Skip to content

Commit 838b6f7

Browse files
authored
1/14/25 release branch (#3411)
1 parent 894419b commit 838b6f7

5 files changed

Lines changed: 65 additions & 35 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2141,7 +2141,7 @@
21412141
"shortName": "drupal",
21422142
"cnaID": "CNA-2017-0002",
21432143
"organizationName": "Drupal.org",
2144-
"scope": "All projects hosted under drupal.org only",
2144+
"scope": "All projects hosted under <a href='https://www.drupal.org' target='_blank'>drupal.org</a>, including End of Life (EOL) code",
21452145
"contact": [
21462146
{
21472147
"email": [
@@ -24701,7 +24701,7 @@
2470124701
"email": [
2470224702
{
2470324703
"label": "Email",
24704-
"emailAddr": "security@delinea.com"
24704+
"emailAddr": "cve@delinea.com"
2470524705
}
2470624706
],
2470724707
"contact": [],

src/assets/data/events.json

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@
88
"permission": "private",
99
"url": "/ProgramOrganization/WorkingGroups#CVEArtificialIntelligenceWorkingGroupCVEAIWG",
1010
"date": {
11-
"start": "2024-10-15",
12-
"end": "2024-12-31",
11+
"start": "2025-01-01",
12+
"end": "2025-12-31",
1313
"repeat": {
1414
"day": "Monday",
1515
"recurrence": "biweekly"
@@ -51,8 +51,8 @@
5151
"permission": "private",
5252
"url": "/ProgramOrganization/WorkingGroups#VulnerabilityConferenceandEventsWorkingGroupVCEWG",
5353
"date": {
54-
"start": "2024-01-01",
55-
"end": "2024-12-31",
54+
"start": "2025-01-01",
55+
"end": "2025-12-31",
5656
"repeat": {
5757
"day": "Tuesday",
5858
"recurrence": "weekly"
@@ -184,8 +184,8 @@
184184
"permission": "private",
185185
"url": "/ProgramOrganization/WorkingGroups#TacticalWorkingGroupTWG",
186186
"date": {
187-
"start": "2024-01-01",
188-
"end": "2024-12-31",
187+
"start": "2025-01-01",
188+
"end": "2025-12-31",
189189
"repeat": {
190190
"day": "Thursday",
191191
"recurrence": "weekly"
@@ -373,7 +373,7 @@
373373
"end": "2024-12-31",
374374
"repeat": {
375375
"day": "Wednesday",
376-
"recurrence": "weekly"
376+
"recurrence": "biweekly"
377377
}
378378
}
379379
},
@@ -385,8 +385,8 @@
385385
"permission": "private",
386386
"url": "/ProgramOrganization/WorkingGroups#AutomationWorkingGroupAWG",
387387
"date": {
388-
"start": "2024-01-01",
389-
"end": "2024-12-31",
388+
"start": "2025-01-01",
389+
"end": "2025-12-31",
390390
"repeat": {
391391
"day": "Tuesday",
392392
"recurrence": "weekly"
@@ -401,8 +401,8 @@
401401
"permission": "private",
402402
"url": "/ProgramOrganization/WorkingGroups#CNAOrganizationOfPeersCOOP",
403403
"date": {
404-
"start": "2024-01-01",
405-
"end": "2024-12-31",
404+
"start": "2025-01-01",
405+
"end": "2025-12-31",
406406
"repeat": {
407407
"day": "Wednesday",
408408
"recurrence": "biweekly"
@@ -433,8 +433,8 @@
433433
"permission": "private",
434434
"url": "/ProgramOrganization/WorkingGroups#QualityWorkingGroupQWG",
435435
"date": {
436-
"start": "2024-01-01",
437-
"end": "2024-12-31",
436+
"start": "2025-01-01",
437+
"end": "2025-12-31",
438438
"repeat": {
439439
"day": "Thursday",
440440
"recurrence": "biweekly"
@@ -449,11 +449,11 @@
449449
"permission": "private",
450450
"url": "/ProgramOrganization/WorkingGroups#OutreachandCommunicationsWorkingGroupOCWG",
451451
"date": {
452-
"start": "2024-01-01",
453-
"end": "2024-12-31",
452+
"start": "2025-01-01",
453+
"end": "2025-12-31",
454454
"repeat": {
455455
"day": "Friday",
456-
"recurrence": "weekly"
456+
"recurrence": "biweekly"
457457
}
458458
}
459459
},

src/assets/data/news.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,35 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 467,
5+
"newsType": "blog",
6+
"title": "Vulnerability Data Enrichment for CVE Records: 236 CNAs on the Enrichment Recognition List for January 13, 2025",
7+
"urlKeywords": "CNA Enrichment Recognition List Update",
8+
"date": "2025-01-14",
9+
"author": {
10+
"name": "CVE Program",
11+
"organization": {
12+
"name": "CVE Program",
13+
"url": ""
14+
},
15+
"title": "",
16+
"bio": ""
17+
},
18+
"description": [
19+
{
20+
"contentnewsType": "paragraph",
21+
"content": "The “<a href='/About/Metrics#CNAEnrichmentRecognition'>CNA Enrichment Recognition List</a>” for January 13, 2025, is now available with 236 CNAs listed. Published every two weeks on the CVE website, the list recognizes those <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> that are actively providing enhanced vulnerability data in their <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a>. CNAs are added to the list if they provide <a href='https://www.first.org/cvss/' target='_blank'>Common Vulnerability Scoring System (CVSS)</a> and <a href='https://cwe.mitre.org/' target='_blank'>Common Weakness Enumeration (CWE&trade;)</a> information 98% of the time or more within the two-week period of their last published CVE Record."
22+
},
23+
{
24+
"contentnewsType": "paragraph",
25+
"content": "For more about the recognition list, see “<a href='/Media/News/item/blog/2024/09/10/CNA-Enrichment-Recognition-List'>Recognition for CNAs Actively Providing Vulnerability Data Enrichment for CVE Records</a>.” To learn more about vulnerability information types like CVSS and CWE, see the <a href='/CVERecord/UserGuide'>CVE Record User Guide</a>. View the most current CNA Enrichment Recognition List on the CVE website Metrics page <a href='/About/Metrics#CNAEnrichmentRecognition'>here</a>."
26+
},
27+
{
28+
"contentnewsType": "paragraph",
29+
"content": "CNA Enrichment Recognition List for January 13, 2025, with 236 CNAs listed: <ul><li>9front Systems</li><li>Absolute Software</li><li>Acronis International GmbH</li><li>Adobe Systems Incorporated</li><li>Advanced Micro Devices Inc.</li><li>AlgoSec</li><li>Alias Robotics S.L.</li><li>Amazon</li><li>AMI</li><li>AppCheck Ltd.</li><li>ARC Informatique</li><li>Asea Brown Boveri Ltd.</li><li>ASR Microelectronics Co., Ltd.</li><li>Autodesk</li><li>Automotive Security Research Group (ASRG)</li><li>Avaya Inc.</li><li>Axis Communications AB</li><li>Baicells Technologies Co., Ltd.</li><li>Baidu, Inc.</li><li>Baxter Healthcare</li><li>Becton, Dickinson and Company (BD)</li><li>BeyondTrust Inc.</li><li>Bitdefender</li><li>Black Duck Software, Inc.</li><li>BlackBerry</li><li>Brocade Communications Systems, Inc.</li><li>Canon EMEA</li><li>Canon Inc.</li><li>Carrier Global Corporation</li><li>Cato Networks</li><li>CERT.PL</li><li>CERT@VDE</li><li>Check Point Software Technologies Ltd.</li><li>Checkmarx</li><li>Checkmk GmbH</li><li>Ciena Corporation</li><li>cirosec GmbH</li><li>Cisco Systems, Inc.</li><li>ClickHouse, Inc.</li><li>Cloudflare, Inc.</li><li>Concrete CMS</li><li>CyberArk Labs</li><li>CyberDanube</li><li>Dassault Systèmes</li><li>Delinea, Inc.</li><li>Dell EMC</li><li>Dfinity Foundation</li><li>DirectCyber</li><li>Docker Inc.</li><li>dotCMS LLC</li><li>Dragos, Inc.</li><li>Dutch Institute for Vulnerability Disclosure (DIVD)</li><li>Eaton</li><li>Eclipse Foundation</li><li>ELAN Microelectronics Corp.</li><li>Elastic</li><li>EnterpriseDB Corporation</li><li>Environmental Systems Research Institute, Inc. (Esri)</li><li>Ericsson</li><li>ESET, spol. s r.o.</li><li>EU Agency for Cybersecurity (ENISA)</li><li>Exodus Intelligence</li><li>F5 Networks</li><li>Fedora Project (Infrastructure Software)</li><li>Flexera Software LLC</li><li>Fluid Attacks</li><li>Forcepoint</li><li>Forescout Technologies</li><li>ForgeRock, Inc.</li><li>Fortinet, Inc.</li><li>Fortra, LLC</li><li>Gallagher Group Ltd</li><li>GE Healthcare</li><li>Genetec Inc.</li><li>Gitea Limited</li><li>GitHub (maintainer security advisories)</li><li>GitHub Inc, (Products Only)</li><li>GitLab Inc.</li><li>Glyph & Cog, LLC</li><li>Google LLC</li><li>Grafana Labs</li><li>Gridware Cybersecurity</li><li>Hanwha Vision Co., Ltd.</li><li>HashiCorp Inc.</li><li>HCL Software</li><li>HeroDevs</li><li>HiddenLayer, Inc.</li><li>Hillstone Networks Inc.</li><li>Hitachi Energy</li><li>Hitachi Vantara</li><li>Hitachi, Ltd.</li><li>Honeywell International Inc.</li><li>HP Inc.</li><li>Huawei Technologies</li><li>HYPR Corp</li><li>ICS-CERT</li><li>Indian Computer Emergency Response Team (CERT-In)</li><li>Intel Corporation</li><li>Israel National Cyber Directorate</li><li>Ivanti</li><li>Jamf</li><li>JetBrains s.r.o.</li><li>JFROG</li><li>Johnson Controls</li><li>JPCERT/CC</li><li>Juniper Networks, Inc.</li><li>Kaspersky</li><li>KNIME AG</li><li>KrCERT/CC</li><li>Kubernetes</li><li>Lenovo Group Ltd.</li><li>Lexmark International Inc.</li><li>LG Electronics</li><li>Liferay, Inc.</li><li>Logitech</li><li>M-Files Corporation</li><li>ManageEngine</li><li>Mattermost, Inc</li><li>Mautic</li><li>Microchip Technology</li><li>Microsoft Corporation</li><li>Milestone Systems A/S</li><li>Mitsubishi Electric Corporation</li><li>MongoDB</li><li>Moxa Inc.</li><li>N-able</li><li>National Cyber Security Centre - Netherlands (NCSC-NL)</li><li>National Cyber Security Centre Finland</li><li>National Cyber Security Centre SK-CERT</li><li>National Instruments</li><li>NEC Corporation</li><li>Netflix, Inc.</li><li>Netskope</li><li>NLnet Labs</li><li>NortonLifeLock Inc</li><li>Nozomi Networks Inc.</li><li>Octopus Deploy</li><li>Okta</li><li>ONEKEY GmbH</li><li>Open Design Alliance</li><li>Open-Xchange</li><li>OpenAnolis</li><li>openEuler</li><li>OpenHarmony</li><li>OpenText (formerly Micro Focus)</li><li>OPPO</li><li>OTRS AG</li><li>Palantir Technologies</li><li>Palo Alto Networks</li><li>Panasonic Holdings Corporation</li><li>Pandora FMS</li><li>PaperCut Software Pty Ltd</li><li>Patchstack OÜ</li><li>Payara</li><li>Pegasystems</li><li>Pentraze Cybersecurity</li><li>Perforce</li><li>PHP Group</li><li>Ping Identity Corporation</li><li>PlexTrac, Inc.</li><li>PostgreSQL</li><li>Progress Software Corporation</li><li>Proofpoint Inc.</li><li>Protect AI</li><li>Pure Storage, Inc.</li><li>Python Software Foundation</li><li>QNAP Systems, Inc.</li><li>Qualcomm, Inc.</li><li>rami.io GmbH</li><li>Rapid7, Inc.</li><li>Real-Time Innovations, Inc.</li><li>Robert Bosch GmbH</li><li>SailPoint Technologies</li><li>Samsung TV & Appliance</li><li>SAP SE</li><li>SBA Research gGmbH</li><li>Schneider Electric SE</li><li>Schweitzer Engineering Laboratories, Inc.</li><li>Secomea</li><li>Securin</li><li>Security Risk Advisors</li><li>ServiceNow</li><li>SHENZHEN CoolKit Technology CO., LTD.</li><li>SICK AG</li><li>Siemens</li><li>Silicon Labs</li><li>Snow Software</li><li>Snyk</li><li>SoftIron</li><li>SolarWinds</li><li>Sonatype Inc.</li><li>Sophos</li><li>Spanish National Cybersecurity Institute, S.A.</li><li>Splunk</li><li>STAR Labs SG Pte. Ltd.</li><li>Suse</li><li>Switzerland National Cyber Security Centre (NCSC)</li><li>Symantec - A Division of Broadcom</li><li>Synaptics</li><li>Synology Inc.</li><li>Talos</li><li>TeamViewer Germany GmbH</li><li>Teltonika Networks</li><li>Temporal Technologies Inc.</li><li>Tenable Network Security, Inc.</li><li>Thales Group</li><li>The Document Foundation</li><li>The Missing Link Australia (TML)</li><li>The Tcpdump Group</li><li>TianoCore.org</li><li>Tigera</li><li>Toshiba Corporation</li><li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li><li>TWCERT/CC</li><li>TXOne Networks, Inc.</li><li>upKeeper Solutions</li><li>Vivo Mobile Communication Technology Co.,LTD.</li><li>VulDB</li><li>VulnCheck</li><li>VULSec Labs</li><li>WatchGuard Technologies, Inc.</li><li>Western Digital</li><li>Wiz, Inc.</li><li>Wordfence</li><li>Xerox Corporation</li><li>Xiaomi Technology Co Ltd</li><li>Yandex N.V.</li><li>Yokogawa Group</li><li>Yugabyte, Inc.</li><li>Zephyr Project</li><li>Zero Day Initiative</li><li>Zoom Video Communications, Inc.</li><li>Zscaler, Inc.</li><li>ZTE Corporation</li><li>ZUSO Advanced Research Team (ZUSO ART)</li><li>Zyxel Corporation</li></ul>"
30+
}
31+
]
32+
},
333
{
434
"id": 466,
535
"newsType": "blog",

src/views/About/Metrics.vue

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -293,13 +293,10 @@
293293
their last published CVE Record. For more information about vulnerability information types like CVSS and CWE, see the
294294
<router-link to="/CVERecord/UserGuide">CVE Record User Guide</router-link>.
295295
</p>
296-
<p>
297-
<span class="is-italic">NOTE: The next update of the “CNA Enrichment Recognition List” will be on January 13, 2025.</span>
298-
</p>
299296
</div>
300297
<h3 class="title">CNA Enrichment Recognition List</h3>
301-
<p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>December 16, 2024</time><br/>
302-
<span class="has-text-weight-bold">Total CNAs: </span>233</p>
298+
<p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>January 13, 2025</time><br/>
299+
<span class="has-text-weight-bold">Total CNAs: </span>236</p>
303300
<div>
304301
<ul>
305302
<li>9front Systems</li>
@@ -308,23 +305,24 @@
308305
<li>Adobe Systems Incorporated</li>
309306
<li>Advanced Micro Devices Inc.</li>
310307
<li>AlgoSec</li>
308+
<li>Alias Robotics S.L.</li>
311309
<li>Amazon</li>
312310
<li>AMI</li>
313311
<li>AppCheck Ltd.</li>
314312
<li>ARC Informatique</li>
315-
<li>Arista Networks, Inc.</li>
316313
<li>Asea Brown Boveri Ltd.</li>
317314
<li>ASR Microelectronics Co., Ltd.</li>
318-
<li>ASUSTeK Computer Incorporation</li>
319315
<li>Autodesk</li>
320316
<li>Automotive Security Research Group (ASRG)</li>
321317
<li>Avaya Inc.</li>
322318
<li>Axis Communications AB</li>
323319
<li>Baicells Technologies Co., Ltd.</li>
324320
<li>Baidu, Inc.</li>
325321
<li>Baxter Healthcare</li>
322+
<li>Becton, Dickinson and Company (BD)</li>
326323
<li>BeyondTrust Inc.</li>
327324
<li>Bitdefender</li>
325+
<li>Black Duck Software, Inc.</li>
328326
<li>BlackBerry</li>
329327
<li>Brocade Communications Systems, Inc.</li>
330328
<li>Canon EMEA</li>
@@ -345,6 +343,8 @@
345343
<li>CyberArk Labs</li>
346344
<li>CyberDanube</li>
347345
<li>Dassault Systèmes</li>
346+
<li>Delinea, Inc.</li>
347+
<li>Dell EMC</li>
348348
<li>Dfinity Foundation</li>
349349
<li>DirectCyber</li>
350350
<li>Docker Inc.</li>
@@ -394,9 +394,7 @@
394394
<li>HP Inc.</li>
395395
<li>Huawei Technologies</li>
396396
<li>HYPR Corp</li>
397-
<li>IBM Corporation</li>
398397
<li>ICS-CERT</li>
399-
<li>IDEMIA</li>
400398
<li>Indian Computer Emergency Response Team (CERT-In)</li>
401399
<li>Intel Corporation</li>
402400
<li>Israel National Cyber Directorate</li>
@@ -405,6 +403,8 @@
405403
<li>JetBrains s.r.o.</li>
406404
<li>JFROG</li>
407405
<li>Johnson Controls</li>
406+
<li>JPCERT/CC</li>
407+
<li>Juniper Networks, Inc.</li>
408408
<li>Kaspersky</li>
409409
<li>KNIME AG</li>
410410
<li>KrCERT/CC</li>
@@ -426,6 +426,7 @@
426426
<li>Moxa Inc.</li>
427427
<li>N-able</li>
428428
<li>National Cyber Security Centre - Netherlands (NCSC-NL)</li>
429+
<li>National Cyber Security Centre Finland</li>
429430
<li>National Cyber Security Centre SK-CERT</li>
430431
<li>National Instruments</li>
431432
<li>NEC Corporation</li>
@@ -443,6 +444,7 @@
443444
<li>openEuler</li>
444445
<li>OpenHarmony</li>
445446
<li>OpenText (formerly Micro Focus)</li>
447+
<li>OPPO</li>
446448
<li>OTRS AG</li>
447449
<li>Palantir Technologies</li>
448450
<li>Palo Alto Networks</li>
@@ -465,13 +467,10 @@
465467
<li>Python Software Foundation</li>
466468
<li>QNAP Systems, Inc.</li>
467469
<li>Qualcomm, Inc.</li>
468-
<li>Qualys, Inc.</li>
469470
<li>rami.io GmbH</li>
470471
<li>Rapid7, Inc.</li>
471472
<li>Real-Time Innovations, Inc.</li>
472-
<li>Red Hat, Inc.</li>
473473
<li>Robert Bosch GmbH</li>
474-
<li>Rockwell Automation</li>
475474
<li>SailPoint Technologies</li>
476475
<li>Samsung TV & Appliance</li>
477476
<li>SAP SE</li>
@@ -488,6 +487,7 @@
488487
<li>Silicon Labs</li>
489488
<li>Snow Software</li>
490489
<li>Snyk</li>
490+
<li>SoftIron</li>
491491
<li>SolarWinds</li>
492492
<li>Sonatype Inc.</li>
493493
<li>Sophos</li>
@@ -496,6 +496,7 @@
496496
<li>STAR Labs SG Pte. Ltd.</li>
497497
<li>Suse</li>
498498
<li>Switzerland National Cyber Security Centre (NCSC)</li>
499+
<li>Symantec - A Division of Broadcom</li>
499500
<li>Synaptics</li>
500501
<li>Synology Inc.</li>
501502
<li>Talos</li>
@@ -507,14 +508,12 @@
507508
<li>The Document Foundation</li>
508509
<li>The Missing Link Australia (TML)</li>
509510
<li>The Tcpdump Group</li>
510-
<li>The Wikimedia Foundation</li>
511511
<li>TianoCore.org</li>
512512
<li>Tigera</li>
513513
<li>Toshiba Corporation</li>
514514
<li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li>
515-
<li>Trellix</li>
516-
<li>Trend Micro, Inc.</li>
517515
<li>TWCERT/CC</li>
516+
<li>TXOne Networks, Inc.</li>
518517
<li>upKeeper Solutions</li>
519518
<li>Vivo Mobile Communication Technology Co.,LTD.</li>
520519
<li>VulDB</li>
@@ -533,6 +532,7 @@
533532
<li>Zero Day Initiative</li>
534533
<li>Zoom Video Communications, Inc.</li>
535534
<li>Zscaler, Inc.</li>
535+
<li>ZTE Corporation</li>
536536
<li>ZUSO Advanced Research Team (ZUSO ART)</li>
537537
<li>Zyxel Corporation</li>
538538
</ul>

src/views/ProgramOrganization/WorkingGroups.vue

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -421,15 +421,15 @@
421421
</tr>
422422
<tr>
423423
<td data-label="Working Group" style="width: 55%">Outreach and Communications Working Group (OCWG)</td>
424-
<td data-label="Meeting Time">Every Friday 9:00am ET</td>
424+
<td data-label="Meeting Time">Every other Friday 9:00am ET</td>
425425
</tr>
426426
<tr>
427427
<td data-label="Working Group" style="width: 55%">Quality Working Group (QWG)</td>
428428
<td data-label="Meeting Time">Every other Thursday 4:00pm ET</td>
429429
</tr>
430430
<tr>
431431
<td data-label="Working Group" style="width: 55%">Strategic Planning Working Group (SPWG)</td>
432-
<td data-label="Meeting Time">Every Wednesday 4:00pm ET</td>
432+
<td data-label="Meeting Time">Every other Wednesday 4:00pm ET</td>
433433
</tr>
434434
<tr>
435435
<td data-label="Working Group" style="width: 55%">Tactical Working Group (TWG)</td>

0 commit comments

Comments
 (0)