Skip to content

Commit 629d6cd

Browse files
committed
merge CNA Rules changes from dev
2 parents 22ef328 + 7323edd commit 629d6cd

14 files changed

Lines changed: 61 additions & 38 deletions

File tree

src/assets/data/boardCharter.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
},
1414
{"subSectionId": "member_backgrounds",
1515
"subSectionTitle": "Board Member Backgrounds",
16-
"subSectionParagraphs": ["Board members are not limited to but traditionally fit into one or more of the following categories:<ul><li><b>Technical Implementers</b> provide input and guidance regarding the creation, design, review, maintenance, and applications of CVE List entries (<a href='/ResourcesSupport/FAQs#pc_cve_recordswhat_is_cve_record' target='_blank'>CVE Entries</a>). This may include individuals who integrate CVE Entries into products, such as content and development engineers working for product vendors, and others who consume CVE Entries.</li><li><b>Subject Matter Experts (SMEs)</b> represent a significant constituency related to &mdash; or affected by &mdash; CVE, and are domain experts in the vulnerability management and reporting field. These members may include representatives from product vendors who represent the needs of their company, such as PSIRT team members, or product managers and product strategists who are representing customers.</li><li><b>Advocates</b> actively support or promote CVE in a highly visible fashion. These individuals are respected leaders within the security community who help bring credibility to CVE and give it a wider reach outside of the security community.</li></ul>"],
16+
"subSectionParagraphs": ["Board members are not limited to but traditionally fit into one or more of the following categories:<ul><li><b>Technical Implementers</b> provide input and guidance regarding the creation, design, review, maintenance, and applications of CVE List records (<a href='/ResourcesSupport/FAQs#pc_cve_recordswhat_is_cve_record' target='_blank'>CVE Records</a>). This may include individuals who integrate CVE Records into products, such as content and development engineers working for product vendors, and others who consume CVE Records.</li><li><b>Subject Matter Experts (SMEs)</b> represent a significant constituency related to &mdash; or affected by &mdash; CVE, and are domain experts in the vulnerability management and reporting field. These members may include representatives from product vendors who represent the needs of their company, such as PSIRT team members, or product managers and product strategists who are representing customers.</li><li><b>Advocates</b> actively support or promote CVE in a highly visible fashion. These individuals are respected leaders within the security community who help bring credibility to CVE and give it a wider reach outside of the security community.</li></ul>"],
1717
"subSubSections":[]
1818
},
1919
{"subSectionId": "structure",

src/assets/data/cnaRules.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
"pageSections": [
66
{"sectionId": "section_1_introduction",
77
"sectionTitle": "Introduction",
8-
"sectionParagraphs": ["CVE® is a list of information security vulnerabilities and exposures that provides common identifiers for publicly known cybersecurity vulnerabilities. CVE makes it possible to share data across separate vulnerability capabilities (cybersecurity tools, repositories, and services) with this common enumeration. The use of <a href='/ResourcesSupport/FAQs#pc_cve_recordswhat_is_cve_record'>CVE Records</a> ensures that two or more parties can confidently refer to a <a href='/ResourcesSupport/FAQs#pc_cve_id_requestswhat_is_cve_id'>CVE Identifier (CVE ID)</a> when discussing or sharing information about a unique vulnerability. In this way, CVE is fundamental to the vulnerability management infrastructure.",
9-
"The CVE Program’s primary challenge is to satisfy the demand for timely, accurate CVE ID assignments and CVE Record Publishing, while rapidly expanding the scope of coverage to address the increasing number of vulnerabilities and evolving state of vulnerability management. The CVE Program is overseen by the <a href='/ProgramOrganization/Board'>CVE Board</a> (hereinafter the Board). To address the CVE Program's scalability challenge, the Board determined that the CVE Program must be federated and that CVE Records should be produced both more quickly and in a more decentralized manner."],
8+
"sectionParagraphs": ["CVE<sup>®</sup> is a list of information security vulnerabilities and exposures that provides common identifiers for publicly known cybersecurity vulnerabilities. CVE makes it possible to share data across separate vulnerability capabilities (cybersecurity tools, repositories, and services) with this common enumeration. The use of <a href='/ResourcesSupport/FAQs#pc_cve_recordswhat_is_cve_record'>CVE Records</a> ensures that two or more parties can confidently refer to a <a href='/ResourcesSupport/FAQs#pc_cve_id_requestswhat_is_cve_id'>CVE Identifier (CVE ID)</a> when discussing or sharing information about a unique vulnerability. In this way, CVE is fundamental to the vulnerability management infrastructure.",
9+
"The CVE Program’s primary challenge is to satisfy the demand for timely, accurate CVE ID assignments and CVE Record publishing, while rapidly expanding the scope of coverage to address the increasing number of vulnerabilities and evolving state of vulnerability management. The CVE Program is overseen by the <a href='/ProgramOrganization/Board'>CVE Board</a> (hereinafter the Board). To address the CVE Program's scalability challenge, the Board determined that the CVE Program must be federated and that CVE Records should be produced both more quickly and in a more decentralized manner."],
1010
"subSections": [
1111
{"subSectionId": "section_1-1_cnas",
1212
"subSectionTitle": "CVE Numbering Authorities (CNAs)",

src/assets/data/faqs.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"questionId": "what_is_cve",
88
"questionText": "What is CVE",
99
"questionResponseParagraphs": [
10-
"The mission of the Common Vulnerability and Enumeration (CVE®) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.",
10+
"The mission of the Common Vulnerability and Enumeration (CVE<sup>®</sup>) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.",
1111
"See the <a href='/About/Overview'>Overview</a> page for additional information."
1212
]
1313
},

src/assets/data/navigation.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@
277277
"id": "5",
278278
"label": "Resources & Support",
279279
"path": "ResourcesSupport",
280-
"primaryNavPath": "/ResourcesSupport/ReportRequest",
280+
"primaryNavPath": "/ResourcesSupport/Resources",
281281
"submenu": {
282282
"Resources": {
283283
"id": "5.0",

src/components/FooterModule.vue

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@
7272
</div>
7373
<div class="content">
7474
<p>
75-
Use of the CVE® List and the associated references from this website are subject to the
75+
Use of the CVE<sup>®</sup> List and the associated references from this website are subject to the
7676
<router-link to="/Legal/TermsOfUse">terms of use</router-link>. CVE is sponsored by the
7777
<a href="https://www.dhs.gov/">U.S. Department of Homeland Security (DHS)
7878
<span class="icon cve-icon-xxs">

src/views/About/History.vue

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,9 @@
66
<div class="content">
77
<h1 :id="cvenavs['About']['submenu']['History']" class="title">
88
{{cvenavs['About']['submenu']['History']['label']}}</h1>
9-
<p class="cve-help-text">Most of the links below will take you to external websites; these links
9+
<p class="cve-help-text">Most of the links below will take you to external websites
10+
<span class="icon cve-icon-xxs help-text-icon"><font-awesome-icon icon="external-link-alt" aria-labelledby="extenalSiteLinks"/>
11+
</span>; these links
1012
will open in a new window or tab depending on your browser.</p>
1113
<h2 :id="cvenavs['About']['submenu']['History']['items']['Overview']['anchorId']" class="title cve-heading-top-spacing">
1214
{{cvenavs['About']['submenu']['History']['items']['Overview']['label']}}</h2>

src/views/About/Overview.vue

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
{{cvenavs['About']['submenu']['Overview']['items']['About the CVE Program']['label']}}
1212
</h2>
1313
<p>
14-
The mission of the CVE® Program is to identify,
14+
The mission of the CVE<sup>®</sup> Program is to identify,
1515
define, and catalog publicly disclosed cybersecurity
1616
<router-link to="/About/Glossary?activeTerm=glossaryVulnerability">vulnerabilities</router-link>. There is one
1717
<router-link to="/About/Glossary?activeTerm=glossaryRecord">CVE Record</router-link> for each
@@ -30,7 +30,7 @@
3030
</iframe>
3131
</figure>
3232
<p>
33-
Introduction to the CVE® Program, including what is CVE, goals of the program, who operates the
33+
Introduction to the CVE<sup>®</sup> Program, including what is CVE, goals of the program, who operates the
3434
program, and program organization.
3535
</p>
3636
</div>

src/views/About/RelatedEfforts.vue

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@
77
<h1 :id="cvenavs['About']['submenu']['Related Efforts']['id']" class="title">
88
{{cvenavs['About']['submenu']['Related Efforts']['label']}}
99
</h1>
10+
<p class="cve-help-text">Most of the links below will take you to external
11+
websites <span class="icon cve-icon-xxs"><font-awesome-icon icon="external-link-alt" aria-labelledby="extenalSiteLinks"/>
12+
</span>; these links will open in a new window or tab depending on your browser.</p>
13+
<p>
1014
<h2 :id="cvenavs['About']['submenu']['Related Efforts']['items']['National Vulnerability Database (NVD)']['anchorId']"
1115
class="title cve-heading-top-spacing">
1216
{{cvenavs['About']['submenu']['Related Efforts']['items']['National Vulnerability Database (NVD)']['label']}}</h2>
@@ -111,7 +115,7 @@
111115
{{cvenavs['About']['submenu']['Related Efforts']['items']['Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)']['label']}}
112116
</h2>
113117
<p>
114-
<a href="https://attack.mitre.org/" target="_blank">ATT&CK®</a> is a knowledge base of cyber adversary behavior and taxonomy
118+
<a href="https://attack.mitre.org/" target="_blank">ATT&CK<sup>®</sup></a> is a knowledge base of cyber adversary behavior and taxonomy
115119
for adversarial
116120
actions across their lifecycle. Some “Techniques” listed in ATT&CK, which define how an adversary achieves a tactical goal by
117121
performing an action, target specific CVE Records. For example, the <a href="https://attack.mitre.org/techniques/T1068/"

src/views/Downloads.vue

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -122,29 +122,29 @@
122122
XML Files By Year:
123123
</p>
124124
<ul class="mt-0 tile-body cve-task-tile-list cve-list-no-bullet">
125-
<li><a href="/data/downloads/allitems-cvrf-year-2021.xml">CVE-2021-xxxxxx records</a></li>
126-
<li><a href="/data/downloads/allitems-cvrf-year-2020.xml">CVE-2020-xxxxxx records</a></li>
127-
<li><a href="/data/downloads/allitems-cvrf-year-2019.xml">CVE-2019-xxxxxx records</a></li>
128-
<li><a href="/data/downloads/allitems-cvrf-year-2018.xml">CVE-2018-xxxxxx records</a></li>
129-
<li><a href="/data/downloads/allitems-cvrf-year-2017.xml">CVE-2017-xxxxxx records</a></li>
130-
<li><a href="/data/downloads/allitems-cvrf-year-2016.xml">CVE-2016-xxxxxx records</a></li>
131-
<li><a href="/data/downloads/allitems-cvrf-year-2015.xml">CVE-2015-xxxxxx records</a></li>
132-
<li><a href="/data/downloads/allitems-cvrf-year-2014.xml">CVE-2014-xxxx records</a></li>
133-
<li><a href="/data/downloads/allitems-cvrf-year-2013.xml">CVE-2013-xxxx records</a></li>
134-
<li><a href="/data/downloads/allitems-cvrf-year-2012.xml">CVE-2012-xxxx records</a></li>
135-
<li><a href="/data/downloads/allitems-cvrf-year-2011.xml">CVE-2011-xxxx records</a></li>
136-
<li><a href="/data/downloads/allitems-cvrf-year-2010.xml">CVE-2010-xxxx records</a></li>
137-
<li><a href="/data/downloads/allitems-cvrf-year-2009.xml">CVE-2009-xxxx records</a></li>
138-
<li><a href="/data/downloads/allitems-cvrf-year-2008.xml">CVE-2008-xxxx records</a></li>
139-
<li><a href="/data/downloads/allitems-cvrf-year-2007.xml">CVE-2007-xxxx records</a></li>
140-
<li><a href="/data/downloads/allitems-cvrf-year-2006.xml">CVE-2006-xxxx records</a></li>
141-
<li><a href="/data/downloads/allitems-cvrf-year-2005.xml">CVE-2005-xxxx records</a></li>
142-
<li><a href="/data/downloads/allitems-cvrf-year-2004.xml">CVE-2004-xxxx records</a></li>
143-
<li><a href="/data/downloads/allitems-cvrf-year-2003.xml">CVE-2003-xxxx records</a></li>
144-
<li><a href="/data/downloads/allitems-cvrf-year-2002.xml">CVE-2002-xxxx records</a></li>
145-
<li><a href="/data/downloads/allitems-cvrf-year-2001.xml">CVE-2001-xxxx records</a></li>
146-
<li><a href="/data/downloads/allitems-cvrf-year-2000.xml">CVE-2000-xxxx records</a></li>
147-
<li><a href="/data/downloads/allitems-cvrf-year-1999.xml">CVE-1999-xxxx records</a></li>
125+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2021.xml">CVE-2021-xxxxxx records</a></li>
126+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2020.xml">CVE-2020-xxxxxx records</a></li>
127+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2019.xml">CVE-2019-xxxxxx records</a></li>
128+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2018.xml">CVE-2018-xxxxxx records</a></li>
129+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2017.xml">CVE-2017-xxxxxx records</a></li>
130+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2016.xml">CVE-2016-xxxxxx records</a></li>
131+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2015.xml">CVE-2015-xxxxxx records</a></li>
132+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2014.xml">CVE-2014-xxxx records</a></li>
133+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2013.xml">CVE-2013-xxxx records</a></li>
134+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2012.xml">CVE-2012-xxxx records</a></li>
135+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2011.xml">CVE-2011-xxxx records</a></li>
136+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2010.xml">CVE-2010-xxxx records</a></li>
137+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2009.xml">CVE-2009-xxxx records</a></li>
138+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2008.xml">CVE-2008-xxxx records</a></li>
139+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2007.xml">CVE-2007-xxxx records</a></li>
140+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2006.xml">CVE-2006-xxxx records</a></li>
141+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2005.xml">CVE-2005-xxxx records</a></li>
142+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2004.xml">CVE-2004-xxxx records</a></li>
143+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2003.xml">CVE-2003-xxxx records</a></li>
144+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2002.xml">CVE-2002-xxxx records</a></li>
145+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2001.xml">CVE-2001-xxxx records</a></li>
146+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-2000.xml">CVE-2000-xxxx records</a></li>
147+
<li><a href="https://cve.mitre.org/data/downloads/allitems-cvrf-year-1999.xml">CVE-1999-xxxx records</a></li>
148148
</ul>
149149
</article>
150150
</div>

src/views/Home.vue

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
<div class="container cve-mission-container mt-1">
77
<h1 class="title is-hidden">CVE</h1>
88
<h2 class="title cve-heading-top-spacing">
9-
CVE® Program Mission
9+
CVE<sup id="cve-mission-trademark">®</sup> Program Mission
1010
</h2>
1111
<div id="cve-mission-text" class="subtitle">
1212
Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
@@ -124,4 +124,8 @@ export default {
124124
.cve-margin-top-neg7 {
125125
margin-top: -7px !important;
126126
}
127+
128+
#cve-mission-trademark {
129+
font-size: 18px;
130+
}
127131
</style>

0 commit comments

Comments
 (0)