Skip to content

Commit ec565ed

Browse files
authored
Merge pull request #3535 from CVEProject/int
4/15/25 Release: INT to MAIN
2 parents 5b8bb17 + 5862894 commit ec565ed

7 files changed

Lines changed: 253 additions & 4 deletions

File tree

index.html

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@
55
<meta http-equiv="X-UA-Compatible" content="IE=edge">
66
<meta name="viewport" content="width=device-width,initial-scale=1.0">
77
<link rel="icon" type="image/x-icon" href="/cvePurpleVFavicon.svg">
8-
<link rel="canonical" href="https://www.cve.org">
98
<script src="https://cmp.osano.com/AzyhULTdPkqmy4aDN/46057d56-0263-4cca-abac-9adddada4f3b/osano.js"></script>
109
</head>
1110
<body class="has-navbar-fixed-top">

src/App.vue

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,19 @@ export default {
4242
+ 'reference method for publicly known information-security '
4343
+ 'vulnerabilities and exposures'
4444
});
45+
},
46+
head() {
47+
// Remove any trailing and leading slashes on the base URL and
48+
// path suffix so we know what we're dealing with and we control
49+
// the slash separating the two components.
50+
51+
const baseURL = window.location.origin.replace(/\/+$/, '');
52+
const suffix = this.$route.fullPath.replace(/^\/+/, '');
53+
54+
return {
55+
link: [{rel: 'canonical',
56+
content: `${baseURL}/${suffix}`}]
57+
}
4558
}
4659
}
4760
</script>

src/assets/data/CNAsList.json

Lines changed: 170 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25889,5 +25889,175 @@
2588925889
]
2589025890
},
2589125891
"country": "USA"
25892+
},
25893+
{
25894+
"shortName": "CTOne",
25895+
"cnaID": "CNA-2025-0019",
25896+
"organizationName": "CTOne Inc.",
25897+
"scope": "Vulnerabilities in cellular (LTE/4G/5G) devices and protocols that are not in another CNA’s scope.",
25898+
"contact": [
25899+
{
25900+
"email": [
25901+
{
25902+
"label": "Email",
25903+
"emailAddr": "tr2@ctone.com"
25904+
}
25905+
],
25906+
"contact": [],
25907+
"form": []
25908+
}
25909+
],
25910+
"disclosurePolicy": [
25911+
{
25912+
"label": "Policy",
25913+
"language": "",
25914+
"url": "https://ctone.com//wp-content/uploads/2024/07/CTOne-Vulnerability-Disclosure-Policy.pdf"
25915+
}
25916+
],
25917+
"securityAdvisories": {
25918+
"alerts": [],
25919+
"advisories": [
25920+
{
25921+
"label": "Advisories",
25922+
"url": "https://ctone.com/published-product-vulnerabilities/"
25923+
}
25924+
]
25925+
},
25926+
"resources": [],
25927+
"CNA": {
25928+
"isRoot": false,
25929+
"root": {
25930+
"shortName": "icscert",
25931+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)"
25932+
},
25933+
"roles": [
25934+
{
25935+
"helpText": "",
25936+
"role": "CNA"
25937+
}
25938+
],
25939+
"TLR": {
25940+
"shortName": "CISA",
25941+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA)"
25942+
},
25943+
"type": [
25944+
"Vendor",
25945+
"Researcher",
25946+
"Bug Bounty Provider"
25947+
]
25948+
},
25949+
"country": "Taiwan"
25950+
},
25951+
{
25952+
"shortName": "Jaspersoft",
25953+
"cnaID": "CNA-2025-0020",
25954+
"organizationName": "Jaspersoft",
25955+
"scope": "Jaspersoft products and services only.",
25956+
"contact": [
25957+
{
25958+
"email": [
25959+
{
25960+
"label": "Email",
25961+
"emailAddr": "secure@cloud.com"
25962+
}
25963+
],
25964+
"contact": [],
25965+
"form": []
25966+
}
25967+
],
25968+
"disclosurePolicy": [
25969+
{
25970+
"label": "Policy",
25971+
"language": "",
25972+
"url": "https://community.jaspersoft.com/security/"
25973+
}
25974+
],
25975+
"securityAdvisories": {
25976+
"alerts": [],
25977+
"advisories": [
25978+
{
25979+
"label": "Advisories",
25980+
"url": "https://community.jaspersoft.com/advisories/"
25981+
}
25982+
]
25983+
},
25984+
"resources": [],
25985+
"CNA": {
25986+
"isRoot": false,
25987+
"root": {
25988+
"shortName": "n/a",
25989+
"organizationName": "n/a"
25990+
},
25991+
"roles": [
25992+
{
25993+
"helpText": "",
25994+
"role": "CNA"
25995+
}
25996+
],
25997+
"TLR": {
25998+
"shortName": "mitre",
25999+
"organizationName": "MITRE Corporation"
26000+
},
26001+
"type": [
26002+
"Vendor"
26003+
]
26004+
},
26005+
"country": "USA"
26006+
},
26007+
{
26008+
"shortName": "Spotfire",
26009+
"cnaID": "CNA-2025-0021",
26010+
"organizationName": "Spotfire",
26011+
"scope": "Vulnerabilities associated with the Spotfire product only.",
26012+
"contact": [
26013+
{
26014+
"email": [
26015+
{
26016+
"label": "Email",
26017+
"emailAddr": "secure@cloud.com"
26018+
}
26019+
],
26020+
"contact": [],
26021+
"form": []
26022+
}
26023+
],
26024+
"disclosurePolicy": [
26025+
{
26026+
"label": "Policy",
26027+
"language": "",
26028+
"url": "https://community.spotfire.com/security/"
26029+
}
26030+
],
26031+
"securityAdvisories": {
26032+
"alerts": [],
26033+
"advisories": [
26034+
{
26035+
"label": "Advisories",
26036+
"url": "https://community.spotfire.com/security-advisories/"
26037+
}
26038+
]
26039+
},
26040+
"resources": [],
26041+
"CNA": {
26042+
"isRoot": false,
26043+
"root": {
26044+
"shortName": "n/a",
26045+
"organizationName": "n/a"
26046+
},
26047+
"roles": [
26048+
{
26049+
"helpText": "",
26050+
"role": "CNA"
26051+
}
26052+
],
26053+
"TLR": {
26054+
"shortName": "mitre",
26055+
"organizationName": "MITRE Corporation"
26056+
},
26057+
"type": [
26058+
"Vendor"
26059+
]
26060+
},
26061+
"country": "USA"
2589226062
}
2589326063
]

src/assets/data/events.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@
3131
},
3232
{
3333
"id": 33,
34-
"displayOnHomepageOrder": 1,
3534
"title": "CVE/FIRST VulnCon 2025",
3635
"location": "Raleigh, North Carolina, USA & Virtual",
3736
"description": "VulnCon 2025 is co-sponsored by the <a href='/'>CVE Program</a> and <a href='https://www.first.org/' target='_blank'>FIRST</a> and is open to the public.<br/><br/><strong>SPECIAL MESSAGE FOR CVE NUMBERING AUTHORITIES (CNAs)</strong>:<br/><i>VulnCon 2025 takes the place of this year’s Spring CVE Global Summit.</i><br/><br/><strong>Agenda</strong>:<br/> Available <a href='https://www.first.org/conference/vulncon2025/program' target='_blank'>here</a>.<br/><br/><strong>Program Overview</strong>:<br/>* Day 1: Monday, April 7 &mdash; Plenary, Vendor Tables, Welcome Reception<br/>* Day 2: Tuesday, April 8 &mdash; Plenary, Vendor Tables, Off-site Social Event<br/>* Day 3: Wednesday, April 9 &mdash; Plenary, Breakouts, Vendor Tables<br/>* Day 4: Thursday, April 10 &mdash; Plenary, Breakouts, Vendor Tables<br/><br/><strong>Venue</strong>:<br/><a href='https://facilities.ofa.ncsu.edu/building/mck/' target='_blank'>McKimmon Center,<br/>North Carolina State University</a>,<br/>1101 Gorman St.,<br/> Raleigh, North Carolina 27606<br/>USA<br/><br/><strong>Registration</strong>:<br/>Registration is now closed. Details <a href='https://www.first.org/conference/vulncon2025/#Registration-Information' target='_blank'>here</a>.<br/><ul><li>Virtual Admission: US $100.00 (closed)</li><li>In-person Standard Admission (closed): US $300.00</li><li>In-person Late Rate Admission (closed): US $375.00</li></ul>Registration fees include four days of coffee breaks and buffet lunches, one networking reception hosted at the McKimmon Center, and applicable meeting materials. Note that discounted rates are not being offered for this event regardless of membership or speaking status.<br/><br/>An offsite social event is planned for Tuesday, April 8, from 19:00-21:00 in downtown Raleigh. You may purchase a ticket during your main registration or access a separate purchase form link found in your registration email confirmation. Tickets are US $30.00 per person.<br/><br/><strong>Call for Papers</strong>:<br/>Closed on January 31, 2025. Details <a href='https://www.first.org/conference/vulncon2025/cfp' target='_blank'>here</a>.<br/><br/><strong>Purpose</strong>:<br/>The purpose of <a href='https://www.first.org/conference/vulncon2025/' target='_blank'>VulnCon</a> is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem.<br/><br/>A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly.",

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1141,7 +1141,7 @@
11411141
},
11421142
{
11431143
"month": "April",
1144-
"value": "3"
1144+
"value": "6"
11451145
},
11461146
{
11471147
"month": "May",

src/assets/data/news.json

Lines changed: 65 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,71 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 512,
5+
"newsType": "news",
6+
"title": "Spotfire Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "Spotfire Added as CNA",
8+
"date": "2025-04-15",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/Spotfire'>Spotfire</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities associated with the Spotfire product only."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>453 CNAs</a> (450 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Spotfire is the 244th CNA from USA."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "Spotfire’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 511,
26+
"newsType": "news",
27+
"title": "Jaspersoft Added as CVE Numbering Authority (CNA)",
28+
"urlKeywords": "Jaspersoft Added as CNA",
29+
"date": "2025-04-15",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "<a href='/PartnerInformation/ListofPartners/partner/Jaspersoft'>Jaspersoft</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for Jaspersoft products and services only."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>452 CNAs</a> (449 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Jaspersoft is the 243rd CNA from USA."
38+
},
39+
{
40+
"contentnewsType": "paragraph",
41+
"content": "Jaspersoft’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
42+
}
43+
]
44+
},
45+
{
46+
"id": 510,
47+
"newsType": "news",
48+
"title": "CTOne Added as CVE Numbering Authority (CNA)",
49+
"urlKeywords": "CTOne Added as CNA",
50+
"date": "2025-04-15",
51+
"description": [
52+
{
53+
"contentnewsType": "paragraph",
54+
"content": "<a href='/PartnerInformation/ListofPartners/partner/CTOne'>CTOne Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in cellular (LTE/4G/5G) devices and protocols that are not in another CNA’s scope."
55+
},
56+
{
57+
"contentnewsType": "paragraph",
58+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>451 CNAs</a> (448 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. CTOne is the 13th CNA from Taiwan."
59+
},
60+
{
61+
"contentnewsType": "paragraph",
62+
"content": "CTOne’s Root is the <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS Root</a>."
63+
}
64+
]
65+
},
366
{
467
"id": 509,
68+
"displayOnHomepageOrder": 0,
569
"newsType": "blog",
670
"title": "Happening This Week: <i>CVE/FIRST VulnCon 2025</i>, April 7–10, 2025",
771
"urlKeywords": "Happening This Week VulnCon 2025",
@@ -91,7 +155,7 @@
91155
"description": [
92156
{
93157
"contentnewsType": "paragraph",
94-
"content": "<a href='/PartnerInformation/ListofPartners/partner/TPLink'>TP-Link Systems Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for TP-Link issues only."
158+
"content": "<a href='/PartnerInformation/ListofPartners/partner/TPLink'>TP-Link Systems Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for TP-Link issues only. Read the TP-Link news release: “<a href='https://www.businesswire.com/news/home/20250414578243/en/TP-Link-Systems-Inc.-Receives-CVE-Numbering-Authority-Designation-for-Cybersecurity-Vulnerability-Management' target='_blank'>TP-Link Systems Inc. Receives CVE Numbering Authority Designation for Cybersecurity Vulnerability Management</a>."
95159
},
96160
{
97161
"contentnewsType": "paragraph",

src/views/CVERecord/CVERecord.vue

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,10 @@ export default {
132132
usecveRecordStore().showHelpText = true;
133133
}
134134
},
135+
head() {
136+
const cveId = this.$route.query.id;
137+
return {title: `CVE Record: ${cveId}`}
138+
},
135139
watch: {
136140
$route(to) {
137141
if (Object.prototype.hasOwnProperty.call(to.query, 'id')) {

0 commit comments

Comments
 (0)