Skip to content

Commit be75e5a

Browse files
authored
Merge pull request #3184 from CVEProject/dev
update search test with dev
2 parents 182195c + 78ff71d commit be75e5a

18 files changed

Lines changed: 257 additions & 81 deletions

src/assets/data/CNAsList.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7477,7 +7477,7 @@
74777477
"email": [
74787478
{
74797479
"label": "Email",
7480-
"emailAddr": "cybersecurity@se.com"
7480+
"emailAddr": "cpcert@se.com"
74817481
}
74827482
],
74837483
"contact": [
@@ -9231,14 +9231,14 @@
92319231
{
92329232
"shortName": "vmware",
92339233
"cnaID": "CNA-2016-0025",
9234-
"organizationName": "VMware",
9234+
"organizationName": "VMware by Broadcom",
92359235
"scope": "VMware, Spring, and Cloud Foundry issues only",
92369236
"contact": [
92379237
{
92389238
"email": [
92399239
{
92409240
"label": "Email",
9241-
"emailAddr": "security@vmware.com"
9241+
"emailAddr": "vmware.psirt@broadcom.com"
92429242
}
92439243
],
92449244
"contact": [],
@@ -9249,15 +9249,15 @@
92499249
{
92509250
"label": "Policy",
92519251
"language": "",
9252-
"url": "https://www.vmware.com/support/policies/security_response.html"
9252+
"url": "https://www.broadcom.com/support/vmware-services/security-response"
92539253
}
92549254
],
92559255
"securityAdvisories": {
92569256
"alerts": [],
92579257
"advisories": [
92589258
{
92599259
"label": "Advisories",
9260-
"url": "https://www.vmware.com/security/advisories.html"
9260+
"url": "https://www.broadcom.com/support/vmware-security-advisories"
92619261
}
92629262
]
92639263
},

src/assets/data/events.json

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,27 @@
11
{
22
"currentEvents": [
3+
{
4+
"id": 35,
5+
"title": "CVE Artificial Intelligence Working Group (CVEAI WG) Meeting",
6+
"location": "Virtual",
7+
"description": "Focused on defining swim lanes for AI vulnerability disclosure within the CVE Program.",
8+
"permission": "private",
9+
"url": "/ProgramOrganization/WorkingGroups#CVEArtificialIntelligenceWorkingGroupCVEAIWG",
10+
"date": {
11+
"start": "2024-10-15",
12+
"end": "2024-12-31",
13+
"repeat": {
14+
"day": "Monday",
15+
"recurrence": "biweekly"
16+
}
17+
}
18+
},
319
{
420
"id": 34,
521
"displayOnHomepageOrder": 1,
622
"title": "CVE Program Workshop – Autumn 2024",
723
"location": "Virtual",
8-
"description": "A collaborative virtual community event of CVE Partners focused on improving CVE.<br/><br/>Event Time: 10:00 AM to 2:00 PM EDT both days.<br/><br/>Workshop “save the date” announcement, with expected topics and other details, sent to partners on September 19, 2024.",
24+
"description": "A collaborative virtual community event of CVE Partners focused on improving CVE.<br/><br/>Event Time: 10:00 AM to 2:00 PM EDT both days.<br/><br/>Please refer to the CNA partners email announcements for agenda topics, deadlines, and other workshop details.",
925
"permission": "private",
1026
"url": "",
1127
"date": {
@@ -430,15 +446,15 @@
430446
"id": 3,
431447
"title": "CVE Outreach and Communications Working Group (OCWG) Meeting",
432448
"location": "Virtual",
433-
"description": "Promote the CVE Program to achieve program adoption and coverage goals through increased community awareness. Each calendar year there are six meetings held on a Monday (UTC-08:00) and six meetings held on a Wednesday (UTC-12:00).",
449+
"description": "Promote the CVE Program to achieve program adoption and coverage goals through increased community awareness.",
434450
"permission": "private",
435451
"url": "/ProgramOrganization/WorkingGroups#OutreachandCommunicationsWorkingGroupOCWG",
436452
"date": {
437453
"start": "2024-01-01",
438454
"end": "2024-12-31",
439455
"repeat": {
440-
"day": "Monday or Wednesday alternating every other month",
441-
"recurrence": "monthly"
456+
"day": "Friday",
457+
"recurrence": "weekly"
442458
}
443459
}
444460
},

src/assets/data/faqs.json

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@
256256
"questionText": "Are there CVE List data feeds",
257257
"questionResponseParagraphs": [
258258
"Yes, both internal and external feeds of CVE List content are available.",
259-
"CVE Program:<ul><li><a href='https://twitter.com/CVEnew/' target='_blank'>Feed of newly published CVE Records</a> @CVEnew Twitter</li><li><a href='https://github.com/CVEProject/cvelistV5' target='_blank'>CVE List downloads (updated hourly)</a> cvelistV5 repository on GitHub</li></ul>",
259+
"CVE Program:<ul><li><a href='https://x.com/CVEnew' target='_blank'>Feed of newly published CVE Records</a> @CVEnew on X</li><li><a href='https://github.com/CVEProject/cvelistV5' target='_blank'>CVE List downloads (updated hourly)</a> cvelistV5 repository on GitHub</li></ul>",
260260
"External:<ul><li><a href='https://cassandra.cerias.purdue.edu/CVE_changes/' target='_blank'>CVE Change Logs</a> free tool from CERIAS/Purdue University that provides daily and monthly changes to CVE Records.</li></ul>"
261261
]
262262
},
@@ -272,9 +272,7 @@
272272
"questionText": "How do I search the CVE List",
273273
"questionResponseParagraphs": [
274274
"<b><i>Search Tips<i></b>",
275-
"<ul><li>By CVE ID<ul><li>Must include only one CVE ID per search.</li><li>CVE ID must include all letters, numbers, and hyphens associated with the CVE ID, e.g., CVE-2024-12345678.</li><li>“CVE” may be entered as “cve”, “CVE”, or as a combination of uppercase and lowercase, as casing is ignored during search.</li></ul></li><li>By other keyword(s)<ul><li>Must contain only alphanumeric characters.</li><li>May contain one or more keywords, separated by a space.</li><li>Keywords may be entered in lowercase, uppercase, or a combination of both. Casing is ignored during search, e.g., Vulnerabilities, vulnerabilities, VULNERABILITIES.</li></ul></li></ul>",
276-
"<strong>2. Other CVE List search options</strong>",
277-
"<ul><li>Search by keyword(s) across <a href='https://github.com/CVEProject/cvelistV5' target='_blank'>ALL FIELDS of all CVE Records</a> in the cvelistV5 downloads repository using the main search box on GitHub.com.</li><li>Search by keyword(s) in the <a href='https://cve.mitre.org/cve/search_cve_list.html' target='_blank'>Description fields ONLY of all CVE Records</a> using the legacy search page on cve.mitre.org.</li></ul>"
275+
"<ul><li>By CVE ID<ul><li>Must include only one CVE ID per search.</li><li>CVE ID must include all letters, numbers, and hyphens associated with the CVE ID, e.g., CVE-2024-12345678.</li><li>“CVE” may be entered as “cve”, “CVE”, or as a combination of uppercase and lowercase, as casing is ignored during search.</li></ul></li><li>By other keyword(s)<ul><li>Must contain only alphanumeric characters, e.g., letters or numbers.</li><li>May contain one or more keywords, separated by a space.</li><li>Keywords may be entered in lowercase, uppercase, or a combination of both. Casing is ignored during search, e.g., Vulnerabilities, vulnerabilities, VULNERABILITIES.</li></ul></li></ul>"
278276
]
279277
},
280278
{

src/assets/data/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -201,6 +201,10 @@
201201
"anchorId": "CNAOrganizationOfPeersCOOP",
202202
"label": "CNA Organization of Peers (COOP)"
203203
},
204+
"CVE Artificial Intelligence Working Group (CVEAI WG)": {
205+
"anchorId": "CVEArtificialIntelligenceWorkingGroupCVEAIWG",
206+
"label": "CVE Artificial Intelligence Working Group (CVEAI WG)"
207+
},
204208
"Outreach and Communications Working Group (OCWG)": {
205209
"anchorId": "OutreachandCommunicationsWorkingGroupOCWG",
206210
"label": "Outreach and Communications Working Group (OCWG)"

src/assets/data/news.json

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,43 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 421,
5+
"newsType": "news",
6+
"title": "CVE Program Adds New “CVE Artificial Intelligence Working Group (CVEAI WG)”",
7+
"urlKeywords": "New CVE Artificial Intelligence Working Group",
8+
"date": "2024-10-15",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "The CVE Program’s newest working group (WG), <a href='/ProgramOrganization/WorkingGroups#CVEArtificialIntelligenceWorkingGroupCVEAIWG'>CVE Artificial Intelligence</a> (CVEAI WG), is open to CVE community members such as <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a>, the <a href='/ProgramOrganization/Board'>CVE Board</a>, <a href='/ProgramOrganization/ADPs'>Authorized Data Publishers (ADPs)</a>, and participants from the <a href='/ResourcesSupport/Glossary?activeTerm=glossarySecretariat'>CVE Program Secretariat</a>; members of corporate vulnerability management programs and related standards, initiatives, and associations; and members of the AI community with expertise in AI and AI-related security concerns."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "The CVEAI WG will focus on: “determining what is a CVE-able vulnerability in AI technology. It is expected the CVEAI WG will produce documentation that defines how the CVE Program will address AI technologies moving forward. The CVEAI WG efforts are focused on defining swim lanes for AI vulnerability disclosure within CVE. This WG will discuss the concerns in defining what is within the responsibilities of the CVE Program. Because not all AI issues are appropriate for a CVE assignment, it will also try to define when other AI security-related initiatives are needed to address concerns outside the CVE Program.”"
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "Read the <a href='/Resources/Roles/WorkingGroups/CVEAIWG/CVEAIWG-Charter.pdf' target='_blank'>CVEAI WG charter</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 420,
26+
"newsType": "news",
27+
"title": "Minutes from CVE Board Teleconference Meeting on October 2 Now Available",
28+
"urlKeywords": "CVE Board Minutes from October 2",
29+
"date": "2024-10-15",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on October 2, 2024. Read the <a href='https://cve.mitre.org/community/board/meeting_summaries/02_October_2024.pdf' target='_blank'>meeting minutes summary</a>."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
38+
}
39+
]
40+
},
341
{
442
"id": 419,
543
"newsType": "blog",
@@ -32,6 +70,7 @@
3270
},
3371
{
3472
"id": 418,
73+
"displayOnHomepageOrder": 0,
3574
"newsType": "news",
3675
"title": "Minutes from CVE Board Teleconference Meeting on September 18 Now Available",
3776
"urlKeywords": "CVE Board Minutes from September 18",

src/components/AdpVulnerabilityEnrichment.vue

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@
55
<slot></slot>
66
<button class="button message-header-button"
77
:style="{'background-color': '#162e51 !important', 'color': 'white !important'}"
8-
@click="togglePanel"
98
:aria-expanded="usecveRecordStore.accordionState[organizationId] ? 'true' : 'false'"
109
:aria-controls="`${organizationId}-panel`"
1110
>

src/components/FooterModule.vue

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,14 @@
4848
<font-awesome-icon :icon="['fab', 'medium']" aria-labelledby="mediumIcon" aria-hidden="false" focusable="false"/>
4949
</span></a>
5050
<div>
51-
<a class="cve-social-media-icon-with-text" href="https://twitter.com/CVEnew/" target="_blank">
51+
<a class="cve-social-media-icon-with-text" href="https://x.com/CVEnew" target="_blank">
5252
<span class="icon">
5353
<p id="x-twitterNewIcon" class="is-hidden">x-twitter icon for @CVEnew</p>
5454
<font-awesome-icon :icon="['fab', 'x-twitter']" aria-labelledby="x-twitterNewIcon" aria-hidden="false" focusable="false"/>
5555
</span>
5656
New CVE Records
5757
</a>
58-
<a class="cve-social-media-icon-with-text" href="https://twitter.com/CVEannounce/" target="_blank">
58+
<a class="cve-social-media-icon-with-text" href="https://x.com/CVEannounce" target="_blank">
5959
<span class="icon">
6060
<p id="x-twitterAnnounceIcon" class="is-hidden">x-twitter icon for @CVEannounce</p>
6161
<font-awesome-icon :icon="['fab', 'x-twitter']" aria-labelledby="x-twitterAnnounceIcon" aria-hidden="false" focusable="false"/>

src/components/PrimaryNavigation.vue

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -125,11 +125,13 @@
125125
<cveRecordSearch/>
126126
</div>
127127
<div class="navbar-item cve-secondary-navbar-item cve-keyword-search">
128-
<span class="icon-text mr-2" style="font-size: 14px">
129-
<router-link to="/ResourcesSupport/FAQs#pc_cve_list_basicssearch_cve" class="cve-dark-blue-text">
130-
Access Search Tips
131-
</router-link>
132-
</span>
128+
<div v-if="searchType">
129+
<span class="icon-text mr-2" style="font-size: 14px">
130+
<router-link to="/ResourcesSupport/FAQs#pc_cve_list_basicssearch_cve" class="cve-dark-blue-text">
131+
Access Search Tips
132+
</router-link>
133+
</span>
134+
</div>
133135
</div>
134136
</div>
135137
<div class="navbar-end is-hidden-touch">
@@ -151,6 +153,8 @@
151153

152154
<script>
153155
import cveRecordSearch from '@/components/cveRecordSearchModule.vue';
156+
import { useCveListSearchStore } from '@/stores/cveListSearch';
157+
import { mapState } from 'pinia'
154158
155159
export default {
156160
components: { cveRecordSearch },
@@ -160,6 +164,9 @@ export default {
160164
required: true,
161165
},
162166
},
167+
computed: {
168+
...mapState(useCveListSearchStore, ['searchType'])
169+
},
163170
data() {
164171
return {
165172
isOpen: false,

0 commit comments

Comments
 (0)