Skip to content

Commit 620301c

Browse files
authored
2/24/26 release branch (#3859)
* #3853 Upate CVE Services page * #3854 Fix bullet item code in section 3.2.6 * #3857 Update Metrics table 1 descriptive text * #3858 News article @ Board Minutes from 1/21/26 * #3852 Add 1 new CNA * #3857 text updates * #3858 Add 1/21/26 minutes to Board Archive page
1 parent 1befdf8 commit 620301c

7 files changed

Lines changed: 131 additions & 13 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28414,5 +28414,63 @@
2841428414
]
2841528415
},
2841628416
"country": "Türkiye"
28417+
},
28418+
{
28419+
"shortName": "JupiterOne",
28420+
"cnaID": "CNA-2026-0011",
28421+
"organizationName": "JupiterOne, Inc.",
28422+
"scope": "All JupiterOne open source and commercial products.",
28423+
"contact": [
28424+
{
28425+
"email": [
28426+
{
28427+
"label": "Email",
28428+
"emailAddr": "security@jupiterone.com"
28429+
}
28430+
],
28431+
"contact": [],
28432+
"form": []
28433+
}
28434+
],
28435+
"disclosurePolicy": [
28436+
{
28437+
"label": "Policy",
28438+
"language": "",
28439+
"url": "https://www.jupiterone.com/legal-and-security-hub"
28440+
}
28441+
],
28442+
"securityAdvisories": {
28443+
"alerts": [],
28444+
"advisories": [
28445+
{
28446+
"label": "Advisories",
28447+
"url": "https://docs.jupiterone.io/release-notes/"
28448+
}
28449+
]
28450+
},
28451+
"resources": [],
28452+
"CNA": {
28453+
"isRoot": false,
28454+
"root": {
28455+
"shortName": "icscert",
28456+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)"
28457+
},
28458+
"type": [
28459+
"Vendor",
28460+
"Hosted Service",
28461+
"Researcher"
28462+
],
28463+
"TLR": {
28464+
"shortName": "CISA",
28465+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA)"
28466+
},
28467+
"roles": [
28468+
{
28469+
"helpText": "",
28470+
"role": "CNA"
28471+
}
28472+
]
28473+
},
28474+
"country": "USA"
2841728475
}
2841828476
]

src/assets/data/boardMeetings.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
{
22
"2026": [
3+
{
4+
"name": "January 21, 2026 - teleconference",
5+
"path": "msg00314.html"
6+
},
37
{
48
"name": "January 7, 2026 - teleconference",
59
"path": "msg00310.html"

src/assets/data/cnaRules.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@
171171
"3.2.5.2 As noted in <a href='/ResourcesSupport/AllResources/CNARules#section_1-2_Adherence'>1.2.3.1</a>, serious or repeated failure to adhere to the CNA Operational Rules MUST be reviewed by the appropriate Root. The CVE Board MAY revoke CNA status.",
172172
"3.2.6 CVE ID Assignment and Vulnerability Disclosure",
173173
"The CVE Program itself does not follow or require a specific Vulnerability disclosure policy. CNAs and other CVE Program participants operate under a variety of Vulnerability disclosure policies. Some CNAs do not directly participate in Vulnerability disclosure. Common elements of a Vulnerability disclosure policy include:",
174-
"<ul><li>Making reasonable attempts to notify Suppliers</li><li>Providing good-quality Vulnerability reports</li><li>Describing Vulnerability report intake processes</li><li>Describing bug bounty policies and processes, if applicable</li><li>Setting expectations for response times</li><li>Providing an embargo period during which the Vulnerability will not be Publicly Disclosed <li>while the Supplier develops a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryF'>Fix</a> or mitigation</li><li>Coordinating the Public Disclosure date</li><li>Publishing Vulnerability advisories</li></ul>",
174+
"<ul><li>Making reasonable attempts to notify Suppliers</li><li>Providing good-quality Vulnerability reports</li><li>Describing Vulnerability report intake processes</li><li>Describing bug bounty policies and processes, if applicable</li><li>Setting expectations for response times</li><li>Providing an embargo period during which the Vulnerability will not be Publicly Disclosed while the Supplier develops a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryFix'>Fix</a> or mitigation</li><li>Coordinating the Public Disclosure date</li><li>Publishing Vulnerability advisories</li></ul>",
175175
"3.2.6.1 CNAs MUST publish guidance that describes how the CNA assigns CVE IDs and publishes CVE Records within the context of Vulnerability disclosure.",
176176
"3.2.6.2 CNAs MUST provide a URL to their CVE ID assignment and Vulnerability disclosure policies that will be included in the <a href='/PartnerInformation/ListofPartners'>List of Partners</a>.",
177177
"3.2.6.3 CNAs MAY require CVE ID assignment to be made using specific processes or mechanisms. Such processes or mechanisms MUST NOT conflict with the CNA Operational Rules.",

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1176,7 +1176,7 @@
11761176
},
11771177
{
11781178
"month": "February",
1179-
"value": "4"
1179+
"value": "5"
11801180
},
11811181
{
11821182
"month": "March",

src/assets/data/news.json

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,43 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 633,
5+
"newsType": "news",
6+
"title": "JupiterOne Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "JupiterOne Added as CNA",
8+
"date": "2026-02-24",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/JupiterOne'>JupiterOne, Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for all JupiterOne open source and commercial products."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>495 CNAs</a> (492 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>41 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. JupiterOne is the 266th CNA from USA."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "JupiterOne’s Root is the <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 632,
26+
"newsType": "news",
27+
"title": "Minutes from CVE Board Teleconference Meeting on January 21 Now Available",
28+
"urlKeywords": "CVE Board Minutes from January 21",
29+
"date": "2026-02-24",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on January 21, 2026. Read the <a href='https://www.mail-archive.com/cve-editorial-board-list@mitre.org/msg00314.html' target='_blank'>meeting minutes summary</a>."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
38+
}
39+
]
40+
},
341
{
442
"id": 631,
543
"newsType": "news",

src/views/About/Metrics.vue

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,16 @@
1010
<h2 :id="cvenavs['About']['submenu']['Metrics']['items']['Published CVE Records']['anchorId']" class="title">
1111
{{cvenavs['About']['submenu']['Metrics']['items']['Published CVE Records']['label']}}
1212
</h2>
13-
<p>Comparison of published <router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryRecord">CVE Records
14-
</router-link> by quarter for all years from 1999 to present.
13+
<p>
14+
Comparison of published
15+
<router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryRecord">CVE Records</router-link>
16+
by quarter for all years from 1999 to present.
1517
</p>
1618
<p class="cve-help-text">
17-
A CVE Record contains descriptive data, (i.e., a brief description and at least one reference) about a
18-
<router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryVulnerability">vulnerability</router-link> associated with
19-
a <router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryCVEID">CVE ID</router-link>. CVE Records are published by
20-
<router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryCNA">CVE Numbering Authorities (CNAs)</router-link>.
19+
This metrics table reflects a point-in-time snapshot of published CVE Records taken after the end of each quarter.
20+
As the year progresses, prior quarters are recalculated to reflect any status changes (e.g., to remove rejected records),
21+
with a final reconciliation performed at year-end to ensure accurate annual totals.
22+
Previous years are not recalculated when a new year starts.
2123
</p>
2224
<div class="field is-grouped is-grouped-right">
2325
<label class="label">Sort by:</label>
@@ -61,7 +63,8 @@
6163
</p>
6264
<p class="cve-help-text">
6365
A “Reserved” CVE ID is the initial state for a <router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryRecord">
64-
CVE Record</router-link>; when the associated CVE ID is reserved by a CNA.
66+
CVE Record</router-link>; when the associated CVE ID is reserved by a
67+
<router-link to="/ResourcesSupport/Glossary?activeTerm=glossaryCNA">CVE Numbering Authority (CNA)</router-link>.
6568
</p>
6669
<div class="field is-grouped is-grouped-right">
6770
<label class="label">Sort by:</label>

src/views/ResourcesSupport/AllResources/CveServices.vue

Lines changed: 19 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -147,8 +147,8 @@
147147
<p>
148148
For additional information, visit the
149149
<a href="https://github.com/CVEProject/cve-schema" target="_blank">cve-schema repository</a>
150-
on GitHub or watch the “CVE JSON 5.x: Introduction/Guidance/Q&A (2022)”, “CVE JSON 5.x Guidance (2023),” and
151-
“CVE JSON 5.0 Experiences (2023)” videos:
150+
on GitHub or watch the “CVE JSON 5.x: Introduction/Guidance/Q&A (2022)”, “CVE JSON 5.x Guidance (2023),”
151+
“CVE JSON 5.0 Experiences (2023)”, “Software ID: CPE and PURL (2025)”, and “CVE Record Format Roadmap (2025)”, videos:
152152
</p>
153153
<figure class="image is3by2">
154154
<iframe class="has-ratio" src="https://www.youtube.com/embed/YWZECqzRI7M" title="CVE JSON 5.x: Introduction/Tips/Guidance/Q&A (2022)"
@@ -165,12 +165,22 @@
165165
allowfullscreen>dcEJ2t2jwhE
166166
</iframe>
167167
</figure>
168+
<figure class="image is3by2">
169+
<iframe class="has-ratio" src="https://www.youtube.com/embed/p6nbl58iL28?si=s6hMkZBcMS9V_6EM" title="Software ID: CPE and PURL (2025)" frameborder="0"
170+
allowfullscreen>dcEJ2t2jwhE
171+
</iframe>
172+
</figure>
173+
<figure class="image is3by2">
174+
<iframe class="has-ratio" src="https://www.youtube.com/embed/17rHENEiUIE?si=oHCW0o2_w4_GyGyl" title="CVE Record Format Roadmap (2025)" frameborder="0"
175+
allowfullscreen>dcEJ2t2jwhE
176+
</iframe>
177+
</figure>
168178

169179

170180
<h4 class="title">Current Version of CVE Record Format Schema</h4>
171181
<p>
172182
The current official version of the CVE Record Format Schema in CVE JSON is
173-
<a href="https://github.com/CVEProject/cve-schema/releases/tag/v5.1.1" target="_blank">Version 5.1.1</a>.
183+
<a href="https://github.com/CVEProject/cve-schema/releases/tag/v5.2.0" target="_blank">Version 5.2.0</a>.
174184
</p>
175185
<p>
176186
A single schema file with bundled dependencies is available in the
@@ -211,6 +221,7 @@
211221
To obtain CVE Services Organizational Administrator (OA) credentials, CNAs should contact their Root
212222
(<router-link to="/PartnerInformation/ListofPartners/partner/icscert">CISA ICS</router-link>,
213223
<router-link to="/PartnerInformation/ListofPartners/partner/CERTVDE">CERT@VDE</router-link>,
224+
<router-link to='/PartnerInformation/ListofPartners/partner/ENISA'>ENISA</router-link>,
214225
<router-link to="/PartnerInformation/ListofPartners/partner/Google">Google</router-link>,
215226
<router-link to="/PartnerInformation/ListofPartners/partner/INCIBE">INCIBE</router-link>,
216227
<router-link to="/PartnerInformation/ListofPartners/partner/jpcert">JPCERT/CC</router-link>,
@@ -642,7 +653,7 @@
642653
<ul>
643654
<li>
644655
<a href="https://github.com/CVEProject/cve-schema/releases" target="_blank">
645-
CVE JSON 5.1.1 Schema (Current Version)
656+
CVE JSON Schema (Current Version)
646657
</a>
647658
</li>
648659
<li>
@@ -671,6 +682,10 @@
671682
</ul>
672683
<p>Other helpful resources:</p>
673684
<ul>
685+
<li>
686+
<a href="https://www.youtube.com/playlist?list=PLWfD9RQVdJ6dT8VZntG-DsK7c34rNNMMv" target="_blank">
687+
CVE Program CNA Workshop 2025 (12 Videos)</a>
688+
</li>
674689
<li>
675690
<a href="https://www.youtube.com/playlist?list=PLWfD9RQVdJ6c4D_PAvO9hgtQSDTD2epOo" target="_blank">
676691
CVE Program CNA Workshop 2024 (15 Videos)</a>

0 commit comments

Comments
 (0)