|
809 | 809 | "shortName": "Axis", |
810 | 810 | "cnaID": "CNA-2021-0014", |
811 | 811 | "organizationName": "Axis Communications AB", |
812 | | - "scope": "All products of Axis Communications AB including end-of-life/end-of-service products", |
| 812 | + "scope": "All products of Axis Communications AB and 2N including end-of-life/end-of-service products", |
813 | 813 | "contact": [ |
814 | 814 | { |
815 | 815 | "email": [ |
|
2668 | 2668 | "shortName": "fedora", |
2669 | 2669 | "cnaID": "CNA-2017-0021", |
2670 | 2670 | "organizationName": "Fedora Project", |
2671 | | - "scope": "Vulnerabilities in open-source projects affecting the Fedora Project, that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported releases by the Fedora Project", |
| 2671 | + "scope": "Vulnerabilities in open source projects affecting the Fedora Project, that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported releases by the Fedora Project", |
2672 | 2672 | "contact": [ |
2673 | 2673 | { |
2674 | 2674 | "email": [], |
|
3817 | 3817 | "shortName": "hp", |
3818 | 3818 | "cnaID": "CNA-2009-0003", |
3819 | 3819 | "organizationName": "HP Inc.", |
3820 | | - "scope": "HP Inc. issues only", |
| 3820 | + "scope": "Issues with any HP-branded product, including computing software and hardware, imaging and printing, as well as HyperX, Teradici, Poly, and Plantronics branded devices", |
3821 | 3821 | "contact": [ |
3822 | 3822 | { |
3823 | 3823 | "email": [ |
|
6806 | 6806 | "advisories": [ |
6807 | 6807 | { |
6808 | 6808 | "label": "Advisories", |
6809 | | - "url": "https://www.php.net/ChangeLog-7.php" |
| 6809 | + "url": "https://www.php.net/ChangeLog-8.php" |
6810 | 6810 | } |
6811 | 6811 | ] |
6812 | 6812 | }, |
|
6837 | 6837 | { |
6838 | 6838 | "shortName": "Perforce", |
6839 | 6839 | "cnaID": "CNA-2016-0023", |
6840 | | - "organizationName": "Perforce (formerly Puppet)", |
| 6840 | + "organizationName": "Perforce", |
6841 | 6841 | "scope": "All Perforce products", |
6842 | 6842 | "contact": [ |
6843 | 6843 | { |
|
7065 | 7065 | "shortName": "redhat", |
7066 | 7066 | "cnaID": "CNA-2005-0006", |
7067 | 7067 | "organizationName": "Red Hat, Inc.", |
7068 | | - "scope": "<strong>Root Scope:</strong> The Red Hat Root’s scope includes the open-source community. Any open-source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them better<br/><strong>CNA Scope:</strong> Vulnerabilities in open-source projects affecting Red Hat software that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat software", |
| 7068 | + "scope": "<strong>Root Scope:</strong> The Red Hat Root’s scope includes the open source community. Any open source organizations that prefer Red Hat as their Root; organizations are free to choose another Root if it suits them better<br/><strong>CNA Scope:</strong> Vulnerabilities in open source projects affecting Red Hat software that are not covered by a more specific CNA. CVEs can be assigned to vulnerabilities affecting end-of-life or unsupported Red Hat software", |
7069 | 7069 | "contact": [ |
7070 | 7070 | { |
7071 | 7071 | "email": [ |
|
8929 | 8929 | |
8930 | 8930 | } |
8931 | 8931 | ], |
8932 | | - "contact": [], |
| 8932 | + "contact": [ |
| 8933 | + { |
| 8934 | + "label": "Report a Vulnerability (Turkish)", |
| 8935 | + "language": "Turkish", |
| 8936 | + "url": "https://www.usom.gov.tr/zafiyet" |
| 8937 | + }, |
| 8938 | + { |
| 8939 | + "label": "Report a Vulnerability (English)", |
| 8940 | + "language": "English", |
| 8941 | + "url": "https://www.usom.gov.tr/en/vulnerability" |
| 8942 | + } |
| 8943 | + ], |
8933 | 8944 | "form": [] |
8934 | 8945 | } |
8935 | 8946 | ], |
8936 | 8947 | "disclosurePolicy": [ |
8937 | 8948 | { |
8938 | | - "label": "Policy", |
8939 | | - "language": "", |
8940 | | - "url": "https://www.usom.gov.tr/en" |
| 8949 | + "label": "Policy (Turkish)", |
| 8950 | + "language": "Turkish", |
| 8951 | + "url": "https://www.usom.gov.tr/zafiyet-bildirim-politikasi" |
| 8952 | + }, |
| 8953 | + { |
| 8954 | + "label": "Policy (English)", |
| 8955 | + "language": "English", |
| 8956 | + "url": "https://www.usom.gov.tr/en/vulnerability-disclosure-policy" |
8941 | 8957 | } |
8942 | 8958 | ], |
8943 | 8959 | "securityAdvisories": { |
8944 | 8960 | "alerts": [], |
8945 | 8961 | "advisories": [ |
8946 | 8962 | { |
8947 | | - "label": "Advisories", |
8948 | | - "url": "https://www.usom.gov.tr/tehdit.html" |
| 8963 | + "label": "Advisories (Turkish)", |
| 8964 | + "language": "Turkish", |
| 8965 | + "url": "https://www.usom.gov.tr/bildirim" |
8949 | 8966 | } |
8950 | 8967 | ] |
8951 | 8968 | }, |
|
9102 | 9119 | "shortName": "Vaadin", |
9103 | 9120 | "cnaID": "CNA-2021-0015", |
9104 | 9121 | "organizationName": "Vaadin Ltd.", |
9105 | | - "scope": "All Vaadin products and supported open-source projects hosted at <a href='https://github.com/vaadin' target='_blank'>https://github.com/vaadin</a>", |
| 9122 | + "scope": "All Vaadin products and supported open source projects hosted at <a href='https://github.com/vaadin' target='_blank'>https://github.com/vaadin</a>", |
9106 | 9123 | "contact": [ |
9107 | 9124 | { |
9108 | 9125 | "email": [ |
|
14699 | 14716 | "shortName": "Docker", |
14700 | 14717 | "cnaID": "CNA-2022-0050", |
14701 | 14718 | "organizationName": "Docker Inc.", |
14702 | | - "scope": "All Docker products, including Docker Desktop and Docker Hub, as well as Docker maintained open-source projects", |
| 14719 | + "scope": "All Docker products, including Docker Desktop and Docker Hub, as well as Docker maintained open source projects", |
14703 | 14720 | "contact": [ |
14704 | 14721 | { |
14705 | 14722 | "email": [ |
|
14997 | 15014 | "shortName": "dotCMS", |
14998 | 15015 | "cnaID": "CNA-2023-0001", |
14999 | 15016 | "organizationName": "dotCMS LLC", |
15000 | | - "scope": "All dotCMS product services including the vulnerabilities reported in our open-source core located at <a href='https://github.com/dotCMS/core' target='_blank'>https://github.com/dotCMS/core</a>", |
| 15017 | + "scope": "All dotCMS product services including the vulnerabilities reported in our open source core located at <a href='https://github.com/dotCMS/core' target='_blank'>https://github.com/dotCMS/core</a>", |
15001 | 15018 | "contact": [ |
15002 | 15019 | { |
15003 | 15020 | "email": [ |
|
15059 | 15076 | "shortName": "DHIS2", |
15060 | 15077 | "cnaID": "CNA-2023-0002", |
15061 | 15078 | "organizationName": "The HISP Centre at the University of Oslo", |
15062 | | - "scope": "Security issues in <a href='https://github.com/dhis2' target='_blank'>DHIS2</a> open-source web and mobile software applications", |
| 15079 | + "scope": "Security issues in <a href='https://github.com/dhis2' target='_blank'>DHIS2</a> open source web and mobile software applications", |
15063 | 15080 | "contact": [ |
15064 | 15081 | { |
15065 | 15082 | "email": [ |
|
16251 | 16268 | "shortName": "Ribose", |
16252 | 16269 | "cnaID": "CNA-2023-0023", |
16253 | 16270 | "organizationName": "Ribose Limited", |
16254 | | - "scope": "All Ribose products and services, including open-source projects, supported products, and end-of-life/end-of-service products", |
| 16271 | + "scope": "All Ribose products and services, including open source projects, supported products, and end-of-life/end-of-service products", |
16255 | 16272 | "contact": [ |
16256 | 16273 | { |
16257 | 16274 | "email": [ |
|
16533 | 16550 | "shortName": "IoT83", |
16534 | 16551 | "cnaID": "CNA-2023-0028", |
16535 | 16552 | "organizationName": "IoT83 Ltd", |
16536 | | - "scope": "Vulnerabilities in IoT83 product(s), services, and components only. Third-party, open-source components used in IoT83 product(s), services, and components are not in scope", |
| 16553 | + "scope": "Vulnerabilities in IoT83 product(s), services, and components only. Third-party, open source components used in IoT83 product(s), services, and components are not in scope", |
16537 | 16554 | "contact": [ |
16538 | 16555 | { |
16539 | 16556 | "email": [ |
|
16899 | 16916 | "shortName": "samsung.tv_appliance", |
16900 | 16917 | "cnaID": "CNA-2023-0034", |
16901 | 16918 | "organizationName": "Samsung TV & Appliance", |
16902 | | - "scope": "Samsung TV & Appliance products, Samsung-owned open-source projects listed on <a href='https://github.com/Samsung/' target='_blank'>https://github.com/Samsung/</a>, as well as vulnerabilities in third-party software discovered by Samsung that are not in another CNA’s scope. Vulnerabilities affecting end-of-life/end-of-service products are in scope. The following categories of Samsung Products are in scope: Internet-connected home appliances, B2C product (smart TV, smart monitor, soundbar, and projector), and B2B products (digital signage, interactive display, and kiosk)", |
| 16919 | + "scope": "Samsung TV & Appliance products, Samsung-owned open source projects listed on <a href='https://github.com/Samsung/' target='_blank'>https://github.com/Samsung/</a>, as well as vulnerabilities in third-party software discovered by Samsung that are not in another CNA’s scope. Vulnerabilities affecting end-of-life/end-of-service products are in scope. The following categories of Samsung Products are in scope: Internet-connected home appliances, B2C product (smart TV, smart monitor, soundbar, and projector), and B2B products (digital signage, interactive display, and kiosk)", |
16903 | 16920 | "contact": [ |
16904 | 16921 | { |
16905 | 16922 | "email": [ |
|
19436 | 19453 | "shortName": "Checkmarx", |
19437 | 19454 | "cnaID": "CNA-2023-0078", |
19438 | 19455 | "organizationName": "Checkmarx", |
19439 | | - "scope": "Vulnerabilities in Checkmarx products and open-source vulnerabilities discovered by, or reported to, Checkmarx, that are not in another CNA’s scope", |
| 19456 | + "scope": "Vulnerabilities in Checkmarx products and open source vulnerabilities discovered by, or reported to, Checkmarx, that are not in another CNA’s scope", |
19440 | 19457 | "contact": [ |
19441 | 19458 | { |
19442 | 19459 | "email": [ |
|
19719 | 19736 | "shortName": "EDB", |
19720 | 19737 | "cnaID": "CNA-2023-0083", |
19721 | 19738 | "organizationName": "EnterpriseDB Corporation", |
19722 | | - "scope": "All EnterpriseDB products and vulnerabilities identified in open-source libraries used by EnterpriseDB products unless covered by another CNA’s scope", |
| 19739 | + "scope": "All EnterpriseDB products and vulnerabilities identified in open source libraries used by EnterpriseDB products unless covered by another CNA’s scope", |
19723 | 19740 | "contact": [ |
19724 | 19741 | { |
19725 | 19742 | "email": [ |
|
23203 | 23220 | "shortName": "seal", |
23204 | 23221 | "cnaID": "CNA-2024-0060", |
23205 | 23222 | "organizationName": "Seal Security", |
23206 | | - "scope": "Vulnerabilities in Seal products or services and vulnerabilities discovered in open-source libraries unless covered by the scope of another CNA", |
| 23223 | + "scope": "Vulnerabilities in Seal products or services and vulnerabilities discovered in open source libraries unless covered by the scope of another CNA", |
23207 | 23224 | "contact": [ |
23208 | 23225 | { |
23209 | 23226 | "email": [ |
|
0 commit comments