You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "cve-schema specifies the CVE JSON record format. This is the blueprint for a rich set of JSON data that can be submitted by CVE Numbering Authorities (CNAs) and Authorized Data Publishers (ADPs) to describe a CVE Record. Some examples of CVE Record data include CVE ID number, affected product(s), affected version(s), and public references. While those specific items are required when assigning a CVE, there are many other optional data in the schema that can be used to enrich CVE Records for community benefit. Learn more about the CVE program at [the official website](https://cve.mitre.org). This CVE JSON record format is defined using JSON Schema. Learn more about JSON Schema [here](https://json-schema.org/).",
5
+
"description": "The CVE Record Format is the blueprint for a rich set of JSON data that can be submitted by CVE Numbering Authorities (CNAs) and Authorized Data Publishers (ADPs) to describe a CVE Record. Some examples of CVE Record data include CVE ID number, affected product(s), affected version(s), and public references. While those specific items are required when assigning a CVE, there are many other optional data in the schema that can be used to enrich CVE Records for community benefit. Learn more about the CVE program at [the official website](https://www.cve.org). This CVE JSON record format is defined using JSON Schema. Learn more about JSON Schema [here](https://json-schema.org/).",
6
6
"definitions": {
7
7
"uriType": {
8
8
"description": "A universal resource identifier (URI), according to [RFC 3986](https://tools.ietf.org/html/rfc3986).",
@@ -77,6 +77,7 @@
77
77
},
78
78
"cveId": {
79
79
"type": "string",
80
+
"description": "The official CVE identifier contains the string 'CVE', followed by the year, followed by a 4 to 19 digit number. Note that the year-part of the identifier should indicate either the year the vulnerability was discovered, or the year the CVE ID is published in. CVE IDs must be unique.",
80
81
"pattern": "^CVE-[0-9]{4}-[0-9]{4,19}$"
81
82
},
82
83
"cpe22and23": {
@@ -107,16 +108,13 @@
107
108
"minLength": 2,
108
109
"maxLength": 32
109
110
},
110
-
"datestamp": {
111
-
"description": "Date/time format based on RFC3339 and ISO ISO8601.",
"description": "Date/time format based on RFC3339 and ISO ISO8601, with an optional timezone in the format 'yyyy-MM-ddTHH:mm:ss[+-]ZH:ZM'. If timezone offset is not given, GMT (+00:00) is assumed.",
"description": "A single version of a product, as expressed in its own version numbering scheme.",
@@ -345,7 +343,7 @@
345
343
},
346
344
"versions": {
347
345
"type": "array",
348
-
"description": "Set of product versions or version ranges related to the vulnerability. The versions satisfy the CNA Rules [8.1.2 requirement](https://cve.mitre.org/cve/cna/rules.html#section_8-1_cve_entry_information_requirements). Versions or defaultStatus may be omitted, but not both.",
346
+
"description": "Set of product versions or version ranges related to the vulnerability. The versions help satisfy the CNA Rules [5.1.3 requirement](https://www.cve.org/ResourcesSupport/AllResources/CNARules#section_5-1_Required_CVE_Record_Content). Versions or defaultStatus may be omitted, but not both.",
349
347
"minItems": 1,
350
348
"uniqueItems": true,
351
349
"items": {
@@ -465,7 +463,9 @@
465
463
"required": [
466
464
"cveId",
467
465
"assignerOrgId",
468
-
"state"
466
+
"state",
467
+
"datePublished",
468
+
"dateReserved"
469
469
],
470
470
"properties": {
471
471
"cveId": {
@@ -517,7 +517,9 @@
517
517
"required": [
518
518
"cveId",
519
519
"assignerOrgId",
520
-
"state"
520
+
"state",
521
+
"datePublished",
522
+
"dateReserved"
521
523
],
522
524
"properties": {
523
525
"cveId": {
@@ -743,7 +745,8 @@
743
745
"providerMetadata",
744
746
"descriptions",
745
747
"affected",
746
-
"references"
748
+
"references",
749
+
"datePublic"
747
750
],
748
751
"patternProperties": {
749
752
"^x_[^.]*$": {}
@@ -924,6 +927,10 @@
924
927
],
925
928
"additionalProperties": false
926
929
}
930
+
},
931
+
"preformatted": {
932
+
"type": "boolean",
933
+
"description": "If true, indicates the 'description' is preformatted text that should be rendered to preserve spacing and other formatting. If false, will be rendered without preserving formatting."
927
934
}
928
935
},
929
936
"required": [
@@ -3239,7 +3246,6 @@
3239
3246
],
3240
3247
"properties": {
3241
3248
"time": {
3242
-
"description": "Timestamp representing when the event in the timeline occurred. The timestamp format is based on RFC3339 and ISO ISO8601, with an optional timezone. yyyy-MM-ddTHH:mm:ss[+-]ZH:ZM - if the timezone offset is not given, GMT (+00:00) is assumed.",
3243
3249
"$ref": "#/definitions/timestamp"
3244
3250
},
3245
3251
"lang": {
@@ -3305,7 +3311,38 @@
3305
3311
"source": {
3306
3312
"type": "object",
3307
3313
"description": "This is the source information (who discovered it, who researched it, etc.) and optionally a chain of CNA information (e.g. the originating CNA and subsequent parent CNAs who have processed it before it arrives at the MITRE root).\n Must contain: IF this is in the root level it MUST contain a CNA_chain entry, IF this source entry is NOT in the root (e.g. it is part of a vendor statement) then it must contain at least one type of data entry.",
3308
-
"minProperties": 1
3314
+
"minProperties": 1,
3315
+
"properties": {
3316
+
"defect": {
3317
+
"title": "Defects",
3318
+
"type": "array",
3319
+
"description": "CNA specific bug or defect tracking IDs (optional).",
3320
+
"uniqueItems": true,
3321
+
"items": {
3322
+
"type": "string",
3323
+
"maxLength": 64
3324
+
}
3325
+
},
3326
+
"advisory": {
3327
+
"title": "Advisory ID",
3328
+
"type": "string",
3329
+
"description": "CNA specific advisory IDs (optional).",
3330
+
"maxLength": 64
3331
+
},
3332
+
"discovery": {
3333
+
"type": "string",
3334
+
"title": "Source of vulnerability discovery",
3335
+
"enum": [
3336
+
"INTERNAL",
3337
+
"EXTERNAL",
3338
+
"USER",
3339
+
"UPSTREAM",
3340
+
"UNKNOWN"
3341
+
],
3342
+
"description": "Source of vulnerability discovery. This may be a factor for some consumers in prioritizing vulnerability response. \nINTERNAL: this vulnerability was found by the CNA's internal research.\nEXTERNAL: this vulnerability was found during research external to a CNA.\nUSER: This vulnerability was discovered during product use.\nUPSTREAM: This vulnerability was found by an upstream vendor or producer.\nUNKNOWN: Source of discovery is not defined or is unknown",
Copy file name to clipboardExpand all lines: schema/docs/CVE_Record_Format_bundled_adpContainer.json
+53-15Lines changed: 53 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -77,6 +77,7 @@
77
77
},
78
78
"cveId": {
79
79
"type": "string",
80
+
"description": "The official CVE identifier contains the string 'CVE', followed by the year, followed by a 4 to 19 digit number. Note that the year-part of the identifier should indicate either the year the vulnerability was discovered, or the year the CVE ID is published in. CVE IDs must be unique.",
80
81
"pattern": "^CVE-[0-9]{4}-[0-9]{4,19}$"
81
82
},
82
83
"cpe22and23": {
@@ -107,16 +108,13 @@
107
108
"minLength": 2,
108
109
"maxLength": 32
109
110
},
110
-
"datestamp": {
111
-
"description": "Date/time format based on RFC3339 and ISO ISO8601.",
"description": "Date/time format based on RFC3339 and ISO ISO8601, with an optional timezone in the format 'yyyy-MM-ddTHH:mm:ss[+-]ZH:ZM'. If timezone offset is not given, GMT (+00:00) is assumed.",
"description": "A single version of a product, as expressed in its own version numbering scheme.",
@@ -345,7 +343,7 @@
345
343
},
346
344
"versions": {
347
345
"type": "array",
348
-
"description": "Set of product versions or version ranges related to the vulnerability. The versions satisfy the CNA Rules [8.1.2 requirement](https://cve.mitre.org/cve/cna/rules.html#section_8-1_cve_entry_information_requirements). Versions or defaultStatus may be omitted, but not both.",
346
+
"description": "Set of product versions or version ranges related to the vulnerability. The versions help satisfy the CNA Rules [5.1.3 requirement](https://www.cve.org/ResourcesSupport/AllResources/CNARules#section_5-1_Required_CVE_Record_Content). Versions or defaultStatus may be omitted, but not both.",
349
347
"minItems": 1,
350
348
"uniqueItems": true,
351
349
"items": {
@@ -465,7 +463,9 @@
465
463
"required": [
466
464
"cveId",
467
465
"assignerOrgId",
468
-
"state"
466
+
"state",
467
+
"datePublished",
468
+
"dateReserved"
469
469
],
470
470
"properties": {
471
471
"cveId": {
@@ -517,7 +517,9 @@
517
517
"required": [
518
518
"cveId",
519
519
"assignerOrgId",
520
-
"state"
520
+
"state",
521
+
"datePublished",
522
+
"dateReserved"
521
523
],
522
524
"properties": {
523
525
"cveId": {
@@ -743,7 +745,8 @@
743
745
"providerMetadata",
744
746
"descriptions",
745
747
"affected",
746
-
"references"
748
+
"references",
749
+
"datePublic"
747
750
],
748
751
"patternProperties": {
749
752
"^x_[^.]*$": {}
@@ -924,6 +927,10 @@
924
927
],
925
928
"additionalProperties": false
926
929
}
930
+
},
931
+
"preformatted": {
932
+
"type": "boolean",
933
+
"description": "If true, indicates the 'description' is preformatted text that should be rendered to preserve spacing and other formatting. If false, will be rendered without preserving formatting."
927
934
}
928
935
},
929
936
"required": [
@@ -3239,7 +3246,6 @@
3239
3246
],
3240
3247
"properties": {
3241
3248
"time": {
3242
-
"description": "Timestamp representing when the event in the timeline occurred. The timestamp format is based on RFC3339 and ISO ISO8601, with an optional timezone. yyyy-MM-ddTHH:mm:ss[+-]ZH:ZM - if the timezone offset is not given, GMT (+00:00) is assumed.",
3243
3249
"$ref": "#/definitions/timestamp"
3244
3250
},
3245
3251
"lang": {
@@ -3305,7 +3311,38 @@
3305
3311
"source": {
3306
3312
"type": "object",
3307
3313
"description": "This is the source information (who discovered it, who researched it, etc.) and optionally a chain of CNA information (e.g. the originating CNA and subsequent parent CNAs who have processed it before it arrives at the MITRE root).\n Must contain: IF this is in the root level it MUST contain a CNA_chain entry, IF this source entry is NOT in the root (e.g. it is part of a vendor statement) then it must contain at least one type of data entry.",
3308
-
"minProperties": 1
3314
+
"minProperties": 1,
3315
+
"properties": {
3316
+
"defect": {
3317
+
"title": "Defects",
3318
+
"type": "array",
3319
+
"description": "CNA specific bug or defect tracking IDs (optional).",
3320
+
"uniqueItems": true,
3321
+
"items": {
3322
+
"type": "string",
3323
+
"maxLength": 64
3324
+
}
3325
+
},
3326
+
"advisory": {
3327
+
"title": "Advisory ID",
3328
+
"type": "string",
3329
+
"description": "CNA specific advisory IDs (optional).",
3330
+
"maxLength": 64
3331
+
},
3332
+
"discovery": {
3333
+
"type": "string",
3334
+
"title": "Source of vulnerability discovery",
3335
+
"enum": [
3336
+
"INTERNAL",
3337
+
"EXTERNAL",
3338
+
"USER",
3339
+
"UPSTREAM",
3340
+
"UNKNOWN"
3341
+
],
3342
+
"description": "Source of vulnerability discovery. This may be a factor for some consumers in prioritizing vulnerability response. \nINTERNAL: this vulnerability was found by the CNA's internal research.\nEXTERNAL: this vulnerability was found during research external to a CNA.\nUSER: This vulnerability was discovered during product use.\nUPSTREAM: This vulnerability was found by an upstream vendor or producer.\nUNKNOWN: Source of discovery is not defined or is unknown",
0 commit comments