Skip to content

Commit de1e7a4

Browse files
authored
Merge pull request #3141 from CVEProject/content-rjr-3128
#3128 Standardize "open source" without hypen
2 parents a4dd293 + aa04de4 commit de1e7a4

5 files changed

Lines changed: 82 additions & 82 deletions

File tree

src/assets/data/CNAsList.json

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2668,7 +2668,7 @@
26682668
"shortName": "fedora",
26692669
"cnaID": "CNA-2017-0021",
26702670
"organizationName": "Fedora Project",
2671-
"scope": "Vulnerabilities in open-source projects affecting the Fedora Project, that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported releases by the Fedora Project",
2671+
"scope": "Vulnerabilities in open source projects affecting the Fedora Project, that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported releases by the Fedora Project",
26722672
"contact": [
26732673
{
26742674
"email": [],
@@ -7065,7 +7065,7 @@
70657065
"shortName": "redhat",
70667066
"cnaID": "CNA-2005-0006",
70677067
"organizationName": "Red Hat, Inc.",
7068-
"scope": "<strong>Root Scope:</strong> The Red Hat Root’s scope includes the open-source community. Any open-source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them better<br/><strong>CNA Scope:</strong> Vulnerabilities in open-source projects affecting Red Hat software that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat software",
7068+
"scope": "<strong>Root Scope:</strong> The Red Hat Root’s scope includes the open source community. Any open source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them better<br/><strong>CNA Scope:</strong> Vulnerabilities in open source projects affecting Red Hat software that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat software",
70697069
"contact": [
70707070
{
70717071
"email": [
@@ -9119,7 +9119,7 @@
91199119
"shortName": "Vaadin",
91209120
"cnaID": "CNA-2021-0015",
91219121
"organizationName": "Vaadin Ltd.",
9122-
"scope": "All Vaadin products and supported open-source projects hosted at <a href='https://github.com/vaadin' target='_blank'>https://github.com/vaadin</a>",
9122+
"scope": "All Vaadin products and supported open source projects hosted at <a href='https://github.com/vaadin' target='_blank'>https://github.com/vaadin</a>",
91239123
"contact": [
91249124
{
91259125
"email": [
@@ -14716,7 +14716,7 @@
1471614716
"shortName": "Docker",
1471714717
"cnaID": "CNA-2022-0050",
1471814718
"organizationName": "Docker Inc.",
14719-
"scope": "All Docker products, including Docker Desktop and Docker Hub, as well as Docker maintained open-source projects",
14719+
"scope": "All Docker products, including Docker Desktop and Docker Hub, as well as Docker maintained open source projects",
1472014720
"contact": [
1472114721
{
1472214722
"email": [
@@ -15014,7 +15014,7 @@
1501415014
"shortName": "dotCMS",
1501515015
"cnaID": "CNA-2023-0001",
1501615016
"organizationName": "dotCMS LLC",
15017-
"scope": "All dotCMS product services including the vulnerabilities reported in our open-source core located at <a href='https://github.com/dotCMS/core' target='_blank'>https://github.com/dotCMS/core</a>",
15017+
"scope": "All dotCMS product services including the vulnerabilities reported in our open source core located at <a href='https://github.com/dotCMS/core' target='_blank'>https://github.com/dotCMS/core</a>",
1501815018
"contact": [
1501915019
{
1502015020
"email": [
@@ -15076,7 +15076,7 @@
1507615076
"shortName": "DHIS2",
1507715077
"cnaID": "CNA-2023-0002",
1507815078
"organizationName": "The HISP Centre at the University of Oslo",
15079-
"scope": "Security issues in <a href='https://github.com/dhis2' target='_blank'>DHIS2</a> open-source web and mobile software applications",
15079+
"scope": "Security issues in <a href='https://github.com/dhis2' target='_blank'>DHIS2</a> open source web and mobile software applications",
1508015080
"contact": [
1508115081
{
1508215082
"email": [
@@ -16268,7 +16268,7 @@
1626816268
"shortName": "Ribose",
1626916269
"cnaID": "CNA-2023-0023",
1627016270
"organizationName": "Ribose Limited",
16271-
"scope": "All Ribose products and services, including open-source projects, supported products, and end-of-life/end-of-service products",
16271+
"scope": "All Ribose products and services, including open source projects, supported products, and end-of-life/end-of-service products",
1627216272
"contact": [
1627316273
{
1627416274
"email": [
@@ -16550,7 +16550,7 @@
1655016550
"shortName": "IoT83",
1655116551
"cnaID": "CNA-2023-0028",
1655216552
"organizationName": "IoT83 Ltd",
16553-
"scope": "Vulnerabilities in IoT83 product(s), services, and components only. Third-party, open-source components used in IoT83 product(s), services, and components are not in scope",
16553+
"scope": "Vulnerabilities in IoT83 product(s), services, and components only. Third-party, open source components used in IoT83 product(s), services, and components are not in scope",
1655416554
"contact": [
1655516555
{
1655616556
"email": [
@@ -16916,7 +16916,7 @@
1691616916
"shortName": "samsung.tv_appliance",
1691716917
"cnaID": "CNA-2023-0034",
1691816918
"organizationName": "Samsung TV & Appliance",
16919-
"scope": "Samsung TV &amp; Appliance products, Samsung-owned open-source projects listed on <a href='https://github.com/Samsung/' target='_blank'>https://github.com/Samsung/</a>, as well as vulnerabilities in third-party software discovered by Samsung that are not in another CNA’s scope. Vulnerabilities affecting end-of-life/end-of-service products are in scope. The following categories of Samsung Products are in scope: Internet-connected home appliances, B2C product (smart TV, smart monitor, soundbar, and projector), and B2B products (digital signage, interactive display, and kiosk)",
16919+
"scope": "Samsung TV &amp; Appliance products, Samsung-owned open source projects listed on <a href='https://github.com/Samsung/' target='_blank'>https://github.com/Samsung/</a>, as well as vulnerabilities in third-party software discovered by Samsung that are not in another CNA’s scope. Vulnerabilities affecting end-of-life/end-of-service products are in scope. The following categories of Samsung Products are in scope: Internet-connected home appliances, B2C product (smart TV, smart monitor, soundbar, and projector), and B2B products (digital signage, interactive display, and kiosk)",
1692016920
"contact": [
1692116921
{
1692216922
"email": [
@@ -19453,7 +19453,7 @@
1945319453
"shortName": "Checkmarx",
1945419454
"cnaID": "CNA-2023-0078",
1945519455
"organizationName": "Checkmarx",
19456-
"scope": "Vulnerabilities in Checkmarx products and open-source vulnerabilities discovered by, or reported to, Checkmarx, that are not in another CNA’s scope",
19456+
"scope": "Vulnerabilities in Checkmarx products and open source vulnerabilities discovered by, or reported to, Checkmarx, that are not in another CNA’s scope",
1945719457
"contact": [
1945819458
{
1945919459
"email": [
@@ -19736,7 +19736,7 @@
1973619736
"shortName": "EDB",
1973719737
"cnaID": "CNA-2023-0083",
1973819738
"organizationName": "EnterpriseDB Corporation",
19739-
"scope": "All EnterpriseDB products and vulnerabilities identified in open-source libraries used by EnterpriseDB products unless covered by another CNA’s scope",
19739+
"scope": "All EnterpriseDB products and vulnerabilities identified in open source libraries used by EnterpriseDB products unless covered by another CNA’s scope",
1974019740
"contact": [
1974119741
{
1974219742
"email": [
@@ -23220,7 +23220,7 @@
2322023220
"shortName": "seal",
2322123221
"cnaID": "CNA-2024-0060",
2322223222
"organizationName": "Seal Security",
23223-
"scope": "Vulnerabilities in Seal products or services and vulnerabilities discovered in open-source libraries unless covered by the scope of another CNA",
23223+
"scope": "Vulnerabilities in Seal products or services and vulnerabilities discovered in open source libraries unless covered by the scope of another CNA",
2322423224
"contact": [
2322523225
{
2322623226
"email": [

src/assets/data/glossaryEntries.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@
117117
"id": "glossarySupplier",
118118
"term": "Supplier",
119119
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossarySupplier",
120-
"definition": "The entity that develops, maintains, or provides a product regardless of whether the product is an open-source project or a proprietary product. A supplier is typically responsible for and capable of investigating vulnerability reports and developing fixes or mitigations for vulnerabilities. “Supplier” is used broadly and includes common terms such as vendor, producer, developer, maintainer, author, owner, manufacturer, and provider."
120+
"definition": "The entity that develops, maintains, or provides a product regardless of whether the product is an open source project or a proprietary product. A supplier is typically responsible for and capable of investigating vulnerability reports and developing fixes or mitigations for vulnerabilities. “Supplier” is used broadly and includes common terms such as vendor, producer, developer, maintainer, author, owner, manufacturer, and provider."
121121
},
122122
{
123123
"id": "glossaryTags",

0 commit comments

Comments
 (0)