Skip to content

Commit 568c167

Browse files
committed
Merge branch 'dev' of https://github.com/CVEProject/cve-website into content-rjr-3225
2 parents 8063155 + 5e601b1 commit 568c167

40 files changed

+1518
-715
lines changed

.github/workflows/web-issue-triage.yml

Lines changed: 0 additions & 12 deletions
This file was deleted.

src/App.vue

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ import PrimaryNavigation from './components/PrimaryNavigation.vue';
1919
import NotificationBannerModule from './components/NotificationBannerModule.vue';
2020
import FoooterModule from './components/FooterModule.vue';
2121
import NotFound from './views/NotFound.vue';
22+
import { usePartnerStore } from '@/stores/partners';
2223
2324
export default {
2425
components: {
@@ -31,6 +32,9 @@ export default {
3132
return {
3233
NavigationItems
3334
}
35+
},
36+
beforeMount() {
37+
usePartnerStore().populatePartnerShortLongNameMap();
3438
}
3539
}
3640
</script>

src/assets/data/CNAsList.json

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23890,5 +23890,61 @@
2389023890
]
2389123891
},
2389223892
"country": "Singapore"
23893+
},
23894+
{
23895+
"shortName": "LeicaBiosystems",
23896+
"cnaID": "CNA-2024-0072",
23897+
"organizationName": "Leica Biosystems",
23898+
"scope": "All Leica Biosystems products",
23899+
"contact": [
23900+
{
23901+
"email": [
23902+
{
23903+
"label": "Email",
23904+
"emailAddr": "[email protected]"
23905+
}
23906+
],
23907+
"contact": [],
23908+
"form": []
23909+
}
23910+
],
23911+
"disclosurePolicy": [
23912+
{
23913+
"label": "Policy",
23914+
"language": "",
23915+
"url": "https://www.leicabiosystems.com/us/about/coordinated-vulnerability-disclosure-cvd-process/"
23916+
}
23917+
],
23918+
"securityAdvisories": {
23919+
"alerts": [],
23920+
"advisories": [
23921+
{
23922+
"label": "Advisories",
23923+
"url": "https://www.leicabiosystems.com/us/about/product-security-advisories/"
23924+
}
23925+
]
23926+
},
23927+
"resources": [],
23928+
"CNA": {
23929+
"isRoot": false,
23930+
"root": {
23931+
"shortName": "icscert",
23932+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)"
23933+
},
23934+
"roles": [
23935+
{
23936+
"helpText": "",
23937+
"role": "CNA"
23938+
}
23939+
],
23940+
"TLR": {
23941+
"shortName": "CISA",
23942+
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA)"
23943+
},
23944+
"type": [
23945+
"Vendor"
23946+
]
23947+
},
23948+
"country": "USA"
2389323949
}
2389423950
]

src/assets/data/currentBoardMembersList.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,14 @@
151151
"organizationURL": "https://www.panasonic.com/global/home.html",
152152
"role": "Board"
153153
},
154+
{
155+
"familyName": "Turner",
156+
"firstName": "Chris",
157+
"imageURL": "",
158+
"organization": "National Institute of Standards and Technology (NIST)",
159+
"organizationURL": "https://www.nist.gov/",
160+
"role": "NIST CVE Board Liaison"
161+
},
154162
{
155163
"familyName": "Waltermire",
156164
"firstName": "David",
@@ -167,4 +175,4 @@
167175
"organizationURL": "https://www.broadcom.com/",
168176
"role": "Board"
169177
}
170-
]
178+
]

src/assets/data/events.json

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,9 @@
1818
},
1919
{
2020
"id": 34,
21-
"displayOnHomepageOrder": 1,
2221
"title": "CVE Program Workshop – Autumn 2024",
2322
"location": "Virtual",
24-
"description": "A collaborative virtual community event of CVE Partners focused on improving CVE.<br/><br/>Event Time: 10:00 AM to 2:00 PM EDT both days.<br/><br/>Please refer to the CNA partners email announcements for agenda topics, deadlines, and other workshop details.",
23+
"description": "A collaborative virtual community event of CVE Partners focused on improving CVE.<br/><br/>Event Time: 10:00 AM to 2:00 PM EDT both days.<br/><br/>Please refer to the CNA partners email announcements for agenda topics and other workshop details.",
2524
"permission": "private",
2625
"url": "",
2726
"date": {
@@ -32,7 +31,7 @@
3231
},
3332
{
3433
"id": 33,
35-
"displayOnHomepageOrder": 2,
34+
"displayOnHomepageOrder": 1,
3635
"title": "CVE/FIRST VulnCon 2025",
3736
"location": "Raleigh, North Carolina, USA & Virtual",
3837
"description": "VulnCon 2025 is co-sponsored by the <a href='/'>CVE Program</a> and <a href='https://www.first.org/' target='_blank'>FIRST</a> and is open to the public.<br/><br/><strong>SPECIAL MESSAGE FOR CVE NUMBERING AUTHORITIES (CNAs)</strong>:<br/><i>VulnCon 2025 takes the place of this year’s Spring CVE Global Summit.</i><br/><br/><strong>Call for Papers</strong>:<br/>Open until January 31, 2025. Details <a href='https://www.first.org/conference/vulncon2025/cfp' target='_blank'>here</a>.<br/><br/><strong>Program Overview</strong>:<br/>* Day 1: Monday, April 7 &mdash; TBA<br/>* Day 2: Tuesday, April 8 &mdash; TBA<br/>* Day 3: Wednesday, April 9 &mdash; TBA <br/>* Day 4: Thursday, April 10 &mdash; TBA<br/><br/><strong>Agenda</strong>:<br/> TBA<br/><br/> <strong>Call for Papers</strong>:<br/>TBA<br/><br/><strong>Registration</strong>:<br/>Registration will open in November 2024.<br/><ul><li>Standard Admission (by March 9, 2025): US $300.00</li><li>Late Rate Admission (after March 9, 2025): US $375.00</li><li>Virtual Admission: US $100.00</li></ul>Registration fees include four days of coffee breaks and buffet lunches, one networking reception hosted at the McKimmon Center, and applicable meeting materials. Note that discounted rates are not being offered for this event regardless of membership or speaking status.<br/><br/>An After Party will be tentatively hosted off-site with tickets to be sold separately. More information to come. Tickets will cost US $25.00.<br/><br/><strong>Venue</strong>:<br/><a href='https://facilities.ofa.ncsu.edu/building/mck/' target='_blank'>McKimmon Center,<br/>North Carolina State University</a>,<br/>1101 Gorman St.,<br/> Raleigh, North Carolina 27606<br/>USA<br/><br/><strong>Purpose</strong>:<br/>The purpose of <a href='https://www.first.org/conference/vulncon2025/' target='_blank'>VulnCon</a> is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem.<br/><br/>A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly.",

src/assets/data/faqs.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -271,8 +271,8 @@
271271
"questionId": "search_cve",
272272
"questionText": "How do I search the CVE List",
273273
"questionResponseParagraphs": [
274-
"<strong>Keyword(s) Search of All CVE Records</strong>",
275-
"<ul><li>Search by keyword(s) across <a href='https://github.com/CVEProject/cvelistV5' target='_blank'>ALL FIELDS of all CVE Records</a> in the cvelistV5 downloads repository using the main search box on GitHub.com.</li><li>Search by keyword(s) in the <a href='https://cve.mitre.org/cve/search_cve_list.html' target='_blank'>Description fields ONLY of all CVE Records</a> using the legacy search page on cve.mitre.org.</li></ul>"
274+
"<b><i>Search Tips<i></b>",
275+
"<ul><li>By CVE ID<ul><li>Must include only one CVE ID per search.</li><li>CVE ID must include all letters, numbers, and hyphens associated with the CVE ID, e.g., CVE-2024-12345678.</li><li>“CVE” may be entered as “cve”, “CVE”, or as a combination of uppercase and lowercase, as casing is ignored during search.</li></ul></li><li>By other keyword(s)<ul><li>Must contain only alphanumeric characters, e.g., letters or numbers.</li><li>May contain one or more keywords, separated by a space.</li><li>Keywords may be entered in lowercase, uppercase, or a combination of both. Casing is ignored during search, e.g., Vulnerabilities, vulnerabilities, VULNERABILITIES.</li></ul></li></ul>"
276276
]
277277
},
278278
{

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1165,7 +1165,7 @@
11651165
},
11661166
{
11671167
"month": "October",
1168-
"value": "6"
1168+
"value": "7"
11691169
},
11701170
{
11711171
"month": "November",

src/assets/data/news.json

Lines changed: 45 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,50 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 431,
5+
"newsType": "news",
6+
"title": "Leica Biosystems Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "Leica Biosystems Added as CNA",
8+
"date": "2024-10-29",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/LeicaBiosystems'>Leica Biosystems</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for all Leica Biosystems products."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>415 CNAs</a> (413 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Leica Biosystems is the 225th CNA from USA."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "Leica Biosystems’ Root is the <a href='/PartnerInformation/ListofPartners/partner/icscert'>CISA ICS Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 430,
26+
"newsType": "news",
27+
"title": "NIST CVE Board Liaison Board Member Announced",
28+
"urlKeywords": "NIST CVE Board Liaison Board Member Announced",
29+
"date": "2024-10-29",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "The <a href='/'>CVE Program</a> is pleased to announce that Chris Turner of the <a href='https://www.nist.gov/' target='_blank'>National Institute of Standards and Technology (NIST)</a> is the newest member of the <a href='/ProgramOrganization/Board'>CVE Board</a>, serving as the “NIST CVE Board Liaison.”"
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "Per the <a href='/Resources/Roles/Board/General/Board-Charter.pdf' target='_blank'>CVE Board Charter</a>, “Section 1.3.3 Organizational Liaison &ndash; An Organizational Liaison position allows for tighter partnerships with targeted organizations. This type of role provides the Board with greater flexibility for how external organizations work with the Board and CVE Program governance. There can be one or more organization(s) designated to have a liaison relationship with the Board at any one time. Each Organization with a Liaison position will have a single seat on the Board reserved for the Organizational Liaison representing them. This allows the Board representation from specific organizations as needed. This is a term-limited seat that must be reconfirmed by the Secretariat when the term set expires. The default term, unless specified by the Board during the establishment of the organization’s liaison role, is one year. The Secretariat assures the Organization wishes to continue the Board relationship and that the designated individual is the proper person to fill the role for the organization for the upcoming term. The Organization’s liaison is a voting member of the Board and can serve more than one consecutive term if the Organization desires. This position is a two-way conduit for the Organization to bring things to and from the Board in an official and structured way.”"
38+
},
39+
{
40+
"contentnewsType": "paragraph",
41+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
42+
}
43+
]
44+
},
345
{
446
"id": 429,
47+
"displayOnHomepageOrder": 1,
548
"newsType": "blog",
649
"title": "CVE Program Celebrates 25 Years of Impact!",
750
"urlKeywords": "CVE Program Celebrates 25 Years",
@@ -133,7 +176,7 @@
133176
"description": [
134177
{
135178
"contentnewsType": "paragraph",
136-
"content": "<a href='/PartnerInformation/ListofPartners/partner/OMRON'>OMRON Corporation</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for Omron Group companies’ Industrial Automation, Healthcare, Social Systems, Device &amp; Module Solutions issues only."
179+
"content": "<a href='/PartnerInformation/ListofPartners/partner/OMRON'>OMRON Corporation</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for Omron Group companies’ Industrial Automation, Healthcare, Social Systems, Device &amp; Module Solutions issues only. Read the OMRON news release: “<a href='https://www.omron.com/global/en/media/2024/10/c1024.html' target='_blank'>Authorized as a CVE Numbering Authority for security vulnerabilities</a>."
137180
},
138181
{
139182
"contentnewsType": "paragraph",
@@ -417,7 +460,7 @@
417460
"description": [
418461
{
419462
"contentnewsType": "paragraph",
420-
"content": "<a href='/PartnerInformation/ListofPartners/partner/RTI'>Real-Time Innovations, Inc.</a> (RTI) is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for all RTI Connext products, including EOL products. See <a href='https://www.rti.com/products' target='_blank'>https://www.rti.com/products</a> for more information."
463+
"content": "<a href='/PartnerInformation/ListofPartners/partner/RTI'>Real-Time Innovations, Inc.</a> (RTI) is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for all RTI Connext products, including EOL products. See <a href='https://www.rti.com/products' target='_blank'>https://www.rti.com/products</a> for more information. Read the RTI news release: “<a href='https://www.rti.com/news/rti-joins-cve-program' target='_blank'>RTI Joins the Common Vulnerabilities and Exposures (CVE®) Program as a CVE Numbering Authority (CNA)</a>."
421464
},
422465
{
423466
"contentnewsType": "paragraph",

src/components/AdpVulnerabilityEnrichment.vue

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,21 @@
55
<slot></slot>
66
<button class="button message-header-button"
77
:style="{'background-color': '#162e51 !important', 'color': 'white !important'}"
8-
:aria-expanded="useCveRecordLookupStore.accordionState[organizationId] ? 'true' : 'false'"
8+
:aria-expanded="usecveRecordStore.accordionState[organizationId] ? 'true' : 'false'"
99
:aria-controls="`${organizationId}-panel`"
1010
>
1111
<span class="icon is-small">
1212
<p :id="`expandCollapseAltText-${organizationId}`" class="is-hidden">
13-
{{useCveRecordLookupStore.accordionState[organizationId] ? 'expand' : 'collapse'}}
13+
{{usecveRecordStore.accordionState[organizationId] ? 'expand' : 'collapse'}}
1414
</p>
15-
<font-awesome-icon :icon="useCveRecordLookupStore.accordionState[organizationId] ? 'minus' : 'plus'"
15+
<font-awesome-icon :icon="usecveRecordStore.accordionState[organizationId] ? 'minus' : 'plus'"
1616
aria-hidden="false" focusable="true" :aria-labelledby="`expandCollapseAltText-${organizationId}`"
1717
/>
1818
</span>
1919
</button>
2020
</button>
2121
<!-- Panel content is conditionally determined by role -->
22-
<div :id="`${organizationId}-panel`" v-if="useCveRecordLookupStore.accordionState[organizationId]"
22+
<div :id="`${organizationId}-panel`" v-if="usecveRecordStore.accordionState[organizationId]"
2323
class="pl-3 pr-3 pt-2 pb-5 cve-container-accordion-panel"
2424
>
2525
<div>
@@ -210,7 +210,8 @@
210210
</template>
211211

212212
<script>
213-
import { useCveRecordLookupStore } from '@/stores/cveRecordLookup.ts';
213+
import { usecveRecordStore } from '@/stores/cveRecord.ts';
214+
import { useGenericGlobalsStore } from '@/stores/genericGlobals';
214215
import ProductStatus from '@/components/ProductStatus.vue';
215216
import CveRecordReferences from './CveRecordReferences.vue';
216217
@@ -255,13 +256,13 @@ export default {
255256
//to do
256257
adpShortName: this.containerObject.providerMetadata.shortName,
257258
dateUpdated: '',
258-
cveServicesBaseUrl: import.meta.env.VITE_CVE_SERVICES_BASE_URL,
259-
useCveRecordLookupStore: useCveRecordLookupStore(),
259+
cveServicesBaseUrl: useGenericGlobalsStore().currentServicesUrl,
260+
usecveRecordStore: usecveRecordStore(),
260261
}
261262
},
262263
methods: {
263264
togglePanel(){
264-
useCveRecordLookupStore().accordionState[this.organizationId] = !useCveRecordLookupStore().accordionState[this.organizationId];
265+
usecveRecordStore().accordionState[this.organizationId] = !usecveRecordStore().accordionState[this.organizationId];
265266
},
266267
hasEnrichmentData(){
267268
if (this.cwes.length > 0 || this.cvsss.length > 0 || this.kevs.length > 0 || this.ssvcs.length > 0) {
@@ -406,8 +407,8 @@ export default {
406407
}
407408
},
408409
getCveProgramReferences(){
409-
if (this.containerObject.providerMetadata.shortName.toLowerCase() !== useCveRecordLookupStore().cveProgramShortName) return;
410-
this.cveProgramReferences = useCveRecordLookupStore().getReferences(this.containerObject.references);
410+
if (this.containerObject.providerMetadata.shortName.toLowerCase() !== usecveRecordStore().cveProgramShortName) return;
411+
this.cveProgramReferences = usecveRecordStore().getReferences(this.containerObject.references);
411412
},
412413
getUpdatedDate() {
413414
this.dateUpdated = this.getDate(this.containerObject.providerMetadata.dateUpdated);

src/components/HelloWorld.vue

Lines changed: 0 additions & 41 deletions
This file was deleted.

0 commit comments

Comments
 (0)