You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"scope": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
7489
7493
"contact": [
7490
7494
{
7491
7495
"email": [
@@ -26355,5 +26359,70 @@
26355
26359
]
26356
26360
},
26357
26361
"country": "USA"
26362
+
},
26363
+
{
26364
+
"shortName": "TRO",
26365
+
"cnaID": "CNA-2025-0028",
26366
+
"organizationName": "Teradyne Robotics",
26367
+
"scope": "All products released by Teradyne Robotics subsidiaries, Universal Robots (UR) and Mobile Industrial Robots (MiR), including both actively supported and end-of-life/end-of-service products, as well as vulnerabilities in third-party software identified by Teradyne Robotics that are outside the scope of another CNA.",
Copy file name to clipboardExpand all lines: src/assets/data/cnaRules.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@
12
12
"subSectionId": "section_1-1_Background",
13
13
"subSectionTitle": "Background",
14
14
"subSectionParagraphs": [
15
-
"The <a href='/'>Common Vulnerabilities and Exposures (CVE®) Program</a> is a voluntary, international, community-driven effort to identify, define, catalog, and share information about <a href='/ResourcesSupport/Glossary?activeTerm=glossaryPubliclyDisclosed'>Publicly Disclosed</a> cybersecurity <a href='/ResourcesSupport/Glossary?activeTerm=glossaryVulnerability'>Vulnerabilities</a>. A <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifier (CVE ID)</a> and corresponding <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Record</a> enable multiple parties to discuss and share information with confidence that they are referencing the appropriate Vulnerability. This Vulnerability identification capability is fundamental to global Vulnerability management.",
15
+
"The <a href='/'>Common Vulnerabilities and Exposures (CVE™) Program</a> is a voluntary, international, community-driven effort to identify, define, catalog, and share information about <a href='/ResourcesSupport/Glossary?activeTerm=glossaryPubliclyDisclosed'>Publicly Disclosed</a> cybersecurity <a href='/ResourcesSupport/Glossary?activeTerm=glossaryVulnerability'>Vulnerabilities</a>. A <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifier (CVE ID)</a> and corresponding <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Record</a> enable multiple parties to discuss and share information with confidence that they are referencing the appropriate Vulnerability. This Vulnerability identification capability is fundamental to global Vulnerability management.",
16
16
"Within the CVE Program, a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> is an organization authorized to assign CVE IDs and publish CVE Records, ideally as part of the initial Public Disclosure of a Vulnerability. Benefits of participating in the CVE Program as a CNA include the ability to Publicly Disclose Vulnerabilities with pre-assigned CVE IDs and the first opportunity to assign CVE IDs for Vulnerabilities within the CNA’s <a href='/ResourcesSupport/Glossary?activeTerm=glossaryScope'>Scope</a> Definition. In addition to assigning CVE IDs, CNAs also create and publish information about the identified Vulnerability in its associated CVE Record.",
17
17
"Many CNAs are <a href='/ResourcesSupport/Glossary?activeTerm=glossarySupplier'>Suppliers</a> who assign CVE IDs to and publish CVE Records for Vulnerabilities affecting <a href='/ResourcesSupport/Glossary?activeTerm=glossaryProduct'>Products</a> owned, developed, or maintained by the Supplier. Examples of CNAs include:",
18
18
"<ul><li>Software and hardware Suppliers, including product security incident response teams (PSIRTs)</li><li>Open source software projects, maintainers, and foundations</li><li>Service providers</li><li>Vulnerability researchers</li><li>National computer security incident response teams (CSIRTs)</li><li>Vulnerability coordinators</li><li>Vulnerability databases</li><li>Bug bounty providers</li></ul>"
Copy file name to clipboardExpand all lines: src/assets/data/events.json
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@
102
102
"id": 31,
103
103
"title": "CNA Rules v4.0 Q&A Webinar",
104
104
"location": "Virtual",
105
-
"description": "<i>This event is limited to authorized representatives from <a href='/PartnerInformation/ListofPartners'>CVE Numbering Authority (CNA)</a> partners <strong>only</strong>.</i><br/><br/><strong>Time: </strong>11:00 AM - 12:30 PM EDT<br/><br/><strong>Registration: </strong>Available for CNA partners on the <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>webinar website</a>.<br/><br/><strong>IMPORTANT: </strong>CNAs are encouraged to submit questions ahead of time via this <a href='https://forms.office.com/g/KDShHyZ197' target='_blank'>web form</a>.<br/><br/><strong>Purpose: </strong>The purpose of this <a href='/'>CVE® Program</a> webinar is to update <a href='/ProgramOrganization/CNAs'>CNAs</a> about the new and improved <a href='/Resources/Roles/Cnas/CNA_Rules_v4.0.pdf' target='_blank'>CNA Rules Version 4.0</a> (PDF).<br/><br/>Topics will include the ways the new rules might affect CNA processes in the short term, the benefits for CNAs moving forward, and the expected positive impact on the vulnerability management ecosystem.<br/><br/>CNAs, <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>register today</a>!",
105
+
"description": "<i>This event is limited to authorized representatives from <a href='/PartnerInformation/ListofPartners'>CVE Numbering Authority (CNA)</a> partners <strong>only</strong>.</i><br/><br/><strong>Time: </strong>11:00 AM - 12:30 PM EDT<br/><br/><strong>Registration: </strong>Available for CNA partners on the <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>webinar website</a>.<br/><br/><strong>IMPORTANT: </strong>CNAs are encouraged to submit questions ahead of time via this <a href='https://forms.office.com/g/KDShHyZ197' target='_blank'>web form</a>.<br/><br/><strong>Purpose: </strong>The purpose of this <a href='/'>CVE<sup>™</sup> Program</a> webinar is to update <a href='/ProgramOrganization/CNAs'>CNAs</a> about the new and improved <a href='/Resources/Roles/Cnas/CNA_Rules_v4.0.pdf' target='_blank'>CNA Rules Version 4.0</a> (PDF).<br/><br/>Topics will include the ways the new rules might affect CNA processes in the short term, the benefits for CNAs moving forward, and the expected positive impact on the vulnerability management ecosystem.<br/><br/>CNAs, <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>register today</a>!",
Copy file name to clipboardExpand all lines: src/assets/data/faqs.json
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,8 @@
7
7
"questionId": "what_is_cve",
8
8
"questionText": "What is CVE",
9
9
"questionResponseParagraphs": [
10
-
"<i>The Common Vulnerabilities and Exposures (CVE<sup>®</sup>) Program is celebrating 25 years of impact in cybersecurity! Read the <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf'>CVE 25th Anniversary Report</a>.</i>",
11
-
"The mission of the Common Vulnerabilities and Exposures (CVE<sup>®</sup>) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. See the <a href='/About/Overview'>Overview</a> page for additional information."
10
+
"<i>The Common Vulnerabilities and Exposures (CVE<sup>™</sup>) Program is celebrating 25 years of impact in cybersecurity! Read the <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf'>CVE 25th Anniversary Report</a>.</i>",
11
+
"The mission of the Common Vulnerabilities and Exposures (CVE<sup>™</sup>) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. See the <a href='/About/Overview'>Overview</a> page for additional information."
0 commit comments