Skip to content

Commit 4f58567

Browse files
authored
Merge pull request #3279 from CVEProject/int-main
int-main to main update
2 parents 03563e1 + f1dc818 commit 4f58567

9 files changed

Lines changed: 217 additions & 82 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 58 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19868,15 +19868,15 @@
1986819868
{
1986919869
"label": "Policy",
1987019870
"language": "",
19871-
"url": "https://www.pcvuesolutions.com/index.php/vuln-disclosure"
19871+
"url": "https://www.pcvue.com/policies/vuln_disclosure"
1987219872
}
1987319873
],
1987419874
"securityAdvisories": {
1987519875
"alerts": [],
1987619876
"advisories": [
1987719877
{
1987819878
"label": "Advisories",
19879-
"url": "https://www.pcvuesolutions.com/security"
19879+
"url": "https://www.pcvue.com/security"
1988019880
}
1988119881
]
1988219882
},
@@ -24227,5 +24227,61 @@
2422724227
]
2422824228
},
2422924229
"country": "USA"
24230+
},
24231+
{
24232+
"shortName": "Omnissa",
24233+
"cnaID": "CNA-2024-0078",
24234+
"organizationName": "Omnissa, LLC",
24235+
"scope": "All Omnissa products and services, including Workspace ONE and Horizon",
24236+
"contact": [
24237+
{
24238+
"email": [
24239+
{
24240+
"label": "Email",
24241+
"emailAddr": "security@omnissa.com"
24242+
}
24243+
],
24244+
"contact": [],
24245+
"form": []
24246+
}
24247+
],
24248+
"disclosurePolicy": [
24249+
{
24250+
"label": "Policy",
24251+
"language": "",
24252+
"url": "https://static.omnissa.com/uploads/omnissa-external-vulnerability-response-and-remediation-policy.pdf"
24253+
}
24254+
],
24255+
"securityAdvisories": {
24256+
"alerts": [],
24257+
"advisories": [
24258+
{
24259+
"label": "Advisories",
24260+
"url": "https://www.omnissa.com/omnissa-security-response/"
24261+
}
24262+
]
24263+
},
24264+
"resources": [],
24265+
"CNA": {
24266+
"isRoot": false,
24267+
"root": {
24268+
"shortName": "n/a",
24269+
"organizationName": "n/a"
24270+
},
24271+
"roles": [
24272+
{
24273+
"helpText": "",
24274+
"role": "CNA"
24275+
}
24276+
],
24277+
"TLR": {
24278+
"shortName": "mitre",
24279+
"organizationName": "MITRE Corporation"
24280+
},
24281+
"type": [
24282+
"Vendor"
24283+
]
24284+
},
24285+
"country": "USA"
2423024286
}
2423124287
]

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1169,7 +1169,7 @@
11691169
},
11701170
{
11711171
"month": "November",
1172-
"value": "5"
1172+
"value": "6"
11731173
},
11741174
{
11751175
"month": "December",

src/assets/data/navigation.json

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -151,8 +151,7 @@
151151
"Structure": {
152152
"id": "3.0",
153153
"label": "Structure",
154-
"path": "Structure",
155-
"items": {}
154+
"path": "Structure"
156155
},
157156
"Program Relationship with Partners": {
158157
"id": "3.1",
@@ -168,7 +167,7 @@
168167
"label": "External Partners"
169168
},
170169
"Additional Resources": {
171-
"anchorId": "AdditonalResources",
170+
"anchorId": "AdditionalResources",
172171
"label": "Additional Resources"
173172
}
174173
}

src/assets/data/news.json

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,73 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 442,
5+
"newsType": "news",
6+
"title": "Omnissa Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "Omnissa Added as CNA",
8+
"date": "2024-11-19",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/Omnissa'>Omnissa, LLC</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for all Omnissa products and services, including Workspace ONE and Horizon."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>421 CNAs</a> (419 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Omnissa is the 228th CNA from USA."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "Omnissa’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 441,
26+
"newsType": "blog",
27+
"title": "Vulnerability Data Enrichment for CVE Records: 224 CNAs on the Enrichment Recognition List for November 18, 2024",
28+
"urlKeywords": "CNA Enrichment Recognition List Update",
29+
"date": "2024-11-19",
30+
"author": {
31+
"name": "CVE Program",
32+
"organization": {
33+
"name": "CVE Program",
34+
"url": ""
35+
},
36+
"title": "",
37+
"bio": ""
38+
},
39+
"description": [
40+
{
41+
"contentnewsType": "paragraph",
42+
"content": "The “<a href='/About/Metrics#CNAEnrichmentRecognition'>CNA Enrichment Recognition List</a>” for November 18, 2024, is now available with 224 CNAs listed. Published every two weeks on the CVE website, the list recognizes those <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> that are actively providing enhanced vulnerability data in their <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a>. CNAs are added to the list if they provide <a href='https://www.first.org/cvss/' target='_blank'>Common Vulnerability Scoring System (CVSS)</a> and <a href='https://cwe.mitre.org/' target='_blank'>Common Weakness Enumeration (CWE&trade;)</a> information 98% of the time or more within the two-week period of their last published CVE Record."
43+
},
44+
{
45+
"contentnewsType": "paragraph",
46+
"content": "For more about the recognition list, see “<a href='/Media/News/item/blog/2024/09/10/CNA-Enrichment-Recognition-List'>Recognition for CNAs Actively Providing Vulnerability Data Enrichment for CVE Records</a>.” To learn more about vulnerability information types like CVSS and CWE, see the <a href='/CVERecord/UserGuide'>CVE Record User Guide</a>. View the most current CNA Enrichment Recognition List on the CVE website Metrics page <a href='/About/Metrics#CNAEnrichmentRecognition'>here</a>."
47+
},
48+
{
49+
"contentnewsType": "paragraph",
50+
"content": "CNA Enrichment Recognition List for November 18, 2024, with 224 CNAs listed: <ul><li>9front Systems</li><li>Absolute Software</li><li>Acronis International GmbH</li><li>Adobe Systems Incorporated</li><li>Advanced Micro Devices Inc.</li><li>AlgoSec</li><li>Amazon</li><li>AMI</li><li>AppCheck Ltd.</li><li>Arista Networks, Inc.</li><li>Asea Brown Boveri Ltd.</li><li>ASR Microelectronics Co., Ltd.</li><li>Autodesk</li><li>Automotive Security Research Group (ASRG)</li><li>Avaya Inc.</li><li>Axis Communications AB</li><li>Baicells Technologies Co., Ltd.</li><li>Baidu, Inc.</li><li>Baxter Healthcare</li><li>Becton, Dickinson and Company (BD)</li><li>BeyondTrust Inc.</li><li>Bitdefender</li><li>BlackBerry</li><li>Brocade Communications Systems, Inc.</li><li>Canon EMEA</li><li>Canon Inc.</li><li>Carrier Global Corporation</li><li>Cato Networks</li><li>CERT.PL</li><li>CERT@VDE</li><li>Check Point Software Technologies Ltd.</li><li>Checkmarx</li><li>Checkmk GmbH</li><li>Ciena Corporation</li><li>cirosec GmbH</li><li>Cisco Systems, Inc.</li><li>ClickHouse, Inc.</li><li>Cloudflare, Inc.</li><li>Concrete CMS</li><li>CyberDanube</li><li>Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government</li><li>Dassault Systèmes</li><li>Dell EMC</li><li>Dfinity Foundation</li><li>DirectCyber</li><li>Docker Inc.</li><li>dotCMS LLC</li><li>Dragos, Inc.</li><li>Dutch Institute for Vulnerability Disclosure (DIVD)</li><li>Eaton</li><li>Eclipse Foundation</li><li>ELAN Microelectronics Corp.</li><li>Elastic</li><li>EnterpriseDB Corporation</li><li>Environmental Systems Research Institute, Inc. (Esri)</li><li>Ericsson</li><li>ESET, spol. s r.o.</li><li>EU Agency for Cybersecurity (ENISA)</li><li>Exodus Intelligence</li><li>F5 Networks</li><li>Flexera Software LLC</li><li>Fluid Attacks</li><li>Forcepoint</li><li>Forescout Technologies</li><li>ForgeRock, Inc.</li><li>Fortinet, Inc.</li><li>Fortra, LLC</li><li>Gallagher Group Ltd</li><li>GE Healthcare</li><li>Genetec Inc.</li><li>Gitea Limited</li><li>GitHub (maintainer security advisories)</li><li>GitHub Inc, (Products Only)</li><li>GitLab Inc.</li><li>Glyph & Cog, LLC</li><li>Google LLC</li><li>Grafana Labs</li><li>Hanwha Vision Co., Ltd.</li><li>HashiCorp Inc.</li><li>HeroDevs</li><li>HiddenLayer, Inc.</li><li>Hillstone Networks Inc.</li><li>Hitachi Energy</li><li>Hitachi Vantara</li><li>Hitachi, Ltd.</li><li>Honeywell International Inc.</li><li>HP Inc.</li><li>Huawei Technologies</li><li>HYPR Corp</li><li>ICS-CERT</li><li>IDEMIA</li><li>Indian Computer Emergency Response Team (CERT-In)</li><li>Intel Corporation</li><li>Israel National Cyber Directorate</li><li>Ivanti</li><li>Jamf</li><li>JetBrains s.r.o.</li><li>Johnson Controls</li><li>JPCERT/CC</li><li>Kaspersky</li><li>KNIME AG</li><li>KrCERT/CC</li><li>Kubernetes</li><li>Lenovo Group Ltd.</li><li>Lexmark International Inc.</li><li>LG Electronics</li><li>Liferay, Inc.</li><li>Logitech</li><li>M-Files Corporation</li><li>ManageEngine</li><li>Mattermost, Inc</li><li>Mautic</li><li>Microchip Technology</li><li>Microsoft Corporation</li><li>Milestone Systems A/S</li><li>Mitsubishi Electric Corporation</li><li>MongoDB</li><li>Moxa Inc.</li><li>N-able</li><li>National Cyber Security Centre - Netherlands (NCSC-NL)</li><li>National Cyber Security Centre SK-CERT</li><li>National Instruments</li><li>Netflix, Inc.</li><li>Netskope</li><li>Network Optix</li><li>NLnet Labs</li><li>NortonLifeLock Inc</li><li>Nozomi Networks Inc.</li><li>Nvidia Corporation</li><li>Octopus Deploy</li><li>Okta</li><li>ONEKEY GmbH</li><li>Open Design Alliance</li><li>Open-Xchange</li><li>OpenAnolis</li><li>openEuler</li><li>OpenHarmony</li><li>OpenText (formerly Micro Focus)</li><li>OTRS AG</li><li>Palantir Technologies</li><li>Palo Alto Networks</li><li>Panasonic Holdings Corporation</li><li>Pandora FMS</li><li>PaperCut Software Pty Ltd</li><li>Patchstack OÜ</li><li>Payara</li><li>Pegasystems</li><li>Pentraze Cybersecurity</li><li>Perforce</li><li>Ping Identity Corporation</li><li>PostgreSQL</li><li>Progress Software Corporation</li><li>Proofpoint Inc.</li><li>Protect AI</li><li>Pure Storage, Inc.</li><li>QNAP Systems, Inc.</li><li>Qualcomm, Inc.</li><li>Qualys, Inc.</li><li>rami.io GmbH</li><li>Rapid7, Inc.</li><li>Robert Bosch GmbH</li><li>Rockwell Automation</li><li>SailPoint Technologies</li><li>Samsung TV & Appliance</li><li>SBA Research gGmbH</li><li>Schneider Electric SE</li><li>Schweitzer Engineering Laboratories, Inc.</li><li>Secomea</li><li>Securin</li><li>Security Risk Advisors</li><li>ServiceNow</li><li>SHENZHEN CoolKit Technology CO., LTD.</li><li>SICK AG</li><li>Siemens</li><li>Sierra Wireless Inc.</li><li>Silicon Labs</li><li>Snow Software</li><li>Snyk</li><li>SoftIron</li><li>SolarWinds</li><li>Sonatype Inc.</li><li>Sophos</li><li>Spanish National Cybersecurity Institute, S.A.</li><li>Splunk</li><li>STAR Labs SG Pte. Ltd.</li><li>Switzerland National Cyber Security Centre (NCSC)</li><li>Synaptics</li><li>Synology Inc.</li><li>Talos</li><li>TeamViewer Germany GmbH</li><li>Temporal Technologies Inc.</li><li>Tenable Network Security, Inc.</li><li>Thales Group</li><li>The Document Foundation</li><li>The Missing Link Australia (TML)</li><li>The Tcpdump Group</li><li>The Wikimedia Foundation</li><li>TianoCore.org</li><li>Tigera</li><li>Toshiba Corporation</li><li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li><li>Trellix</li><li>TWCERT/CC</li><li>upKeeper Solutions</li><li>VulDB</li><li>VulnCheck</li><li>VULSec Labs</li><li>WatchGuard Technologies, Inc.</li><li>Western Digital</li><li>Wiz, Inc.</li><li>Wordfence</li><li>Xerox Corporation</li><li>Xiaomi Technology Co Ltd</li><li>Yandex N.V.</li><li>Yokogawa Group</li><li>Yugabyte, Inc.</li><li>Zabbix</li><li>Zephyr Project</li><li>Zero Day Initiative</li><li>Zoom Video Communications, Inc.</li><li>Zscaler, Inc.</li><li>ZTE Corporation</li><li>ZUSO Advanced Research Team (ZUSO ART)</li><li>Zyxel Corporation</li></ul>"
51+
}
52+
]
53+
},
54+
{
55+
"id": 440,
56+
"newsType": "news",
57+
"title": "Minutes from CVE Board Teleconference Meeting on October 30 Now Available",
58+
"urlKeywords": "CVE Board Minutes from October 30",
59+
"date": "2024-11-19",
60+
"description": [
61+
{
62+
"contentnewsType": "paragraph",
63+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on October 30, 2024. Read the <a href='https://cve.mitre.org/community/board/meeting_summaries/30_October_2024.pdf' target='_blank'>meeting minutes summary</a>."
64+
},
65+
{
66+
"contentnewsType": "paragraph",
67+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
68+
}
69+
]
70+
},
371
{
472
"id": 439,
573
"newsType": "news",

src/assets/style/globals.scss

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -561,6 +561,15 @@ label {
561561
overflow-x: auto
562562
}
563563

564+
.cve-scroll-box {
565+
max-height: 15rem;
566+
border-bottom: 1px solid lightgray;
567+
overflow-y: scroll;
568+
border-top: 1px solid lightgray;
569+
padding: .75rem
570+
}
571+
572+
564573
.cve-w-100 {
565574
width: 100%;
566575
}
@@ -575,6 +584,7 @@ label {
575584
background-color: rgba(0, 0, 0, .5);
576585
box-shadow: 0 0 1px rgba(255, 255, 255, .5);
577586
}
587+
578588
/* Other ends here*/
579589

580590
/* Third party CSS */

src/components/AdpVulnerabilityEnrichment.vue

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -71,12 +71,12 @@
7171
</div>
7272
</div>
7373
</div>
74-
<div id="cve-kevs" v-if="kevs.length > 0 && roleName === 'adp'" class="cve-scroll-border-bottom mt-5">
74+
<div id="cve-kevs" v-if="kevs.length > 0 && roleName === 'adp'" class="mt-5">
7575
<h4 class="title mb-0">KEV <span class="tag">{{ kevs.length }} Total</span></h4>
76-
<div class="cve-learn-more cve-scroll-border-bottom">
76+
<div class="cve-learn-more ">
7777
<router-link to="/CVERecord/UserGuide/#cve-kev" class="cve-learn-more-link">Learn more</router-link>
7878
</div>
79-
<div class="cve-y-scroll mt-3 mb-3">
79+
<div class="cve-y-scroll cve-scroll-box mt-3">
8080
<ul class="mt-1">
8181
<li v-for="kev in kevs" :key="kev.key">
8282
<a :href="kev.reference" target="_blank">{{ kev.reference }}</a><span class="is-italic cve-help-text"> ({{ kev.dateAdded }})</span>
@@ -131,13 +131,13 @@
131131
</div>
132132
</div>
133133
<div v-if="roleName !== 'cveProgram'">
134-
<div id="cve-cwes" v-if="cwes.length > 0" class="cve-scroll-border-bottom mt-5">
134+
<div id="cve-cwes" v-if="cwes.length > 0" class="mt-5">
135135
<h4 class="title mb-0">CWE <span class="tag">{{ cwes.length }} Total</span></h4>
136-
<div class="cve-learn-more cve-scroll-border-bottom mb-5">
136+
<div class="cve-learn-more mb-3">
137137
<router-link to="/CVERecord/UserGuide/#cve-cwe" class="cve-learn-more-link">Learn more</router-link>
138138
</div>
139-
<div class="cve-y-scroll">
140-
<ul class="mt-0 mb-3">
139+
<div class="cve-y-scroll cve-scroll-box">
140+
<ul class="mt-0 mb-0">
141141
<li v-for="cwe in cwes" :key="cwe.key">
142142
<a v-if="cwe.cweId !== 'CWE ID not provided'" :href="`https://cwe.mitre.org/data/definitions/${cwe.cweNumber}.html`" target="_blank">
143143
<span class="has-text-weight-bold">{{ cwe.cweId }}<span v-if="cwe.description.length > 0">: </span></span>
@@ -406,11 +406,14 @@ export default {
406406
}
407407
},
408408
getCveProgramReferences(){
409-
if (this.containerObject.providerMetadata.shortName.toLowerCase() !== useCveRecordLookupStore().cveProgramShortName) return;
409+
if (this.containerObject.providerMetadata.shortName?.toLowerCase() !== useCveRecordLookupStore().cveProgramShortName) return;
410410
this.cveProgramReferences = useCveRecordLookupStore().getReferences(this.containerObject.references);
411411
},
412412
getUpdatedDate() {
413-
this.dateUpdated = this.getDate(this.containerObject.providerMetadata.dateUpdated);
413+
if(this.containerObject.providerMetadata?.dateUpdated) {
414+
this.dateUpdated = this.getDate(this.containerObject.providerMetadata?.dateUpdated);
415+
}
416+
414417
},
415418
getDate(dateTime) {
416419
const [date] = dateTime.split('T');
@@ -460,7 +463,4 @@ export default {
460463
overflow-y: scroll;
461464
}
462465
463-
.cve-scroll-border-bottom {
464-
border-bottom: 1px solid lightgray;
465-
}
466466
</style>

src/components/CveRecordReferences.vue

Lines changed: 23 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3,23 +3,25 @@
33
class="mt-5"
44
style="word-break:break-all;"
55
>
6-
<h4 class="title mb-0">References</h4>
7-
<ul>
8-
<li v-for="(reference, index) in references" :key="`link-${index}`" class="cve-word-wrap">
9-
<span class="icon-text">
10-
<a :href="reference.url" target="_blank">
11-
{{ (typeof reference.name !== 'undefined' && reference.name.length > 0) ? `${reference.hostname}: ${reference.name}` : reference.url }}
12-
<span class="icon cve-icon-xxs">
13-
<p id="enewsletter" class="is-hidden">external site</p>
14-
<font-awesome-icon icon="external-link-alt" aria-labelledby="enewsletter"></font-awesome-icon>
15-
</span>
16-
</a>
17-
</span>
18-
<span v-for="tag in reference.tags" :key="tag">
19-
<span class="tag ml-2" v-if="tag.length > 0">{{tag}}</span>
20-
</span>
21-
</li>
22-
</ul>
6+
<h4 class="title mb-3">References <span class="tag">{{ references.length }} Total</span></h4>
7+
<div class="cve-scroll-box">
8+
<ul class="mt-0">
9+
<li v-for="(reference, index) in references" :key="`link-${index}`" class="cve-word-wrap">
10+
<span class="icon-text">
11+
<a :href="reference.url" target="_blank">
12+
{{ (typeof reference.name !== 'undefined' && reference.name.length > 0) ? `${reference.hostname}: ${reference.name}` : reference.url }}
13+
<span class="icon cve-icon-xxs">
14+
<p id="enewsletter" class="is-hidden">external site</p>
15+
<font-awesome-icon icon="external-link-alt" aria-labelledby="enewsletter"></font-awesome-icon>
16+
</span>
17+
</a>
18+
</span>
19+
<span v-for="tag in reference.tags" :key="tag">
20+
<span class="tag ml-2" v-if="tag.length > 0">{{tag}}</span>
21+
</span>
22+
</li>
23+
</ul>
24+
</div>
2325
</div>
2426
</template>
2527

@@ -32,4 +34,7 @@ export default {
3234
}
3335
}
3436
}
35-
</script>
37+
</script>
38+
<style lang="scss">
39+
@import '@/assets/style/globals.scss';
40+
</style>

0 commit comments

Comments
 (0)