Skip to content

Commit 7e2261c

Browse files
authored
#3285 Add 1 Blog @ CVE Records used for 2024 CWE Top 25 (#3295)
1 parent 1dd1c88 commit 7e2261c

File tree

2 files changed

+41
-0
lines changed

2 files changed

+41
-0
lines changed
59.8 KB
Loading

src/assets/data/news.json

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,46 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 444,
5+
"newsType": "blog",
6+
"title": "31,770 CVE Records Used as Basis for the “2024 CWE Top 25 Most Dangerous Software Weaknesses List”",
7+
"urlKeywords": "CVE Records Basis 2024 CWE Top 25",
8+
"date": "2024-12-03",
9+
"author": {
10+
"name": "CVE Program",
11+
"organization": {
12+
"name": "CVE Program",
13+
"url": ""
14+
},
15+
"title": "",
16+
"bio": ""
17+
},
18+
"description": [
19+
{
20+
"contentnewsType": "paragraph",
21+
"content": "The <i><a href='https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html' target='_blank'>2024 CWE Top 25 Most Dangerous Software Weaknesses</a></i> list was released by the <a href='https://cwe.mitre.org/' target='_blank'>Common Weakness Enumeration (CWE™) Program</a> on November 19, 2024. The newly released list highlights the most severe and prevalent weaknesses behind the <a href='https://cwe.mitre.org/top25/archive/2024/2024_methodology.html' target='_blank'>31,770 CVE Records mapped in the 2024 dataset</a>."
22+
},
23+
{
24+
"contentnewsType": "paragraph",
25+
"content": "Uncovering the root causes of these vulnerabilities serves as a powerful guide for investments, policies, and practices to prevent these vulnerabilities from occurring in the first place. These weaknesses lead to serious vulnerabilities in software, and an attacker can often exploit them to take control of an affected system, steal data, or prevent applications from working."
26+
},
27+
{
28+
"contentnewsType": "paragraph",
29+
"content": "The 2024 CWE Top 25 is the first time that the <a href='/ProgramOrganization/CNAs'>CVE Numbering Authority (CNA)</a> community directly contributed CWE mapping reviews within the dataset, leveraging their expert knowledge of the products and access to information that might not be present in the CVE Record. In general, CNAs are best positioned to provide accurate <a href='https://cwe.mitre.org/documents/cwe_usage/guidance.html' target='_blank'>CWE mapping</a> determinations compared to third-party analysts, as CNAs are the authority for vulnerability information within their CNA scope and those closest to the products themselves."
30+
},
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "Visit the <a href='https://cwe.mitre.org/top25/' target='_blank'>CWE Top 25 page</a> on the CWE website to view the full 2024 CWE Top 25 List, key insights, methodology, and more."
34+
},
35+
{
36+
"contentnewsType": "image",
37+
"imageWidth": "256",
38+
"href": "/news/cwe-top-25-logo.png",
39+
"altText": "CWE Top 25 Most Dangerous Software Weaknesses List logo",
40+
"captionText": "https://cwe.mitre.org/top25/"
41+
}
42+
]
43+
},
344
{
445
"id": 443,
546
"newsType": "news",

0 commit comments

Comments
 (0)