Skip to content

Commit 32bd150

Browse files
authored
7/22/25 release branch (#3644)
* #3641 Add 1 WG Chair name to WGs page * #3642 Add 2 new CNA + Update 1 CNA's info * #3641 Add CWG repository url to WGs page * #3642 Update 2 news id numbers * #3643 Add 1 new News article @ Board meeting minutes * #3642 Update 1 CNA's info
1 parent 1795c45 commit 32bd150

File tree

4 files changed

+185
-8
lines changed

4 files changed

+185
-8
lines changed

src/assets/data/CNAsList.json

Lines changed: 122 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12636,26 +12636,31 @@
1263612636
"email": [
1263712637
{
1263812638
"label": "Email",
12639-
"emailAddr": "[email protected]"
12639+
"emailAddr": "[email protected]"
12640+
}
12641+
],
12642+
"contact": [
12643+
{
12644+
"label": "FULL security contact page",
12645+
"url": "https://security.full.services/enviar-vulnerabilidade/"
1264012646
}
1264112647
],
12642-
"contact": [],
1264312648
"form": []
1264412649
}
1264512650
],
1264612651
"disclosurePolicy": [
1264712652
{
1264812653
"label": "Policy",
1264912654
"language": "",
12650-
"url": "https://security.fullstackagency.club/enviar-vulnerabilidade/"
12655+
"url": "https://security.full.services/politica-de-divulgacao-de-vulnerabilidades/"
1265112656
}
1265212657
],
1265312658
"securityAdvisories": {
1265412659
"alerts": [],
1265512660
"advisories": [
1265612661
{
1265712662
"label": "Advisories",
12658-
"url": "https://security.fullstackagency.club/"
12663+
"url": "https://security.full.services/vulnerabilidades-no-wordpress/"
1265912664
}
1266012665
]
1266112666
},
@@ -26369,5 +26374,118 @@
2636926374
]
2637026375
},
2637126376
"country": "Switzerland"
26377+
},
26378+
{
26379+
"shortName": "TCS-CERT",
26380+
"cnaID": "CNA-2025-0035",
26381+
"organizationName": "TCS-CERT (Thales Cyber Solutions Customer’s CERT)",
26382+
"scope": "Vulnerabilities related to TCS-CERT’s customers’ environment and vulnerabilities related to research conducted by Cyber Solutions by Thales’ Intrusion and Application Security Team.",
26383+
"contact": [
26384+
{
26385+
"email": [
26386+
{
26387+
"label": "Email",
26388+
"emailAddr": "[email protected]"
26389+
}
26390+
],
26391+
"contact": [],
26392+
"form": []
26393+
}
26394+
],
26395+
"disclosurePolicy": [
26396+
{
26397+
"label": "Policy",
26398+
"language": "",
26399+
"url": "https://cds.thalesgroup.com/en/tcs-cert/advisory"
26400+
}
26401+
],
26402+
"securityAdvisories": {
26403+
"alerts": [],
26404+
"advisories": [
26405+
{
26406+
"label": "Advisories",
26407+
"url": "https://cds.thalesgroup.com/en/tcs-cert/advisory"
26408+
}
26409+
]
26410+
},
26411+
"resources": [],
26412+
"CNA": {
26413+
"isRoot": false,
26414+
"root": {
26415+
"shortName": "THA-PSIRT",
26416+
"organizationName": "Thales Group"
26417+
},
26418+
"type": [
26419+
"CERT"
26420+
],
26421+
"TLR": {
26422+
"shortName": "mitre",
26423+
"organizationName": "MITRE Corporation"
26424+
},
26425+
"roles": [
26426+
{
26427+
"helpText": "",
26428+
"role": "CNA"
26429+
}
26430+
]
26431+
},
26432+
"country": "Belgium"
26433+
},
26434+
{
26435+
"shortName": "rust",
26436+
"cnaID": "CNA-2025-0036",
26437+
"organizationName": "The Rust Project",
26438+
"scope": "Repositories, packages, and websites maintained by the Rust Project. More details: <a href='https://www.rust-lang.org/policies/security#scope' target='_blank'>https://www.rust-lang.org/policies/security#scope</a>.",
26439+
"contact": [
26440+
{
26441+
"email": [
26442+
{
26443+
"label": "Email",
26444+
"emailAddr": "[email protected]"
26445+
}
26446+
],
26447+
"contact": [],
26448+
"form": []
26449+
}
26450+
],
26451+
"disclosurePolicy": [
26452+
{
26453+
"label": "Policy",
26454+
"language": "",
26455+
"url": "https://www.rust-lang.org/policies/security"
26456+
}
26457+
],
26458+
"securityAdvisories": {
26459+
"alerts": [],
26460+
"advisories": [
26461+
{
26462+
"label": "Advisories",
26463+
"url": "https://groups.google.com/g/rustlang-security-announcements"
26464+
}
26465+
]
26466+
},
26467+
"resources": [],
26468+
"CNA": {
26469+
"isRoot": false,
26470+
"root": {
26471+
"shortName": "redhat",
26472+
"organizationName": "Red Hat, Inc."
26473+
},
26474+
"type": [
26475+
"Vendor",
26476+
"Open Source"
26477+
],
26478+
"TLR": {
26479+
"shortName": "mitre",
26480+
"organizationName": "MITRE Corporation"
26481+
},
26482+
"roles": [
26483+
{
26484+
"helpText": "",
26485+
"role": "CNA"
26486+
}
26487+
]
26488+
},
26489+
"country": "USA"
2637226490
}
2637326491
]

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1196,7 +1196,7 @@
11961196
},
11971197
{
11981198
"month": "July",
1199-
"value": "4"
1199+
"value": "6"
12001200
},
12011201
{
12021202
"month": "August",

src/assets/data/news.json

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,64 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 552,
5+
"newsType": "news",
6+
"title": "The Rust Project Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "The Rust Project Added as CNA",
8+
"date": "2025-07-22",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/rust'>The Rust Project</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for repositories, packages, and websites maintained by the Rust Project. More details: <a href='https://www.rust-lang.org/policies/security#scope' target='_blank'>https://www.rust-lang.org/policies/security#scope</a>."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>460 CNAs</a> (457 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>39 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. The Rust Project is the 251st CNA from USA."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "The Rust Project’s Root is the <a href='/PartnerInformation/ListofPartners/partner/redhat'>Red Hat Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 551,
26+
"newsType": "news",
27+
"title": "TCS-CERT Added as CVE Numbering Authority (CNA)",
28+
"urlKeywords": "TCS CERT Added as CNA",
29+
"date": "2025-07-22",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "<a href='/PartnerInformation/ListofPartners/partner/TCS-CERT'>TCS-CERT</a> (Thales Cyber Solutions Customer’s CERT) is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities related to TCS-CERT’s customers’ environment and vulnerabilities related to research conducted by Cyber Solutions by Thales’ Intrusion and Application Security Team."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>459 CNAs</a> (456 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>39 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. TCS-CERT is the 5th CNA from Belgium."
38+
},
39+
{
40+
"contentnewsType": "paragraph",
41+
"content": "TCS-CERT’s Root is the <a href='/PartnerInformation/ListofPartners/partner/THA-PSIRT'>Thales Group Root</a>."
42+
}
43+
]
44+
},
45+
{
46+
"id": 550,
47+
"newsType": "news",
48+
"title": "Minutes from CVE Board Teleconference Meeting on July 9 Now Available",
49+
"urlKeywords": "CVE Board Minutes from July 9",
50+
"date": "2025-07-22",
51+
"description": [
52+
{
53+
"contentnewsType": "paragraph",
54+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on July 9, 2025. Read the <a href='https://www.mail-archive.com/[email protected]/msg00283.html' target='_blank'>meeting minutes summary</a>."
55+
},
56+
{
57+
"contentnewsType": "paragraph",
58+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
59+
}
60+
]
61+
},
362
{
463
"id": 549,
564
"newsType": "blog",

src/views/ProgramOrganization/WorkingGroups.vue

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@
148148
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['CVE Consumer Working Group (CWG)']['label']}}
149149
</h2>
150150
<p>
151-
Chair: TBA
151+
Chair: Jay Jacobs
152152
</p>
153153
<p>
154154
The CWG serves as a dedicated forum for representing the perspectives of end-consumers of CVE List data, such as enterprises,
@@ -185,7 +185,7 @@
185185
</h3>
186186
<ul class="tile-body cve-task-tile-list">
187187
<li class="cve-task-tile-list-item">
188-
TBA
188+
<a href="https://github.com/CVEProject/consumer-working-group" target="_blank">CWG GitHub Repository</a>
189189
</li>
190190
</ul>
191191
</article>
@@ -381,7 +381,7 @@
381381
{{cvenavs['Program Organization']['submenu']['Working Groups']['items']['Strategic Planning Working Group (SPWG)']['label']}}
382382
</h2>
383383
<p>
384-
Chair: Kent Landfield
384+
Co-Chairs: Kent Landfield and Art Manion
385385
</p>
386386
<p>
387387
The SPWG is focused on the long-term strategy (1-5 years) and goals of the CVE Program; will work closely with the

0 commit comments

Comments
 (0)