|
293 | 293 | their last published CVE Record. For more information about vulnerability information types like CVSS and CWE, see the |
294 | 294 | <router-link to="/CVERecord/UserGuide">CVE Record User Guide</router-link>. |
295 | 295 | </p> |
296 | | - <p> |
297 | | - <span class="is-italic">NOTE: The next update of the “CNA Enrichment Recognition List” will be on January 13, 2025.</span> |
298 | | - </p> |
299 | 296 | </div> |
300 | 297 | <h3 class="title">CNA Enrichment Recognition List</h3> |
301 | | - <p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>December 16, 2024</time><br/> |
302 | | - <span class="has-text-weight-bold">Total CNAs: </span>233</p> |
| 298 | + <p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>January 13, 2025</time><br/> |
| 299 | + <span class="has-text-weight-bold">Total CNAs: </span>236</p> |
303 | 300 | <div> |
304 | 301 | <ul> |
305 | 302 | <li>9front Systems</li> |
|
308 | 305 | <li>Adobe Systems Incorporated</li> |
309 | 306 | <li>Advanced Micro Devices Inc.</li> |
310 | 307 | <li>AlgoSec</li> |
| 308 | + <li>Alias Robotics S.L.</li> |
311 | 309 | <li>Amazon</li> |
312 | 310 | <li>AMI</li> |
313 | 311 | <li>AppCheck Ltd.</li> |
314 | 312 | <li>ARC Informatique</li> |
315 | | - <li>Arista Networks, Inc.</li> |
316 | 313 | <li>Asea Brown Boveri Ltd.</li> |
317 | 314 | <li>ASR Microelectronics Co., Ltd.</li> |
318 | | - <li>ASUSTeK Computer Incorporation</li> |
319 | 315 | <li>Autodesk</li> |
320 | 316 | <li>Automotive Security Research Group (ASRG)</li> |
321 | 317 | <li>Avaya Inc.</li> |
322 | 318 | <li>Axis Communications AB</li> |
323 | 319 | <li>Baicells Technologies Co., Ltd.</li> |
324 | 320 | <li>Baidu, Inc.</li> |
325 | 321 | <li>Baxter Healthcare</li> |
| 322 | + <li>Becton, Dickinson and Company (BD)</li> |
326 | 323 | <li>BeyondTrust Inc.</li> |
327 | 324 | <li>Bitdefender</li> |
| 325 | + <li>Black Duck Software, Inc.</li> |
328 | 326 | <li>BlackBerry</li> |
329 | 327 | <li>Brocade Communications Systems, Inc.</li> |
330 | 328 | <li>Canon EMEA</li> |
|
345 | 343 | <li>CyberArk Labs</li> |
346 | 344 | <li>CyberDanube</li> |
347 | 345 | <li>Dassault Systèmes</li> |
| 346 | + <li>Delinea, Inc.</li> |
| 347 | + <li>Dell EMC</li> |
348 | 348 | <li>Dfinity Foundation</li> |
349 | 349 | <li>DirectCyber</li> |
350 | 350 | <li>Docker Inc.</li> |
|
394 | 394 | <li>HP Inc.</li> |
395 | 395 | <li>Huawei Technologies</li> |
396 | 396 | <li>HYPR Corp</li> |
397 | | - <li>IBM Corporation</li> |
398 | 397 | <li>ICS-CERT</li> |
399 | | - <li>IDEMIA</li> |
400 | 398 | <li>Indian Computer Emergency Response Team (CERT-In)</li> |
401 | 399 | <li>Intel Corporation</li> |
402 | 400 | <li>Israel National Cyber Directorate</li> |
|
405 | 403 | <li>JetBrains s.r.o.</li> |
406 | 404 | <li>JFROG</li> |
407 | 405 | <li>Johnson Controls</li> |
| 406 | + <li>JPCERT/CC</li> |
| 407 | + <li>Juniper Networks, Inc.</li> |
408 | 408 | <li>Kaspersky</li> |
409 | 409 | <li>KNIME AG</li> |
410 | 410 | <li>KrCERT/CC</li> |
|
426 | 426 | <li>Moxa Inc.</li> |
427 | 427 | <li>N-able</li> |
428 | 428 | <li>National Cyber Security Centre - Netherlands (NCSC-NL)</li> |
| 429 | + <li>National Cyber Security Centre Finland</li> |
429 | 430 | <li>National Cyber Security Centre SK-CERT</li> |
430 | 431 | <li>National Instruments</li> |
431 | 432 | <li>NEC Corporation</li> |
|
443 | 444 | <li>openEuler</li> |
444 | 445 | <li>OpenHarmony</li> |
445 | 446 | <li>OpenText (formerly Micro Focus)</li> |
| 447 | + <li>OPPO</li> |
446 | 448 | <li>OTRS AG</li> |
447 | 449 | <li>Palantir Technologies</li> |
448 | 450 | <li>Palo Alto Networks</li> |
|
465 | 467 | <li>Python Software Foundation</li> |
466 | 468 | <li>QNAP Systems, Inc.</li> |
467 | 469 | <li>Qualcomm, Inc.</li> |
468 | | - <li>Qualys, Inc.</li> |
469 | 470 | <li>rami.io GmbH</li> |
470 | 471 | <li>Rapid7, Inc.</li> |
471 | 472 | <li>Real-Time Innovations, Inc.</li> |
472 | | - <li>Red Hat, Inc.</li> |
473 | 473 | <li>Robert Bosch GmbH</li> |
474 | | - <li>Rockwell Automation</li> |
475 | 474 | <li>SailPoint Technologies</li> |
476 | 475 | <li>Samsung TV & Appliance</li> |
477 | 476 | <li>SAP SE</li> |
|
488 | 487 | <li>Silicon Labs</li> |
489 | 488 | <li>Snow Software</li> |
490 | 489 | <li>Snyk</li> |
| 490 | + <li>SoftIron</li> |
491 | 491 | <li>SolarWinds</li> |
492 | 492 | <li>Sonatype Inc.</li> |
493 | 493 | <li>Sophos</li> |
|
496 | 496 | <li>STAR Labs SG Pte. Ltd.</li> |
497 | 497 | <li>Suse</li> |
498 | 498 | <li>Switzerland National Cyber Security Centre (NCSC)</li> |
| 499 | + <li>Symantec - A Division of Broadcom</li> |
499 | 500 | <li>Synaptics</li> |
500 | 501 | <li>Synology Inc.</li> |
501 | 502 | <li>Talos</li> |
|
507 | 508 | <li>The Document Foundation</li> |
508 | 509 | <li>The Missing Link Australia (TML)</li> |
509 | 510 | <li>The Tcpdump Group</li> |
510 | | - <li>The Wikimedia Foundation</li> |
511 | 511 | <li>TianoCore.org</li> |
512 | 512 | <li>Tigera</li> |
513 | 513 | <li>Toshiba Corporation</li> |
514 | 514 | <li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li> |
515 | | - <li>Trellix</li> |
516 | | - <li>Trend Micro, Inc.</li> |
517 | 515 | <li>TWCERT/CC</li> |
| 516 | + <li>TXOne Networks, Inc.</li> |
518 | 517 | <li>upKeeper Solutions</li> |
519 | 518 | <li>Vivo Mobile Communication Technology Co.,LTD.</li> |
520 | 519 | <li>VulDB</li> |
|
533 | 532 | <li>Zero Day Initiative</li> |
534 | 533 | <li>Zoom Video Communications, Inc.</li> |
535 | 534 | <li>Zscaler, Inc.</li> |
| 535 | + <li>ZTE Corporation</li> |
536 | 536 | <li>ZUSO Advanced Research Team (ZUSO ART)</li> |
537 | 537 | <li>Zyxel Corporation</li> |
538 | 538 | </ul> |
|
0 commit comments