Skip to content

Commit 92d4db9

Browse files
authored
Merge pull request #3657 from CVEProject/int
8/5/25 Release: INT to MAIN
2 parents cf6174e + 5ddcbba commit 92d4db9

File tree

5 files changed

+226
-12
lines changed

5 files changed

+226
-12
lines changed

src/assets/data/CNAsList.json

Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26543,5 +26543,118 @@
2654326543
]
2654426544
},
2654526545
"country": "Spain"
26546+
},
26547+
{
26548+
"shortName": "GoogleCloud",
26549+
"cnaID": "CNA-2025-0038",
26550+
"organizationName": "Google Cloud",
26551+
"scope": "Vulnerabilities in any Google Cloud developed product and not under the scope of another CNA.",
26552+
"contact": [
26553+
{
26554+
"email": [
26555+
{
26556+
"label": "Email",
26557+
"emailAddr": "[email protected]"
26558+
}
26559+
],
26560+
"contact": [],
26561+
"form": []
26562+
}
26563+
],
26564+
"disclosurePolicy": [
26565+
{
26566+
"label": "Policy",
26567+
"language": "",
26568+
"url": "https://about.google/company-info/appsecurity/"
26569+
}
26570+
],
26571+
"securityAdvisories": {
26572+
"alerts": [],
26573+
"advisories": [
26574+
{
26575+
"label": "Advisories",
26576+
"language": "",
26577+
"url": "https://cloud.google.com/support/bulletins"
26578+
}
26579+
]
26580+
},
26581+
"resources": [],
26582+
"CNA": {
26583+
"isRoot": false,
26584+
"root": {
26585+
"shortName": "Google",
26586+
"organizationName": "Google LLC"
26587+
},
26588+
"type": [
26589+
"Vendor"
26590+
],
26591+
"TLR": {
26592+
"shortName": "mitre",
26593+
"organizationName": "MITRE Corporation"
26594+
},
26595+
"roles": [
26596+
{
26597+
"helpText": "",
26598+
"role": "CNA"
26599+
}
26600+
]
26601+
},
26602+
"country": "USA"
26603+
},
26604+
{
26605+
"shortName": "bcorg",
26606+
"cnaID": "CNA-2025-0039",
26607+
"organizationName": "Legion of the Bouncy Castle Inc.",
26608+
"scope": "Legion of the Bouncy Castle issues only.",
26609+
"contact": [
26610+
{
26611+
"email": [
26612+
{
26613+
"label": "Email",
26614+
"emailAddr": "[email protected]"
26615+
}
26616+
],
26617+
"contact": [],
26618+
"form": []
26619+
}
26620+
],
26621+
"disclosurePolicy": [
26622+
{
26623+
"label": "Policy",
26624+
"language": "",
26625+
"url": "https://www.bouncycastle.org/disclosure.html"
26626+
}
26627+
],
26628+
"securityAdvisories": {
26629+
"alerts": [],
26630+
"advisories": [
26631+
{
26632+
"label": "Advisories",
26633+
"url": "https://www.bouncycastle.org/vulnerability-advisory.html"
26634+
}
26635+
]
26636+
},
26637+
"resources": [],
26638+
"CNA": {
26639+
"isRoot": false,
26640+
"root": {
26641+
"shortName": "n/a",
26642+
"organizationName": "n/a"
26643+
},
26644+
"roles": [
26645+
{
26646+
"helpText": "",
26647+
"role": "CNA"
26648+
}
26649+
],
26650+
"TLR": {
26651+
"shortName": "mitre",
26652+
"organizationName": "MITRE Corporation"
26653+
},
26654+
"type": [
26655+
"Open Source"
26656+
]
26657+
},
26658+
"country": "Australia"
2654626659
}
2654726660
]

src/assets/data/events.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,18 @@
11
{
22
"currentEvents": [
3+
{
4+
"id": 39,
5+
"title": "CVE Program Technical Workshop – Autumn 2025",
6+
"location": "Virtual",
7+
"description": "A collaborative virtual community event of CVE Partners focused on improving CVE.<br/><br/>Event Time: 10:00 AM to 2:00 PM EDT both days.<br/><br/>Please refer to the CNA partners email announcements for agenda topics and other workshop details.",
8+
"permission": "private",
9+
"url": "",
10+
"date": {
11+
"start": "2025-10-22",
12+
"end": "2025-10-23",
13+
"repeat": false
14+
}
15+
},
316
{
417
"id": 38,
518
"title": "Researcher Working Group (RWG) Meeting",

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1200,7 +1200,7 @@
12001200
},
12011201
{
12021202
"month": "August",
1203-
"value": "TBA"
1203+
"value": "2"
12041204
},
12051205
{
12061206
"month": "September",

src/assets/data/news.json

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,81 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 557,
5+
"newsType": "news",
6+
"title": "Legion of the Bouncy Castle Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "Legion of Bouncy Castle Added as CNA",
8+
"date": "2025-08-04",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"shortName": "bcorg",
13+
"content": "<a href='/PartnerInformation/ListofPartners/partner/bcorg'>Legion of the Bouncy Castle Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for Legion of the Bouncy Castle issues only."
14+
},
15+
{
16+
"contentnewsType": "paragraph",
17+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>463 CNAs</a> (460 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>39 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Legion of the Bouncy Castle is the 9th CNA from Australia."
18+
},
19+
{
20+
"contentnewsType": "paragraph",
21+
"content": "Legion of the Bouncy Castle’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
22+
}
23+
]
24+
},
25+
{
26+
"id": 556,
27+
"newsType": "blog",
28+
"title": "Vulnerability Data Enrichment for CVE Records: 242 CNAs on the Enrichment Recognition List for August 4, 2025",
29+
"urlKeywords": "CNA Enrichment Recognition List Update",
30+
"date": "2025-08-04",
31+
"author": {
32+
"name": "CVE Program",
33+
"organization": {
34+
"name": "CVE Program",
35+
"url": ""
36+
},
37+
"title": "",
38+
"bio": ""
39+
},
40+
"description": [
41+
{
42+
"contentnewsType": "image",
43+
"imageWidth": "",
44+
"href": "/news/CnaEnrichmentRecognitionList.png",
45+
"altText": "Increasing the Value of the CVE Record - CNA Enrichment Recognition List"
46+
},
47+
{
48+
"contentnewsType": "paragraph",
49+
"content": "The “<a href='/About/Metrics#CNAEnrichmentRecognition'>CNA Enrichment Recognition List</a>” for August 4, 2025, is now available with 242 CNAs listed. Published monthly on the CVE website, the list recognizes those <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> that are actively providing enhanced vulnerability data in their <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a>. CNAs are added to the list if they provide <a href='https://www.first.org/cvss/' target='_blank'>Common Vulnerability Scoring System (CVSS)</a> and <a href='https://cwe.mitre.org/' target='_blank'>Common Weakness Enumeration (CWE&trade;)</a> in at least 98% of their records that were published within two weeks of their most recently published record."
50+
},
51+
{
52+
"contentnewsType": "paragraph",
53+
"content": "For more about the recognition list, see “<a href='/Media/News/item/blog/2024/09/10/CNA-Enrichment-Recognition-List'>Recognition for CNAs Actively Providing Vulnerability Data Enrichment for CVE Records</a>.” To learn more about vulnerability information types like CVSS and CWE, see the <a href='/CVERecord/UserGuide'>CVE Record User Guide</a>. View the most current CNA Enrichment Recognition List on the CVE website Metrics page <a href='/About/Metrics#CNAEnrichmentRecognition'>here</a>."
54+
},
55+
{
56+
"contentnewsType": "paragraph",
57+
"content": "CNA Enrichment Recognition List for August 4, 2025, with 242 CNAs listed: <ul><li>Acronis International GmbH</li><li>Adobe Systems Incorporated</li><li>Advanced Micro Devices Inc.</li><li>Amazon</li><li>AMI</li><li>ARC Informatique</li><li>Asea Brown Boveri Ltd.</li><li>ASR Microelectronics Co., Ltd.</li><li>ASUSTeK Computer Incorporation</li><li>ASUSTOR Inc.</li><li>ATISoluciones Diseño de Sistemas Electrónicos, S.L.</li><li>Austin Hackers Anonymous</li><li>Autodesk</li><li>Automotive Security Research Group (ASRG)</li><li>Avaya Inc.</li><li>Axis Communications AB</li><li>B. Braun SE</li><li>Baxter Healthcare</li><li>Beckman Coulter Life Sciences</li><li>BeyondTrust Inc.</li><li>Bitdefender</li><li>Bizerba SE & Co. KG</li><li>Black Duck Software, Inc.</li><li>Black Lantern Security</li><li>BlackBerry</li><li>Brocade Communications Systems LLC, a Broadcom Company</li><li>CA Technologies</li><li>Canon EMEA</li><li>Canon Inc.</li><li>Canonical Ltd.</li><li>Carrier Global Corporation</li><li>Cato Networks</li><li>Centreon</li><li>CERT.PL</li><li>CERT@VDE</li><li>Check Point Software Technologies Ltd.</li><li>Checkmarx</li><li>Checkmk GmbH</li><li>cirosec GmbH</li><li>Cisco Systems, Inc.</li><li>Citrix Systems, Inc.</li><li>Cloudflare, Inc.</li><li>Concrete CMS</li><li>ConnectWise LLC</li><li>Crafter CMS</li><li>Crestron Electronics, Inc.</li><li>CrowdStrike Holdings, Inc.</li><li>Cyber Security Agency of Singapore</li><li>Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government</li><li>Danfoss</li><li>Dassault Systèmes</li><li>Delinea, Inc.</li><li>Dell EMC</li><li>Delta Electronics, Inc.</li><li>Digi International Inc.</li><li>Docker Inc.</li><li>Dragos, Inc.</li><li>Dremio Corporation</li><li>Dutch Institute for Vulnerability Disclosure (DIVD)</li><li>Eaton</li><li>Eclipse Foundation</li><li>Edgewatch Security Intelligence</li><li>Elastic</li><li>EnterpriseDB Corporation</li><li>Environmental Systems Research Institute, Inc. (Esri)</li><li>Ericsson</li><li>Erlang Ecosystem Foundation</li><li>ESET, spol. s r.o.</li><li>Extreme Networks, Inc.</li><li>F5 Networks</li><li>Fedora Project (Infrastructure Software)</li><li>Financial Security Institute (FSI)</li><li>Flexera Software LLC</li><li>Fluid Attacks</li><li>Forcepoint</li><li>Forescout Technologies</li><li>Fortinet, Inc.</li><li>Fortra, LLC</li><li>FPT SOFTWARE CO., LTD</li><li>Gallagher Group Ltd</li><li>GE Vernova</li><li>Genetec Inc.</li><li>GitHub (maintainer security advisories)</li><li>GitHub Inc, (Products Only)</li><li>GitLab Inc.</li><li>Glyph & Cog, LLC</li><li>GNU C Library</li><li>Google LLC</li><li>Grafana Labs</li><li>Gridware Cybersecurity</li><li>Harborist</li><li>HashiCorp Inc.</li><li>HCL Software</li><li>HeroDevs</li><li>HiddenLayer, Inc.</li><li>Hillstone Networks Inc.</li><li>Hitachi Energy</li><li>Hitachi Vantara</li><li>Hitachi, Ltd.</li><li>Honeywell International Inc.</li><li>HP Inc.</li><li>HYPR Corp</li><li>IBM Corporation</li><li>ICS-CERT</li><li>iManage LLC</li><li>Indian Computer Emergency Response Team (CERT-In)</li><li>Insyde Software</li><li>Intel Corporation</li><li>Internet Systems Consortium (ISC)</li><li>Israel National Cyber Directorate</li><li>Ivanti</li><li>JetBrains s.r.o.</li><li>JFROG</li><li>Johnson Controls</li><li>JPCERT/CC</li><li>Juniper Networks, Inc.</li><li>Kaspersky</li><li>Kong Inc.</li><li>Kubernetes</li><li>Lenovo Group Ltd.</li><li>Lexmark International Inc.</li><li>LG Electronics</li><li>Liferay, Inc.</li><li>M-Files Corporation</li><li>Mandiant Inc.</li><li>Mattermost, Inc</li><li>Mautic</li><li>Medtronic</li><li>Microsoft Corporation</li><li>Milestone Systems A/S</li><li>MIM Software Inc.</li><li>Mitsubishi Electric Corporation</li><li>Monash University - Cyber Security Incident Response Team</li><li>MongoDB</li><li>Moxa Inc.</li><li>N-able</li><li>National Cyber Security Centre Finland</li><li>National Cyber Security Centre SK-CERT</li><li>National Instruments</li><li>NetApp, Inc.</li><li>Netskope</li><li>NLnet Labs</li><li>NortonLifeLock Inc</li><li>Nozomi Networks Inc.</li><li>Nvidia Corporation</li><li>OceanBase</li><li>Odoo</li><li>Okta</li><li>OMRON Corporation</li><li>ONEKEY GmbH</li><li>Open-Xchange</li><li>OpenAnolis</li><li>openEuler</li><li>OpenHarmony</li><li>OpenJS Foundation</li><li>OpenText (formerly Micro Focus)</li><li>OPPO</li><li>OTRS AG</li><li>Palantir Technologies</li><li>Palo Alto Networks</li><li>Panasonic Holdings Corporation</li><li>Pandora FMS</li><li>Patchstack OÜ</li><li>Pegasystems</li><li>Pentraze Cybersecurity</li><li>Perforce</li><li>Phoenix Technologies, Inc.</li><li>PHP Group</li><li>Ping Identity Corporation</li><li>PostgreSQL</li><li>Profisee Group, Inc.</li><li>Proofpoint Inc.</li><li>Protect AI</li><li>Pure Storage, Inc.</li><li>Python Software Foundation</li><li>QNAP Systems, Inc.</li><li>Qualcomm, Inc.</li><li>Rapid7, Inc.</li><li>Real-Time Innovations, Inc.</li><li>Red Hat CNA-LR</li><li>Red Hat, Inc.</li><li>Robert Bosch GmbH</li><li>Rockwell Automation</li><li>Samsung TV & Appliance</li><li>SAP SE</li><li>Saviynt Inc.</li><li>SBA Research gGmbH</li><li>Schneider Electric SE</li><li>Schweitzer Engineering Laboratories, Inc.</li><li>Seal Security</li><li>SEC Consult Vulnerability Lab</li><li>ServiceNow</li><li>SICK AG</li><li>Siemens</li><li>Silicon Labs</li><li>Snyk</li><li>SolarWinds</li><li>Sonatype Inc.</li><li>Sophos</li><li>Spanish National Cybersecurity Institute, S.A.</li><li>Super Micro Computer, Inc.</li><li>Suse</li><li>Switzerland National Cyber Security Centre (NCSC)</li><li>Synaptics</li><li>Synology Inc.</li><li>Talos</li><li>Temporal Technologies Inc.</li><li>Tenable Network Security, Inc.</li><li>The Document Foundation</li><li>The Missing Link Australia (TML)</li><li>The OpenNMS Group</li><li>The Qt Company</li><li>TianoCore.org</li><li>TIBCO Software Inc.</li><li>Toreon</li><li>TP-Link Systems Inc.</li><li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li><li>Trellix</li><li>Trend Micro, Inc.</li><li>TWCERT/CC</li><li>TXOne Networks, Inc.</li><li>TYPO3 Association</li><li>upKeeper Solutions</li><li>Vivo Mobile Communication Technology Co., LTD.</li><li>VulDB</li><li>WatchGuard Technologies, Inc.</li><li>Wind River Systems Inc.</li><li>Wordfence</li><li>WSO2 LLC</li><li>Xerox Corporation</li><li>Xiaomi Technology Co Ltd</li><li>Yandex N.V.</li><li>Yokogawa Group</li><li>Zabbix</li><li>Zephyr Project</li><li>Zero Day Initiative</li><li>Zohocorp</li><li>Zoom Video Communications, Inc.</li><li>Zscaler, Inc.</li><li>ZTE Corporation</li><li>ZUSO Advanced Research Team (ZUSO ART)</li><li>Zyxel Corporation</li></ul>"
58+
}
59+
]
60+
},
61+
{
62+
"id": 555,
63+
"newsType": "podcast",
64+
"title": "Mapping the Root Causes of CVEs",
65+
"urlKeywords": "Mapping the Root Causes of CVEs",
66+
"date": "2025-08-04",
67+
"description": [
68+
{
69+
"contentnewsType": "paragraph",
70+
"content": "Host Shannon Sabens chats with <a href='/'>CVE&trade;</a>/<a href='https://cwe.mitre.org/' target='_blank'>CWE&trade;</a> Project Lead Alec Summers and <a href='https://cwe.mitre.org/top25/' target='_blank'>CWE Top 25</a> task lead/<a href='https://cwe.mitre.org/community/working_groups.html#rcm_wg' target='_blank'>CWE Root Causes Mapping Working Group</a> lead Connor Mullaly about the importance of mapping <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> (vulnerabilities) to their technical root causes using <a href='https://cwe.mitre.org/' target='_blank'>Common Weakness Enumeration (CWE)</a>. Additional topics include the benefits of RCM for <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> and consumers of CVE data, <a href='https://www.first.org/cvss/' target='_blank'>Common Vulnerability Scoring System (CVSS)</a> and other vulnerability metadata and their differences with CWE, the <a href='https://cwe.mitre.org/top25/' target='_blank'>CWE Top 25 Most Dangerous Software Weaknesses</a> list, and the tools and guidance available to improve the RCM process (e.g., examples of mappings and best practices on the <a href='https://cwe.mitre.org/' target='_blank'>CWE website</a>, mapping usage labels on CWE entry pages on the website, the <a href='https://cwe.mitre.org/community/working_groups.html#rcm_wg' target='_blank'>RCM WG</a>, and an LLM tool), and more."
71+
},
72+
{
73+
"contentnewsType": "paragraph",
74+
"content": "“<a href='/Media/News/Podcasts'>We Speak CVE</a>” is a free podcast about cybersecurity, vulnerability management, and the CVE Program. Listen on the <a href='https://www.youtube.com/channel/UCUHd2XFDsKH8kjMZQaSKpDQ/' target='_blank'>CVE Program Channel on YouTube</a>, on <a href='https://wespeakcve.buzzsprout.com/' target='_blank'>We Speak CVE page on Buzzsprout</a>, and on major podcast directories such as Spotify, Stitcher, Apple Podcasts, iHeartRadio, Podcast Addict, Podchaser, Pocket Casts, Deezer, Listen Notes, Player FM, and Podcast Index, among others."
75+
}
76+
],
77+
"url": "https://www.youtube.com/embed/3nNmrv4j1YE"
78+
},
379
{
480
"id": 554,
581
"newsType": "news",

0 commit comments

Comments
 (0)