Skip to content

Commit 3b447f0

Browse files
authored
Merge pull request #3559 from CVEProject/int
5/13/25 Release: INT to MAIN
2 parents 5d80aea + fde7eb5 commit 3b447f0

5 files changed

Lines changed: 277 additions & 4 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 172 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12909,7 +12909,7 @@
1290912909
"email": [
1291012910
{
1291112911
"label": "Email",
12912-
"emailAddr": "cve-full@somosafull.com.br"
12912+
"emailAddr": "contato@full.services"
1291312913
}
1291412914
],
1291512915
"contact": [],
@@ -24510,7 +24510,7 @@
2451024510
{
2451124511
"label": "Policy",
2451224512
"language": "",
24513-
"url": "https://docs.imanage.com/security/Vulnerability_Disclosure_Policy.html"
24513+
"url": "https://imanage.com/about/vulnerability-report/"
2451424514
}
2451524515
],
2451624516
"securityAdvisories": {
@@ -26073,5 +26073,175 @@
2607326073
]
2607426074
},
2607526075
"country": "USA"
26076+
},
26077+
{
26078+
"shortName": "EEF",
26079+
"cnaID": "CNA-2025-0023",
26080+
"organizationName": "Erlang Ecosystem Foundation",
26081+
"scope": "Vulnerabilities in active packages hosted on <a href='https://hex.pm/' target='_blank'>Hex.pm</a>, and in active projects hosted under the GitHub organizations <a href='https://github.com/elixir-lang' target='_blank'>@elixir-lang</a>, <a href='https://github.com/erlang' target='_blank'>@erlang</a>, <a href='https://github.com/erlef-cna' target='_blank'>@erlef-cna</a>, <a href='https://github.com/erlef' target='_blank'>@erlef</a>, <a href='https://github.com/gleam-lang' target='_blank'>@gleam-lang</a>, and <a href='https://github.com/hexpm' target='_blank'>@hexpm</a>, unless covered by the scope of another CNA.",
26082+
"contact": [
26083+
{
26084+
"email": [
26085+
{
26086+
"label": "Email",
26087+
"emailAddr": "cna@erlef.org"
26088+
}
26089+
],
26090+
"contact": [],
26091+
"form": []
26092+
}
26093+
],
26094+
"disclosurePolicy": [
26095+
{
26096+
"label": "Policy",
26097+
"language": "",
26098+
"url": "https://cna.erlef.org/security-policy"
26099+
}
26100+
],
26101+
"securityAdvisories": {
26102+
"alerts": [],
26103+
"advisories": [
26104+
{
26105+
"label": "Advisories",
26106+
"url": "https://cna.erlef.org/cves"
26107+
}
26108+
]
26109+
},
26110+
"resources": [],
26111+
"CNA": {
26112+
"isRoot": false,
26113+
"root": {
26114+
"shortName": "n/a",
26115+
"organizationName": "n/a"
26116+
},
26117+
"roles": [
26118+
{
26119+
"helpText": "",
26120+
"role": "CNA"
26121+
}
26122+
],
26123+
"TLR": {
26124+
"shortName": "mitre",
26125+
"organizationName": "MITRE Corporation"
26126+
},
26127+
"type": [
26128+
"Consortium",
26129+
"Open Source"
26130+
]
26131+
},
26132+
"country": "USA"
26133+
},
26134+
{
26135+
"shortName": "SCHUTZWERK",
26136+
"cnaID": "CNA-2025-0024",
26137+
"organizationName": "SCHUTZWERK GmbH",
26138+
"scope": "Vulnerabilities discovered by, reported to, or coordinated by, SCHUTZWERK unless covered by another CNA.",
26139+
"contact": [
26140+
{
26141+
"email": [
26142+
{
26143+
"label": "Email",
26144+
"emailAddr": "advisories@schutzwerk.com"
26145+
}
26146+
],
26147+
"contact": [],
26148+
"form": []
26149+
}
26150+
],
26151+
"disclosurePolicy": [
26152+
{
26153+
"label": "Policy",
26154+
"language": "",
26155+
"url": "https://www.schutzwerk.com/en/advisories/"
26156+
}
26157+
],
26158+
"securityAdvisories": {
26159+
"alerts": [],
26160+
"advisories": [
26161+
{
26162+
"label": "Advisories",
26163+
"url": "https://www.schutzwerk.com/blog/tags/advisories/"
26164+
}
26165+
]
26166+
},
26167+
"resources": [],
26168+
"CNA": {
26169+
"isRoot": false,
26170+
"root": {
26171+
"shortName": "n/a",
26172+
"organizationName": "n/a"
26173+
},
26174+
"roles": [
26175+
{
26176+
"helpText": "",
26177+
"role": "CNA"
26178+
}
26179+
],
26180+
"TLR": {
26181+
"shortName": "mitre",
26182+
"organizationName": "MITRE Corporation"
26183+
},
26184+
"type": [
26185+
"Researcher"
26186+
]
26187+
},
26188+
"country": "Germany"
26189+
},
26190+
{
26191+
"shortName": "Stackable",
26192+
"cnaID": "CNA-2025-0025",
26193+
"organizationName": "Stackable GmbH",
26194+
"scope": "Vulnerabilities in Stackable products including end-of-life or unsupported Stackable software, as well as open source projects that are not in another CNA’s scope.",
26195+
"contact": [
26196+
{
26197+
"email": [
26198+
{
26199+
"label": "Email",
26200+
"emailAddr": "cve-coordination@stackable.tech"
26201+
}
26202+
],
26203+
"contact": [],
26204+
"form": []
26205+
}
26206+
],
26207+
"disclosurePolicy": [
26208+
{
26209+
"label": "Policy",
26210+
"language": "",
26211+
"url": "https://stackable.tech/en/vulnerability-disclosure-policy/"
26212+
}
26213+
],
26214+
"securityAdvisories": {
26215+
"alerts": [],
26216+
"advisories": [
26217+
{
26218+
"label": "Advisories",
26219+
"url": "https://advisories.stackable.tech/"
26220+
}
26221+
]
26222+
},
26223+
"resources": [],
26224+
"CNA": {
26225+
"isRoot": false,
26226+
"root": {
26227+
"shortName": "n/a",
26228+
"organizationName": "n/a"
26229+
},
26230+
"roles": [
26231+
{
26232+
"helpText": "",
26233+
"role": "CNA"
26234+
}
26235+
],
26236+
"TLR": {
26237+
"shortName": "mitre",
26238+
"organizationName": "MITRE Corporation"
26239+
},
26240+
"type": [
26241+
"Vendor",
26242+
"Open Source"
26243+
]
26244+
},
26245+
"country": "Germany"
2607626246
}
2607726247
]

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1145,7 +1145,7 @@
11451145
},
11461146
{
11471147
"month": "May",
1148-
"value": "TBA"
1148+
"value": "3"
11491149
},
11501150
{
11511151
"month": "June",

src/assets/data/news.json

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,89 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 519,
5+
"newsType": "news",
6+
"title": "CNA Operational Rules Updated to Version 4.1.0",
7+
"urlKeywords": "CNA Rules Updated to Version 4 1 0",
8+
"date": "2025-05-13",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "“<a href='/Resources/Roles/Cnas/CNA_Rules_v4.1.0.pdf' target='_blank'>CNA Operational Rules Version 4.1.0</a>” was approved by the <a href='/ProgramOrganization/Board'>CVE Board</a> on May 14, 2025, and is effective as of May 14, 2025. <a href='/Resources/Roles/Cnas/CNA_Rules_v4.1.0.pdf' target='_blank'>CNA Rules v4.1.0</a>, which has no breaking changes and was updated to improve the clarity of requirements throughout the document, is available now as a <a href='/Resources/Roles/Cnas/CNA_Rules_v4.1.0.pdf' target='_blank'>PDF</a> (0.2MB)."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "Non-breaking changes for CNA Rules v4.1.0 include: <ul><li>Improved clarity regarding end-of-life (EOL) assignments</li><li>Enhanced information about the year portion of the CVE ID</li><li>Updated requirements for references</li><li>Grammar fixes and other improvements throughout the document</li></ul>"
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "The <a href='/ResourcesSupport/AllResources/CNARules'>CNA Rules web page</a> on the CVE website will be updated to the new version soon."
21+
}
22+
]
23+
},
24+
{
25+
"id": 518,
26+
"newsType": "news",
27+
"title": "Stackable Added as CVE Numbering Authority (CNA)",
28+
"urlKeywords": "Stackable Added as CNA",
29+
"date": "2025-05-13",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "<a href='/PartnerInformation/ListofPartners/partner/Stackable'>Stackable GmbH</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in Stackable products including end-of-life or unsupported Stackable software, as well as open source projects that are not in another CNA’s scope."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>456 CNAs</a> (453 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Stackable is the 23rd CNA from Germany."
38+
},
39+
{
40+
"contentnewsType": "paragraph",
41+
"content": "Stackable’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
42+
}
43+
]
44+
},
45+
{
46+
"id": 517,
47+
"newsType": "news",
48+
"title": "SCHUTZWERK Added as CVE Numbering Authority (CNA)",
49+
"urlKeywords": "SCHUTZWERK Added as CNA",
50+
"date": "2025-05-13",
51+
"description": [
52+
{
53+
"contentnewsType": "paragraph",
54+
"content": "<a href='/PartnerInformation/ListofPartners/partner/SCHUTZWERK'>SCHUTZWERK GmbH</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities discovered by, reported to, or coordinated by, SCHUTZWERK unless covered by another CNA."
55+
},
56+
{
57+
"contentnewsType": "paragraph",
58+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>455 CNAs</a> (452 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. SCHUTZWERK is the 22nd CNA from Germany."
59+
},
60+
{
61+
"contentnewsType": "paragraph",
62+
"content": "SCHUTZWERK’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
63+
}
64+
]
65+
},
66+
{
67+
"id": 516,
68+
"newsType": "news",
69+
"title": "Erlang Ecosystem Foundation Added as CVE Numbering Authority (CNA)",
70+
"urlKeywords": "Erlang Ecosystem Foundation Added as CNA",
71+
"date": "2025-05-13",
72+
"description": [
73+
{
74+
"contentnewsType": "paragraph",
75+
"content": "<a href='/PartnerInformation/ListofPartners/partner/EEF'>Erlang Ecosystem Foundation</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in active packages hosted on <a href='https://hex.pm/' target='_blank'>Hex.pm</a>, and in active projects hosted under the GitHub organizations <a href='https://github.com/elixir-lang' target='_blank'>@elixir-lang</a>, <a href='https://github.com/erlang' target='_blank'>@erlang</a>, <a href='https://github.com/erlef-cna' target='_blank'>@erlef-cna</a>, <a href='https://github.com/erlef' target='_blank'>@erlef</a>, <a href='https://github.com/gleam-lang' target='_blank'>@gleam-lang</a>, and <a href='https://github.com/hexpm' target='_blank'>@hexpm</a>, unless covered by the scope of another CNA."
76+
},
77+
{
78+
"contentnewsType": "paragraph",
79+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>454 CNAs</a> (451 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Erlang Ecosystem Foundation is the 245th CNA from USA."
80+
},
81+
{
82+
"contentnewsType": "paragraph",
83+
"content": "Erlang Ecosystem Foundation’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
84+
}
85+
]
86+
},
387
{
488
"id": 515,
589
"newsType": "blog",

src/views/ResourcesSupport/AllResources/CNARules.vue

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,25 @@
77
<div class="column is-8-desktop cve-main-column-content-width is-12-tablet">
88
<main id="cve-main-page-content" role="main">
99
<h1 class="title">CVE Numbering Authority (CNA) Operational Rules</h1>
10+
<div role="alert" class="notification is-warning is-light">
11+
<div class="is-flex">
12+
<p id="alertIconCnaRules" class="is-hidden">alert</p>
13+
<font-awesome-icon style="flex: 0 0 40px;" size="1x" icon="exclamation-triangle" role="alert"
14+
aria-labelledby="alertIconCnaRules" aria-hidden="false" />
15+
<div>
16+
<p>
17+
“CNA Operational Rules Version 4.1.0” was approved by the
18+
<a href='/ProgramOrganization/Board'>CVE Board</a>
19+
on May 14, 2025, and is effective as of May 14, 2025. The web page below will be updated soon to the new version.
20+
</p>
21+
<p>
22+
<a href='/Resources/Roles/Cnas/CNA_Rules_v4.1.0.pdf' target='_blank'>CNA Rules v4.1.0</a>
23+
is available now as a
24+
<a href='/Resources/Roles/Cnas/CNA_Rules_v4.1.0.pdf' target='_blank'>PDF</a> (0.2MB).
25+
</p>
26+
</div>
27+
</div>
28+
</div>
1029
<div id="cve-versionInformation">
1130
<p class="has-text-weight-bold">
1231
Document Version: <span>{{ versionNum }}</span>

src/views/ResourcesSupport/Resources.vue

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@
125125
<ul class="mt-0 tile-body cve-task-tile-list">
126126
<li>
127127
<router-link to="/ResourcesSupport/AllResources/CNARules" target="_blank">
128-
CVE Numbering Authority (CNA) Rules, Version 4.0
128+
CVE Numbering Authority (CNA) Rules
129129
</router-link>
130130
</li>
131131
<li>

0 commit comments

Comments
 (0)