Skip to content

Commit e374d2f

Browse files
authored
Merge pull request #3590 from CVEProject/int
6/23/25 Release: INT to MAIN
2 parents a503886 + 3a47d1c commit e374d2f

19 files changed

Lines changed: 286 additions & 124 deletions

File tree

public/images/cveboard/JenE.jpg

73.9 KB
Loading

src/assets/cve25thLogo.svg

Lines changed: 13 additions & 10 deletions
Loading

src/assets/data/CNAsList.json

Lines changed: 72 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2447,8 +2447,12 @@
24472447
"alerts": [],
24482448
"advisories": [
24492449
{
2450-
"label": "Advisories",
2451-
"url": "https://trust.arcgis.com/"
2450+
"label": "Trust Center",
2451+
"url": "https://trust.arcgis.com/en/"
2452+
},
2453+
{
2454+
"label": "Security Advisories",
2455+
"url": "https://www.esri.com/arcgis-blog/?s=#&products=trust-arcgis"
24522456
}
24532457
]
24542458
},
@@ -7485,7 +7489,7 @@
74857489
"shortName": "SICK_AG",
74867490
"cnaID": "CNA-2019-0016",
74877491
"organizationName": "SICK AG",
7488-
"scope": "SICK AG issues only.",
7492+
"scope": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
74897493
"contact": [
74907494
{
74917495
"email": [
@@ -26355,5 +26359,70 @@
2635526359
]
2635626360
},
2635726361
"country": "USA"
26362+
},
26363+
{
26364+
"shortName": "TRO",
26365+
"cnaID": "CNA-2025-0028",
26366+
"organizationName": "Teradyne Robotics",
26367+
"scope": "All products released by Teradyne Robotics subsidiaries, Universal Robots (UR) and Mobile Industrial Robots (MiR), including both actively supported and end-of-life/end-of-service products, as well as vulnerabilities in third-party software identified by Teradyne Robotics that are outside the scope of another CNA.",
26368+
"contact": [
26369+
{
26370+
"email": [
26371+
{
26372+
"label": "Email",
26373+
"emailAddr": "productsecurity@teradyne-robotics.com"
26374+
}
26375+
],
26376+
"contact": [],
26377+
"form": []
26378+
}
26379+
],
26380+
"disclosurePolicy": [
26381+
{
26382+
"label": "UR Policy",
26383+
"language": "",
26384+
"url": "https://www.universal-robots.com/articles/coordinated-disclosure/"
26385+
},
26386+
{
26387+
"label": "MiR Policy",
26388+
"language": "",
26389+
"url": "https://mobile-industrial-robots.com/coordinated-disclosure"
26390+
}
26391+
],
26392+
"securityAdvisories": {
26393+
"alerts": [],
26394+
"advisories": [
26395+
{
26396+
"label": "UR Advisories",
26397+
"url": "https://www.universal-robots.com/articles/?filter_Applications[]=226617&filters[]=226617"
26398+
},
26399+
{
26400+
"label": "MiR Advisories",
26401+
"url": "https://mobile-industrial-robots.com/security-advisories"
26402+
}
26403+
]
26404+
},
26405+
"resources": [],
26406+
"CNA": {
26407+
"isRoot": false,
26408+
"root": {
26409+
"shortName": "icscert",
26410+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)"
26411+
},
26412+
"roles": [
26413+
{
26414+
"helpText": "",
26415+
"role": "CNA"
26416+
}
26417+
],
26418+
"TLR": {
26419+
"shortName": "CISA",
26420+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA)"
26421+
},
26422+
"type": [
26423+
"Vendor"
26424+
]
26425+
},
26426+
"country": "Denmark"
2635826427
}
2635926428
]

src/assets/data/cnaRules.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
"subSectionId": "section_1-1_Background",
1313
"subSectionTitle": "Background",
1414
"subSectionParagraphs": [
15-
"The <a href='/'>Common Vulnerabilities and Exposures (CVE&reg;) Program</a> is a voluntary, international, community-driven effort to identify, define, catalog, and share information about <a href='/ResourcesSupport/Glossary?activeTerm=glossaryPubliclyDisclosed'>Publicly Disclosed</a> cybersecurity <a href='/ResourcesSupport/Glossary?activeTerm=glossaryVulnerability'>Vulnerabilities</a>. A <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifier (CVE ID)</a> and corresponding <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Record</a> enable multiple parties to discuss and share information with confidence that they are referencing the appropriate Vulnerability. This Vulnerability identification capability is fundamental to global Vulnerability management.",
15+
"The <a href='/'>Common Vulnerabilities and Exposures (CVE&trade;) Program</a> is a voluntary, international, community-driven effort to identify, define, catalog, and share information about <a href='/ResourcesSupport/Glossary?activeTerm=glossaryPubliclyDisclosed'>Publicly Disclosed</a> cybersecurity <a href='/ResourcesSupport/Glossary?activeTerm=glossaryVulnerability'>Vulnerabilities</a>. A <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifier (CVE ID)</a> and corresponding <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Record</a> enable multiple parties to discuss and share information with confidence that they are referencing the appropriate Vulnerability. This Vulnerability identification capability is fundamental to global Vulnerability management.",
1616
"Within the CVE Program, a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> is an organization authorized to assign CVE IDs and publish CVE Records, ideally as part of the initial Public Disclosure of a Vulnerability. Benefits of participating in the CVE Program as a CNA include the ability to Publicly Disclose Vulnerabilities with pre-assigned CVE IDs and the first opportunity to assign CVE IDs for Vulnerabilities within the CNA’s <a href='/ResourcesSupport/Glossary?activeTerm=glossaryScope'>Scope</a> Definition. In addition to assigning CVE IDs, CNAs also create and publish information about the identified Vulnerability in its associated CVE Record.",
1717
"Many CNAs are <a href='/ResourcesSupport/Glossary?activeTerm=glossarySupplier'>Suppliers</a> who assign CVE IDs to and publish CVE Records for Vulnerabilities affecting <a href='/ResourcesSupport/Glossary?activeTerm=glossaryProduct'>Products</a> owned, developed, or maintained by the Supplier. Examples of CNAs include:",
1818
"<ul><li>Software and hardware Suppliers, including product security incident response teams (PSIRTs)</li><li>Open source software projects, maintainers, and foundations</li><li>Service providers</li><li>Vulnerability researchers</li><li>National computer security incident response teams (CSIRTs)</li><li>Vulnerability coordinators</li><li>Vulnerability databases</li><li>Bug bounty providers</li></ul>"

src/assets/data/currentBoardMembersList.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,14 @@
3939
"organizationURL": "https://www.blackduck.com/",
4040
"role": "Board"
4141
},
42+
{
43+
"familyName": "Ellis",
44+
"firstName": "Jen",
45+
"imageURL": "JenE.jpg",
46+
"organization": "NextJenSecurity",
47+
"organizationURL": "https://uk.linkedin.com/in/infosecjen",
48+
"role": "Board"
49+
},
4250
{
4351
"familyName": "Emsweller",
4452
"firstName": "Patrick",
@@ -107,8 +115,8 @@
107115
"familyName": "Nandakumaraiah",
108116
"firstName": "Chandan",
109117
"imageURL": "ChandanN.jpg",
110-
"organization": "Palo Alto Networks",
111-
"organizationURL": "https://www.paloaltonetworks.com/",
118+
"organization": "",
119+
"organizationURL": "",
112120
"role": "Board"
113121
},
114122
{

src/assets/data/events.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@
102102
"id": 31,
103103
"title": "CNA Rules v4.0 Q&A Webinar",
104104
"location": "Virtual",
105-
"description": "<i>This event is limited to authorized representatives from <a href='/PartnerInformation/ListofPartners'>CVE Numbering Authority (CNA)</a> partners <strong>only</strong>.</i><br/><br/><strong>Time: </strong>11:00 AM - 12:30 PM EDT<br/><br/><strong>Registration: </strong>Available for CNA partners on the <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>webinar website</a>.<br/><br/><strong>IMPORTANT: </strong>CNAs are encouraged to submit questions ahead of time via this <a href='https://forms.office.com/g/KDShHyZ197' target='_blank'>web form</a>.<br/><br/><strong>Purpose: </strong>The purpose of this <a href='/'>CVE® Program</a> webinar is to update <a href='/ProgramOrganization/CNAs'>CNAs</a> about the new and improved <a href='/Resources/Roles/Cnas/CNA_Rules_v4.0.pdf' target='_blank'>CNA Rules Version 4.0</a> (PDF).<br/><br/>Topics will include the ways the new rules might affect CNA processes in the short term, the benefits for CNAs moving forward, and the expected positive impact on the vulnerability management ecosystem.<br/><br/>CNAs, <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>register today</a>!",
105+
"description": "<i>This event is limited to authorized representatives from <a href='/PartnerInformation/ListofPartners'>CVE Numbering Authority (CNA)</a> partners <strong>only</strong>.</i><br/><br/><strong>Time: </strong>11:00 AM - 12:30 PM EDT<br/><br/><strong>Registration: </strong>Available for CNA partners on the <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>webinar website</a>.<br/><br/><strong>IMPORTANT: </strong>CNAs are encouraged to submit questions ahead of time via this <a href='https://forms.office.com/g/KDShHyZ197' target='_blank'>web form</a>.<br/><br/><strong>Purpose: </strong>The purpose of this <a href='/'>CVE<sup>&trade;</sup> Program</a> webinar is to update <a href='/ProgramOrganization/CNAs'>CNAs</a> about the new and improved <a href='/Resources/Roles/Cnas/CNA_Rules_v4.0.pdf' target='_blank'>CNA Rules Version 4.0</a> (PDF).<br/><br/>Topics will include the ways the new rules might affect CNA processes in the short term, the benefits for CNAs moving forward, and the expected positive impact on the vulnerability management ecosystem.<br/><br/>CNAs, <a href='https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82' target='_blank'>register today</a>!",
106106
"permission": "private",
107107
"url": "https://events.gcc.teams.microsoft.com/event/d96f8b09-6c1b-4227-acff-0e6feaf2adcc@c620dc48-1d50-4952-8b39-df4d54d74d82/registration",
108108
"date": {
@@ -635,4 +635,4 @@
635635
"url": "/Resources/Media/Archives/Events/1999_Events.pdf"
636636
}
637637
]
638-
}
638+
}

src/assets/data/faqs.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@
77
"questionId": "what_is_cve",
88
"questionText": "What is CVE",
99
"questionResponseParagraphs": [
10-
"<i>The Common Vulnerabilities and Exposures (CVE<sup>®</sup>) Program is celebrating 25 years of impact in cybersecurity! Read the <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf'>CVE 25th Anniversary Report</a>.</i>",
11-
"The mission of the Common Vulnerabilities and Exposures (CVE<sup>®</sup>) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. See the <a href='/About/Overview'>Overview</a> page for additional information."
10+
"<i>The Common Vulnerabilities and Exposures (CVE<sup>&trade;</sup>) Program is celebrating 25 years of impact in cybersecurity! Read the <a href='/Resources/Media/Cve25YearsAnniversaryReport.pdf'>CVE 25th Anniversary Report</a>.</i>",
11+
"The mission of the Common Vulnerabilities and Exposures (CVE<sup>&trade;</sup>) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. See the <a href='/About/Overview'>Overview</a> page for additional information."
1212
]
1313
},
1414
{
@@ -75,14 +75,14 @@
7575
"questionId": "who_owns_cve",
7676
"questionText": "Who owns CVE",
7777
"questionResponseParagraphs": [
78-
"Copyright © 1999-2025, <a href='http://www.mitre.org/'>The MITRE Corporation</a>. CVE and the CVE logo are registered trademarks of The MITRE Corporation. CVE is sponsored by <a href='https://www.dhs.gov/' target='_blank'>U.S. Department of Homeland Security</a> (DHS) <a href='https://www.cisa.gov/about/divisions-offices/cybersecurity-division'>Cybersecurity and Infrastructure Security Agency</a> (CISA). CISA funds the <a href='https://www.dhs.gov/science-and-technology/hssedi'>Homeland Security Systems Engineering and Development Institute (HSSEDI)</a>, a DHS Federally Funded Research and Development Center (FFRDC) operated by The MITRE Corporation, to operate the CVE Program in cooperation with industry, government, and academic stakeholders under a public/private partnership."
78+
"Copyright © 1999-2025, <a href='http://www.mitre.org/'>The MITRE Corporation</a>. CVE is a trademark and the CVE logo is a registered trademark of The MITRE Corporation. CVE is sponsored by <a href='https://www.dhs.gov/' target='_blank'>U.S. Department of Homeland Security</a> (DHS) <a href='https://www.cisa.gov/about/divisions-offices/cybersecurity-division'>Cybersecurity and Infrastructure Security Agency</a> (CISA). CISA funds the <a href='https://www.dhs.gov/science-and-technology/hssedi'>Homeland Security Systems Engineering and Development Institute (HSSEDI)</a>, a DHS Federally Funded Research and Development Center (FFRDC) operated by The MITRE Corporation, to operate the CVE Program in cooperation with industry, government, and academic stakeholders under a public/private partnership."
7979
]
8080
},
8181
{
8282
"questionId": "MITRE_role_in_cve",
8383
"questionText": "What is MITRE’s role",
8484
"questionResponseParagraphs": [
85-
"<a href='https://www.dhs.gov/science-and-technology/hssedi' target='_blank'>HSSEDI</a>, a DHS FFRDC operated by <a href='http://www.mitre.org/' target='_blank'>The MITRE Corporation</a>, executes the CVE Program <a href='/ResourcesSupport/Glossary?activeTerm=glossarySecretariat'>Secretariat</a>, MITRE <a href='/ResourcesSupport/Glossary?activeTerm=glossaryTLRoot'>Top-Level Root (TL-Root)</a>, and <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNALR'>CNA of Last Resort (CNA-LR)</a> functions within the MITRE TL-Root. The MITRE Corporation owns the Copyright © 1999-2025 and the registered CVE trademark and the registered CVE logo trademark to ensure the program remains free for public use."
85+
"<a href='https://www.dhs.gov/science-and-technology/hssedi' target='_blank'>HSSEDI</a>, a DHS FFRDC operated by <a href='http://www.mitre.org/' target='_blank'>The MITRE Corporation</a>, executes the CVE Program <a href='/ResourcesSupport/Glossary?activeTerm=glossarySecretariat'>Secretariat</a>, MITRE <a href='/ResourcesSupport/Glossary?activeTerm=glossaryTLRoot'>Top-Level Root (TL-Root)</a>, and <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNALR'>CNA of Last Resort (CNA-LR)</a> functions within the MITRE TL-Root. The MITRE Corporation owns the Copyright © 1999-2025, the CVE trademark, and the registered CVE logo trademark to ensure the program remains free for public use."
8686
]
8787
},
8888
{
@@ -478,4 +478,4 @@
478478
}
479479
]
480480
}
481-
]
481+
]

src/assets/data/glossaryEntries.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
"id": "glossaryCVE",
1010
"term": "CVE",
1111
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossaryCVE",
12-
"definition": "The CVE registered trademark and the name Common Vulnerabilities and Exposures."
12+
"definition": "The CVE trademark and the name Common Vulnerabilities and Exposures."
1313
},
1414
{
1515
"id": "glossaryBoard",

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1149,7 +1149,7 @@
11491149
},
11501150
{
11511151
"month": "June",
1152-
"value": "TBA"
1152+
"value": "1"
11531153
},
11541154
{
11551155
"month": "July",

0 commit comments

Comments
 (0)