20",
10+
"author": {
11+
"name": "CVE Program",
12+
"organization": {
13+
"name": "CVE Program",
14+
"url": ""
15+
},
16+
"title": "",
17+
"bio": ""
18+
},
19+
"description": [
20+
{
21+
"contentnewsType": "paragraph",
22+
"content": "The <a href='/ResourcesSupport/AllResources/CNARules'>CVE Numbering Authority (CNA) Operational Rules Version 4.1.0</a> took effect on May 14, 2025. The previous version, <a href='/Resources/Roles/Cnas/CNA_Rules_v4.0.pdf' target='_blank'>CNA Rules v4.0</a>, has been deprecated. CNAs are now required to comply with the <a href='/ResourcesSupport/AllResources/CNARules'>CNA Rules v4.1.0</a>."
23+
},
24+
{
25+
"contentnewsType": "paragraph",
26+
"content": "CNA Rules v4.1.0, which has no breaking changes and was updated to improve the clarity of the rules, was approved by the <a href='/ProgramOrganization/Board'>CVE Board</a> on May 14, 2025. A <a href='https://github.com/CVEProject/cve-documents/compare/7cc0028...2fbfcdc#diff-74734f54797ef9d6cd30e3ad39f5c3b50c71a10c0f4cb94eb5bb289bebf5fe85' target='_blank'>detailed report</a> is available on GitHub that lists all changes between Version 4.0 and Version 4.1.0."
27+
},
28+
{
29+
"contentnewsType": "paragraph",
30+
"content": "Non-breaking changes for CNA Rules v4.1.0 include, but are not limited to, the following:"
31+
},
32+
{
33+
"contentnewsType": "paragraph",
34+
"content": "<ul><li><strong>Improved clarity regarding end-of-life (EOL) assignments</strong><ul><li>Added a new section: “4.1.13 The state of a Product being EOL, by itself, MUST NOT be determined to be a Vulnerability.”</li><li>Renumbered sections 4.1.13 and 4.1.14 to 4.1.14 and 4.1.15</li><li>Added a new section: “4.2.17.7 CNAs MUST NOT assign CVE IDs for the sole reason that a Product is or has become EOL. See 4.1.13.”</li><li>Added a new section: “4.2.17.8 If a CNA assigns a CVE ID for a Vulnerability in a supported Product or version, and the same Vulnerability exists in an EOL Product or version, CNAs MUST NOT assign a separate CVE ID for the same Vulnerability in the EOL Product or version. Similar to 4.2.15, there is only one Vulnerability which MUST have one CVE ID.”</li></ul></li><li><strong>Enhanced information about the year portion of the CVE ID</strong><ul><li>Added a new section: “4.2.21 CNAs SHOULD assign the year part of a CVE ID based on the calendar year in which the vulnerability was first Publicly Disclosed, the CVE Record was first published, or the CVE ID was reserved for the vulnerability in question. CNAs MUST NOT, based on this rule, change CVE IDs that have already been published. CNAs MAY assign CVE IDs in one calendar year and publish the corresponding CVE Record in the next calendar year.”</li></ul></li><li><strong>Updated requirements for references</strong><ul><li>Updated an existing section to clearly state that the CVE Record must not be used as its own reference: “5.1.10 MUST contain at least one public reference (see 5.3) that MUST NOT be a reference to the CVE Record itself.”</li></ul></li><li><strong>Grammar fixes and other improvements throughout the document</strong></li></ul>"
35+
},
36+
{
37+
"contentnewsType": "paragraph",
38+
"content": "The CNA Rules v4.1.0 is available now on the CVE website as a <a href='/Resources/Roles/Cnas/CNA_Rules_v4.1.0.pdf' target='_blank'>PDF</a> (0.2MB) and on the <a href='/ResourcesSupport/AllResources/CNARules'>CNA Rules web page</a>."
39+
}
40+
]
41+
},
42+
{
43+
"id": 522,
44+
"newsType": "news",
45+
"title": "Extreme Networks, Inc. Added as CVE Numbering Authority (CNA)",
46+
"urlKeywords": "Extreme Networks Added as CNA",
47+
"date": "2025-05-20",
48+
"description": [
49+
{
50+
"contentnewsType": "paragraph",
51+
"content": "<a href='/PartnerInformation/ListofPartners/partner/ExtremeNetworks'>Extreme Networks, Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities discovered in Extreme Networks, Inc.’s products and services."
52+
},
53+
{
54+
"contentnewsType": "paragraph",
55+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>457 CNAs</a> (454 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Extreme Networks, Inc. is the 247th CNA from USA."
56+
},
57+
{
58+
"contentnewsType": "paragraph",
59+
"content": "Extreme Networks, Inc.’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
60+
}
61+
]
62+
},
63+
{
64+
"id": 521,
65+
"newsType": "news",
66+
"title": "Minutes from CVE Board Teleconference Meeting on April 30 Now Available",
67+
"urlKeywords": "CVE Board Minutes from April 30",
68+
"date": "2025-05-20",
69+
"description": [
70+
{
71+
"contentnewsType": "paragraph",
72+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on April 30, 2025. Read the <a href='https://cve.mitre.org/community/board/meeting_summaries/30_April_2025.pdf' target='_blank'>meeting minutes summary</a>."
73+
},
74+
{
75+
"contentnewsType": "paragraph",
76+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
77+
}
78+
]
79+
},
80+
{
81+
"id": 520,
82+
"newsType": "news",
83+
"title": "Minutes from CVE Board Teleconference Meeting on April 16 Now Available",
84+
"urlKeywords": "CVE Board Minutes from April 16",
85+
"date": "2025-05-20",
86+
"description": [
87+
{
88+
"contentnewsType": "paragraph",
89+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on April 16, 2025. Read the <a href='https://cve.mitre.org/community/board/meeting_summaries/16_April_2025.pdf' target='_blank'>meeting minutes summary</a>."
90+
},
91+
{
92+
"contentnewsType": "paragraph",
93+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
94+
}
95+
]
96+
},
397
{
498
"id": 519,
99+
"displayOnHomepageOrder": 0,
5100
"newsType": "news",
6101
"title": "CNA Operational Rules Updated to Version 4.1.0",
7102
"urlKeywords": "CNA Rules Updated to Version 4 1 0",

src/components/HomeModule.vue

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -164,17 +164,6 @@
164164
</div>
165165
</section>
166166
<SurveyLinkComponent/>
167-
<p class="cve-help-text is-centered has-text-centered mt-2">
168-
Some of the links will take you back to the
169-
<span>
170-
<a href="https://cve.mitre.org/" target="_blank">original CVE website
171-
<span class="icon cve-icon-xxs">
172-
<p id="extenalLinkOrignalCveWebsite" class="is-hidden">external site</p>
173-
<font-awesome-icon icon="external-link-alt" aria-labelledby="extenalLinkOrignalCveWebsite"/>
174-
</span>
175-
</a>
176-
</span>.
177-
</p>
178167
<span class="is-centered has-text-centered"><ExternalLinkMessage/></span>
179168
</div>
180169
<HomePageSidebarModule/>

src/views/Home.vue

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
<font-awesome-icon style="flex: 0 0 40px;" size="1x" icon="triangle-exclamation" role="img"
2424
aria-labelledby="alertIconCveRecordsRequestErrored" aria-hidden="false" />
2525
<p>
26-
Total count of CVE records is currently unavailable. Please
26+
Total count of CVE Records is currently unavailable. Please
2727
<span class="icon-text">
2828
<a href="https://cveform.mitre.org/" target="_blank">report the issue
2929
<span class="icon is-size-7 cve-icon-xxs">
@@ -83,7 +83,7 @@ export default {
8383
if ((typeof count === 'number') && !Number.isNaN(count)) {
8484
this.cveRecordsRequestErrored = false;
8585
86-
// As of March 2025, we're reporting the CVE record count rounded
86+
// As of March 2025, were reporting the CVE Record count rounded
8787
// to the next lowest thousand, and reporting it as "over xxx"
8888
// thousand records (a la McDonald's), instead of the actual count.
8989

src/views/ProgramOrganization/WorkingGroups.vue

Lines changed: 27 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,9 @@
4848
<h2 :id="cvenavs['Program Organization']['submenu']['Working Groups']['items']['Automation Working Group (AWG)']['anchorId']"
4949
class="title">
5050
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Automation Working Group (AWG)']['label']}}</h2>
51+
<p>
52+
Co-Chairs: Kris Britton and Martin Prpič
53+
</p>
5154
<p>
5255
The AWG is focused on identifying and advancing proposals for the collaborative design, development, and deployment of
5356
automated capabilities that support the efficient management of the CVE Program.
@@ -99,6 +102,9 @@
99102
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['CNA Organization of Peers (COOP)']['label']}}
100103
</h2>
101104
<p id="CNACoordinationWorkingGroupCNACWG"></p>
105+
<p>
106+
Co-Chairs: Tod Beardsley and MegaZone
107+
</p>
102108
<p>
103109
The COOP (pronounced Co-Op) is focused on providing a forum for more effective communication and participation by the CVE Numbering
104110
Authorities (CNAs).
@@ -142,6 +148,9 @@
142148
class="title">
143149
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['CVE Artificial Intelligence Working Group (CVEAI WG)']
144150
['label']}}</h2>
151+
<p>
152+
Chair: Erick Galinkin
153+
</p>
145154
<p>
146155
The CVEAI WG is focused on defining swim lanes for AI vulnerability disclosure within CVE. This WG will discuss the concerns
147156
in defining what is within the responsibilities of the CVE Program. Because not all AI issues are appropriate for a CVE assignment,
@@ -184,6 +193,9 @@
184193
['anchorId']" class="title">
185194
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Outreach and Communications Working Group (OCWG)']['label']}}
186195
</h2>
196+
<p>
197+
Co-Chairs: Robert Roberge and Shannon Sabens
198+
</p>
187199
<p>
188200
The OCWG is focused on promoting the CVE Program to achieve program adoption and coverage goals through increased community awareness.
189201
</p>
@@ -226,6 +238,9 @@
226238
class="title">
227239
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Quality Working Group (QWG)']['label']}}
228240
</h2>
241+
<p>
242+
Co-Chairs: Chris Coffin, MegaZone, and Dave Waltermire
243+
</p>
229244
<p>
230245
The QWG is focused on identifying areas where CVE content, rules, guidelines, and best practices must improve to
231246
better support stakeholder use cases.
@@ -271,6 +286,9 @@
271286
class="title">
272287
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Strategic Planning Working Group (SPWG)']['label']}}
273288
</h2>
289+
<p>
290+
Chair: Kent Landfield
291+
</p>
274292
<p>
275293
The SPWG is focused on the long-term strategy (1-5 years) and goals of the CVE Program; will work closely with the
276294
<router-link to="/ProgramOrganization/Board">CVE Board</router-link> to determine goals and objectives and will act to achieve them.
@@ -313,6 +331,9 @@
313331
class="title">
314332
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Tactical Working Group (TWG)']['label']}}
315333
</h2>
334+
<p>
335+
Co-Chairs: Lisa Olson and Alec Summers
336+
</p>
316337
<p>
317338
The TWG is focused on managing, coordinating, and expediting CVE Program activities, communications, and processes for the benefit of
318339
program stakeholders.
@@ -356,10 +377,11 @@
356377
['label']}}
357378
</h2>
358379
<p>
359-
The VCEWG was created to provide a forum for conference planning, especially the annual “VulnCon” conferences co-hosted by the CVE
360-
Program and FIRST that began in 2024, the purpose of which is to “collaborate with various vulnerability management and
361-
cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit
362-
the vulnerability management ecosystem.”
380+
Co-Chairs: Pete Allor and MegaZone
381+
</p>
382+
<p>
383+
The VCEWG provides a forum for program event planning, especially the annual “VulnCon” conferences (spring) co-hosted by the CVE
384+
Program and FIRST and the “CVE Program Workshops” (autumn) for CNAs. Meetings are scheduled as needed in the lead up to events.
363385
</p>
364386
<p>
365387
<span class="has-text-weight-bold">Membership Eligibility:</span> Per the VCEWG Charter, “Any active CVE-authorized program member
@@ -437,7 +459,7 @@
437459
</tr>
438460
<tr>
439461
<td data-label="Working Group" style="width: 55%">Vulnerability Conference and Events Working Group (VCEWG)</td>
440-
<td data-label="Meeting Time">Every Tuesday 1:10pm ET</td>
462+
<td data-label="Meeting Time">As needed for annual VulnCon conferences (spring) and CVE Program Workshops (autumn)</td>
441463
</tr>
442464
</tbody>
443465
</table>

0 commit comments

Comments
 (0)