-
Notifications
You must be signed in to change notification settings - Fork 38
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* #3465 Update CVE Services version to latest release on CVE Services page * #3464 Update 2 Blog articles * #3470 Add 1 Blog @ the Q4-2019 Program Summary Report * #3469 Update CWE section of Related Efforts page * CNA Enrichment Recognition List for 02/2/25 * #3468 Add 2 new CNAs + Update 5 CNA's info * #3466 Update Red Hat Root info * #3463 Update "CNA Enrichment Recognition List" blogs * #3466 Update listing * #3470 Update Blog article * #3472 Update Home.vue * #3466 Update Red Hat announcement blog text * #3468 Update the 2 new CNA news page articles
- Loading branch information
Showing
10 changed files
with
581 additions
and
114 deletions.
There are no files selected for viewing
Binary file added
BIN
+75.1 KB
...ws/cveProgramReport/reservedCVEIDspublishedCVERecordsQuarterlyTrendQ4CY2024.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1038,7 +1038,7 @@ | |
{ | ||
"shortName": "brocade", | ||
"cnaID": "CNA-2016-0006", | ||
"organizationName": "Brocade Communications Systems, LLC", | ||
"organizationName": "Brocade Communications Systems LLC, a Broadcom Company", | ||
"scope": "Brocade products only.", | ||
"contact": [ | ||
{ | ||
|
@@ -1056,7 +1056,7 @@ | |
{ | ||
"label": "Policy", | ||
"language": "", | ||
"url": "https://docs.broadcom.com/doc/brocade-security-vulnerabiltiy-disclosure.pdf" | ||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/21739" | ||
} | ||
], | ||
"securityAdvisories": { | ||
|
@@ -3778,7 +3778,7 @@ | |
{ | ||
"label": "Policy", | ||
"language": "", | ||
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK107991A7713&LanguageCode=en&DocumentPartId=&Action=Launch" | ||
"url": "https://publisher.hitachienergy.com/preview?DocumentID=9AKK107991A7713&LanguageCode=en&DocumentPartId=&Action=Launch" | ||
} | ||
], | ||
"securityAdvisories": { | ||
|
@@ -7065,17 +7065,21 @@ | |
"shortName": "redhat", | ||
"cnaID": "CNA-2005-0006", | ||
"organizationName": "Red Hat, Inc.", | ||
"scope": "<strong>Root Scope:</strong> The Red Hat Root’s scope includes the open source community. Any open source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them better.<br/><strong>CNA Scope:</strong> Vulnerabilities in open source projects affecting Red Hat software that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat software.", | ||
"scope": "<strong>Root Scope:</strong> The Red Hat Root’s scope includes the open source community. Any open source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them better.<br/><strong>CNA-LR Scope:</strong> Vulnerabilities in software developed by a CNA within the Red Hat Root hierarchy.<br/><strong>CNA Scope:</strong> Vulnerabilities in open source projects affecting Red Hat software that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat software.", | ||
"contact": [ | ||
{ | ||
"email": [ | ||
{ | ||
"label": "CNA contact email", | ||
"emailAddr": "[email protected]" | ||
}, | ||
{ | ||
"label": "Root contact email", | ||
"emailAddr": "[email protected]" | ||
}, | ||
{ | ||
"label": "CNA-LR contact email", | ||
"emailAddr": "[email protected]" | ||
}, | ||
{ | ||
"label": "CNA contact email", | ||
"emailAddr": "[email protected]" | ||
} | ||
], | ||
"contact": [ | ||
|
@@ -7120,11 +7124,15 @@ | |
}, | ||
"roles": [ | ||
{ | ||
"helpText": "", | ||
"helpText": "reports to MITRE Top-Level Root", | ||
"role": "Root" | ||
}, | ||
{ | ||
"helpText": "", | ||
"helpText": "reports to Red Hat Root", | ||
"role": "CNA-LR" | ||
}, | ||
{ | ||
"helpText": "reports to Red Hat Root", | ||
"role": "CNA" | ||
} | ||
] | ||
|
@@ -16463,7 +16471,7 @@ | |
{ | ||
"label": "Policy", | ||
"language": "", | ||
"url": "https://illumio.responsibledisclosure.com/hc/en-us" | ||
"url": "https://www.illumio.com/legal/responsible-disclosure-policy" | ||
} | ||
], | ||
"securityAdvisories": { | ||
|
@@ -16527,7 +16535,7 @@ | |
"advisories": [ | ||
{ | ||
"label": "Advisories", | ||
"url": "https://www.blacklanternsecurity.com/cves.html" | ||
"url": "https://www.blacklanternsecurity.com/advisories/" | ||
} | ||
] | ||
}, | ||
|
@@ -23864,7 +23872,7 @@ | |
{ | ||
"label": "Policy", | ||
"language": "", | ||
"url": "https://www.csa.gov.sg/Tips-Resource/Resources/singcert/singcert-vulnerability-disclosure-policy" | ||
"url": "https://www.csa.gov.sg/resources/singcert/csa-as-a-cve-numbering-authority--cna-" | ||
} | ||
], | ||
"securityAdvisories": { | ||
|
@@ -25480,5 +25488,117 @@ | |
] | ||
}, | ||
"country": "Denmark" | ||
}, | ||
{ | ||
"shortName": "Saviynt", | ||
"cnaID": "CNA-2025-0011", | ||
"organizationName": "Saviynt Inc.", | ||
"scope": "Vulnerabilities discovered in Saviynt products or vulnerabilities reported to Saviynt Labs that are not in another CNA’s scope.", | ||
"contact": [ | ||
{ | ||
"email": [ | ||
{ | ||
"label": "Email", | ||
"emailAddr": "[email protected]" | ||
} | ||
], | ||
"contact": [], | ||
"form": [] | ||
} | ||
], | ||
"disclosurePolicy": [ | ||
{ | ||
"label": "Policy", | ||
"language": "", | ||
"url": "https://saviynt.com/saviynt-responsible-disclosure-policy/" | ||
} | ||
], | ||
"securityAdvisories": { | ||
"alerts": [], | ||
"advisories": [ | ||
{ | ||
"label": "Advisories", | ||
"url": "https://trust.saviynt.com/?itemName=environment_social_governance&source=click" | ||
} | ||
] | ||
}, | ||
"resources": [], | ||
"CNA": { | ||
"isRoot": false, | ||
"root": { | ||
"shortName": "n/a", | ||
"organizationName": "n/a" | ||
}, | ||
"roles": [ | ||
{ | ||
"helpText": "", | ||
"role": "CNA" | ||
} | ||
], | ||
"TLR": { | ||
"shortName": "mitre", | ||
"organizationName": "MITRE Corporation" | ||
}, | ||
"type": [ | ||
"Vendor" | ||
] | ||
}, | ||
"country": "USA" | ||
}, | ||
{ | ||
"shortName": "CPANSec", | ||
"cnaID": "CNA-2025-0012", | ||
"organizationName": "CPAN Security Group", | ||
"scope": "Vulnerabilities in Perl and CPAN Modules (including End-of-Life Perl versions) found at <a href='https://perl.org' target='_blank'>https://perl.org</a>, <a href='https://cpan.org' target='_blank'>https://cpan.org</a>, or <a href='https://metacpan.org/' target='_blank'>https://metacpan.org/</a>, excluding distributions of Perl or CPAN Modules maintained by third-party redistributors.", | ||
"contact": [ | ||
{ | ||
"email": [ | ||
{ | ||
"label": "Email", | ||
"emailAddr": "[email protected]" | ||
} | ||
], | ||
"contact": [], | ||
"form": [] | ||
} | ||
], | ||
"disclosurePolicy": [ | ||
{ | ||
"label": "Policy", | ||
"language": "", | ||
"url": "https://security.metacpan.org/docs/cna-disclosure-policy.html" | ||
} | ||
], | ||
"securityAdvisories": { | ||
"alerts": [], | ||
"advisories": [ | ||
{ | ||
"label": "Advisories", | ||
"url": "https://lists.security.metacpan.org/cve-announce/" | ||
} | ||
] | ||
}, | ||
"resources": [], | ||
"CNA": { | ||
"isRoot": false, | ||
"root": { | ||
"shortName": "n/a", | ||
"organizationName": "n/a" | ||
}, | ||
"roles": [ | ||
{ | ||
"helpText": "", | ||
"role": "CNA" | ||
} | ||
], | ||
"TLR": { | ||
"shortName": "mitre", | ||
"organizationName": "MITRE Corporation" | ||
}, | ||
"type": [ | ||
"Open Source" | ||
] | ||
}, | ||
"country": "Canada" | ||
} | ||
] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1133,7 +1133,7 @@ | |
}, | ||
{ | ||
"month": "February", | ||
"value": "7" | ||
"value": "9" | ||
}, | ||
{ | ||
"month": "March", | ||
|
Oops, something went wrong.