You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* #3828 Update FAQs page
* #3827 Add 1 new CNA + Update 2 CNA's info
* cveListSearch: make all CVE ID only searches consistent by quoting the ID
---------
Co-authored-by: Roy Lane <rlane@mitre.org>
Copy file name to clipboardExpand all lines: src/assets/data/CNAsList.json
+71-11Lines changed: 71 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -12314,21 +12314,21 @@
12314
12314
"CNA": {
12315
12315
"isRoot": false,
12316
12316
"root": {
12317
-
"shortName": "n/a",
12318
-
"organizationName": "n/a"
12317
+
"shortName": "ENISA",
12318
+
"organizationName": "EU Agency for Cybersecurity (ENISA)"
12319
12319
},
12320
-
"roles": [
12321
-
{
12322
-
"helpText": "",
12323
-
"role": "CNA"
12324
-
}
12320
+
"type": [
12321
+
"Vendor"
12325
12322
],
12326
12323
"TLR": {
12327
12324
"shortName": "mitre",
12328
12325
"organizationName": "MITRE Corporation"
12329
12326
},
12330
-
"type": [
12331
-
"Vendor"
12327
+
"roles": [
12328
+
{
12329
+
"helpText": "",
12330
+
"role": "CNA"
12331
+
}
12332
12332
]
12333
12333
},
12334
12334
"country": "Germany"
@@ -26831,7 +26831,7 @@
26831
26831
"shortName": "AxxonSoft",
26832
26832
"cnaID": "CNA-2025-0045",
26833
26833
"organizationName": "AxxonSoft Limited",
26834
-
"scope": "AxxonSoft products and solutions, GRUNDIG security products, and C-WERK software solutions.",
26834
+
"scope": "AxxonSoft products and solutions, Abetechs GmbH products and solutions (GRUNDIG security products, and C-WERK software solutions).",
26835
26835
"contact": [
26836
26836
{
26837
26837
"email": [
@@ -28076,7 +28076,7 @@
28076
28076
},
28077
28077
{
28078
28078
"shortName": "Nintendo",
28079
-
"cnaID": "CNA-2026-0004",
28079
+
"cnaID": "CNA-2026-0005",
28080
28080
"organizationName": "Nintendo Co., Ltd.",
28081
28081
"scope": "System vulnerabilities regarding the Nintendo Switch 2, Nintendo Switch, Nintendo Switch Lite, and vulnerabilities regarding Nintendo Switch 2 and Nintendo Switch applications for which Nintendo is the publisher worldwide.",
Copy file name to clipboardExpand all lines: src/assets/data/news.json
+23-2Lines changed: 23 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,26 @@
1
1
{
2
2
"currentNews": [
3
+
{
4
+
"id": 623,
5
+
"newsType": "news",
6
+
"title": "TCL Added as CVE Numbering Authority (CNA)",
7
+
"urlKeywords": "TCL Added as CNA",
8
+
"date": "2026-01-27",
9
+
"description": [
10
+
{
11
+
"contentnewsType": "paragraph",
12
+
"content": "<a href='/PartnerInformation/ListofPartners/partner/TCL_Smart_Terminal'>TCL Electronics Holdings Limited</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for TCL smart TV, smart pad, and mobile phone devices only. Projects listed on <a href='https://github.com/TclSecLab/CNA/blob/main/README_EN.md' target='_blank'>https://github.com/TclSecLab/CNA/blob/main/README_EN.md</a>."
13
+
},
14
+
{
15
+
"contentnewsType": "paragraph",
16
+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>490 CNAs</a> (487 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>41 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. TCL is the 24th CNA from China."
17
+
},
18
+
{
19
+
"contentnewsType": "paragraph",
20
+
"content": "TCL’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE TL-Root</a>."
21
+
}
22
+
]
23
+
},
3
24
{
4
25
"id": 622,
5
26
"newsType": "news",
@@ -126,7 +147,7 @@
126
147
"id": 616,
127
148
"displayOnHomepageOrder": 1,
128
149
"newsType": "blog",
129
-
"title": "CVE Program to Normalize Formatting of Date/Time Fields Across Historical CVE Records Beginning in February 2026",
150
+
"title": "CVE Program to Normalize Formatting of Date/Time Fields Across Historical CVE Records Beginning in Mid-February 2026",
130
151
"urlKeywords": "Historic CVE Record Date Time Fields Normalized",
131
152
"date": "2026-01-06",
132
153
"author": {
@@ -141,7 +162,7 @@
141
162
"description": [
142
163
{
143
164
"contentnewsType": "paragraph",
144
-
"content": "The <a href='/'>CVE™ Program</a> is planning to begin normalizing the formatting of date/time fields across historical <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> in February 2026 (see the “Timeline” section below). This update will align older records with the standardized format already used for all new and updated records since February 2025:"
165
+
"content": "The <a href='/'>CVE™ Program</a> is planning to begin normalizing the formatting of date/time fields across historical <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> in mid-February 2026 (see the “Timeline” section below). This update will align older records with the standardized format already used for all new and updated records since February 2025:"
0 commit comments