|
147 | 147 | <p> |
148 | 148 | For additional information, visit the |
149 | 149 | <a href="https://github.com/CVEProject/cve-schema" target="_blank">cve-schema repository</a> |
150 | | - on GitHub or watch the “CVE JSON 5.x: Introduction/Guidance/Q&A (2022)”, “CVE JSON 5.x Guidance (2023),” and |
151 | | - “CVE JSON 5.0 Experiences (2023)” videos: |
| 150 | + on GitHub or watch the “CVE JSON 5.x: Introduction/Guidance/Q&A (2022)”, “CVE JSON 5.x Guidance (2023),” |
| 151 | + “CVE JSON 5.0 Experiences (2023)”, “Software ID: CPE and PURL (2025)”, and “CVE Record Format Roadmap (2025)”, videos: |
152 | 152 | </p> |
153 | 153 | <figure class="image is3by2"> |
154 | 154 | <iframe class="has-ratio" src="https://www.youtube.com/embed/YWZECqzRI7M" title="CVE JSON 5.x: Introduction/Tips/Guidance/Q&A (2022)" |
|
165 | 165 | allowfullscreen>dcEJ2t2jwhE |
166 | 166 | </iframe> |
167 | 167 | </figure> |
| 168 | + <figure class="image is3by2"> |
| 169 | + <iframe class="has-ratio" src="https://www.youtube.com/embed/p6nbl58iL28?si=s6hMkZBcMS9V_6EM" title="Software ID: CPE and PURL (2025)" frameborder="0" |
| 170 | + allowfullscreen>dcEJ2t2jwhE |
| 171 | + </iframe> |
| 172 | + </figure> |
| 173 | + <figure class="image is3by2"> |
| 174 | + <iframe class="has-ratio" src="https://www.youtube.com/embed/17rHENEiUIE?si=oHCW0o2_w4_GyGyl" title="CVE Record Format Roadmap (2025)" frameborder="0" |
| 175 | + allowfullscreen>dcEJ2t2jwhE |
| 176 | + </iframe> |
| 177 | + </figure> |
168 | 178 |
|
169 | 179 |
|
170 | 180 | <h4 class="title">Current Version of CVE Record Format Schema</h4> |
171 | 181 | <p> |
172 | 182 | The current official version of the CVE Record Format Schema in CVE JSON is |
173 | | - <a href="https://github.com/CVEProject/cve-schema/releases/tag/v5.1.1" target="_blank">Version 5.1.1</a>. |
| 183 | + <a href="https://github.com/CVEProject/cve-schema/releases/tag/v5.2.0" target="_blank">Version 5.2.0</a>. |
174 | 184 | </p> |
175 | 185 | <p> |
176 | 186 | A single schema file with bundled dependencies is available in the |
|
211 | 221 | To obtain CVE Services Organizational Administrator (OA) credentials, CNAs should contact their Root |
212 | 222 | (<router-link to="/PartnerInformation/ListofPartners/partner/icscert">CISA ICS</router-link>, |
213 | 223 | <router-link to="/PartnerInformation/ListofPartners/partner/CERTVDE">CERT@VDE</router-link>, |
| 224 | + <router-link to='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</router-link>, |
214 | 225 | <router-link to="/PartnerInformation/ListofPartners/partner/Google">Google</router-link>, |
215 | 226 | <router-link to="/PartnerInformation/ListofPartners/partner/INCIBE">INCIBE</router-link>, |
216 | 227 | <router-link to="/PartnerInformation/ListofPartners/partner/jpcert">JPCERT/CC</router-link>, |
|
642 | 653 | <ul> |
643 | 654 | <li> |
644 | 655 | <a href="https://github.com/CVEProject/cve-schema/releases" target="_blank"> |
645 | | - CVE JSON 5.1.1 Schema (Current Version) |
| 656 | + CVE JSON Schema (Current Version) |
646 | 657 | </a> |
647 | 658 | </li> |
648 | 659 | <li> |
|
671 | 682 | </ul> |
672 | 683 | <p>Other helpful resources:</p> |
673 | 684 | <ul> |
| 685 | + <li> |
| 686 | + <a href="https://www.youtube.com/playlist?list=PLWfD9RQVdJ6dT8VZntG-DsK7c34rNNMMv" target="_blank"> |
| 687 | + CVE Program CNA Workshop 2025 (12 Videos)</a> |
| 688 | + </li> |
674 | 689 | <li> |
675 | 690 | <a href="https://www.youtube.com/playlist?list=PLWfD9RQVdJ6c4D_PAvO9hgtQSDTD2epOo" target="_blank"> |
676 | 691 | CVE Program CNA Workshop 2024 (15 Videos)</a> |
|
0 commit comments