Skip to content

Commit 978b0b3

Browse files
authored
Merge pull request #3214 from CVEProject/content-rjr-3182
Content rjr 3182
2 parents 38fd6b6 + 0a6022c commit 978b0b3

File tree

4 files changed

+234
-1
lines changed

4 files changed

+234
-1
lines changed

src/assets/data/CNAsList.json

Lines changed: 170 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23720,5 +23720,175 @@
2372023720
]
2372123721
},
2372223722
"country": "USA"
23723+
},
23724+
{
23725+
"shortName": "PingCAP",
23726+
"cnaID": "CNA-2024-0069",
23727+
"organizationName": "PingCAP (US), Inc.",
23728+
"scope": "Vulnerabilities in the following PingCAP maintained products and components: TiDB (code available at <a href='https://github.com/pingcap/tidb' target='_blank'>https://github.com/pingcap/tidb</a>); TiKV (code available at <a href='https://github.com/tikv/tikv' target='_blank'>https://github.com/tikv/tikv</a>); PD (Placement Driver, code available at <a href='https://github.com/tikv/pd' target='_blank'>https://github.com/tikv/pd</a>); TiFlash (code available at <a href='https://github.com/pingcap/tiflash' target='_blank'>https://github.com/pingcap/tiflash</a>); and tidbcloud (PingCAP’s cloud database service). This scope includes vulnerabilities in all supported versions of these products. CVE IDs will not be assigned for vulnerabilities found in unsupported versions or for third-party dependencies not maintained by PingCAP",
23729+
"contact": [
23730+
{
23731+
"email": [
23732+
{
23733+
"label": "Email",
23734+
"emailAddr": "[email protected]"
23735+
}
23736+
],
23737+
"contact": [],
23738+
"form": []
23739+
}
23740+
],
23741+
"disclosurePolicy": [
23742+
{
23743+
"label": "Policy",
23744+
"language": "",
23745+
"url": "https://www.pingcap.com/security/"
23746+
}
23747+
],
23748+
"securityAdvisories": {
23749+
"alerts": [],
23750+
"advisories": [
23751+
{
23752+
"label": "Advisories",
23753+
"url": "https://www.pingcap.com/security/"
23754+
}
23755+
]
23756+
},
23757+
"resources": [],
23758+
"CNA": {
23759+
"isRoot": false,
23760+
"root": {
23761+
"shortName": "n/a",
23762+
"organizationName": "n/a"
23763+
},
23764+
"roles": [
23765+
{
23766+
"helpText": "",
23767+
"role": "CNA"
23768+
}
23769+
],
23770+
"TLR": {
23771+
"shortName": "mitre",
23772+
"organizationName": "MITRE Corporation"
23773+
},
23774+
"type": [
23775+
"Vendor",
23776+
"Open Source",
23777+
"Hosted Service"
23778+
]
23779+
},
23780+
"country": "USA"
23781+
},
23782+
{
23783+
"shortName": "OMRON",
23784+
"cnaID": "CNA-2024-0070",
23785+
"organizationName": "OMRON Corporation",
23786+
"scope": "Omron Group companies’ Industrial Automation, Healthcare, Social Systems, Device &amp; Module Solutions issues only",
23787+
"contact": [
23788+
{
23789+
"email": [],
23790+
"contact": [
23791+
{
23792+
"label": "OMRON PSIRT Contact page",
23793+
"url": "https://www.omron.com/contact/ContactForm.do?FID=00282"
23794+
}
23795+
],
23796+
"form": []
23797+
}
23798+
],
23799+
"disclosurePolicy": [
23800+
{
23801+
"label": "Policy",
23802+
"language": "",
23803+
"url": "https://www.omron.com/contact/ContactForm.do?FID=00282"
23804+
}
23805+
],
23806+
"securityAdvisories": {
23807+
"alerts": [],
23808+
"advisories": [
23809+
{
23810+
"label": "Advisories",
23811+
"url": "https://www.omron.com/global/en/inquiry/vulnerability_information/"
23812+
}
23813+
]
23814+
},
23815+
"resources": [],
23816+
"CNA": {
23817+
"isRoot": false,
23818+
"root": {
23819+
"shortName": "jpcert",
23820+
"organizationName": "JPCERT/CC"
23821+
},
23822+
"type": [
23823+
"Vendor"
23824+
],
23825+
"TLR": {
23826+
"shortName": "mitre",
23827+
"organizationName": "MITRE Corporation"
23828+
},
23829+
"roles": [
23830+
{
23831+
"helpText": "",
23832+
"role": "CNA"
23833+
}
23834+
]
23835+
},
23836+
"country": "Japan"
23837+
},
23838+
{
23839+
"shortName": "CSA",
23840+
"cnaID": "CNA-2024-0071",
23841+
"organizationName": "Cyber Security Agency of Singapore",
23842+
"scope": "Vulnerabilities reported to CSA unless covered by the scope of another CNA",
23843+
"contact": [
23844+
{
23845+
"email": [
23846+
{
23847+
"label": "Email",
23848+
"emailAddr": "[email protected]"
23849+
}
23850+
],
23851+
"contact": [],
23852+
"form": []
23853+
}
23854+
],
23855+
"disclosurePolicy": [
23856+
{
23857+
"label": "Policy",
23858+
"language": "",
23859+
"url": "https://www.csa.gov.sg/Tips-Resource/Resources/singcert/singcert-vulnerability-disclosure-policy"
23860+
}
23861+
],
23862+
"securityAdvisories": {
23863+
"alerts": [],
23864+
"advisories": [
23865+
{
23866+
"label": "Advisories",
23867+
"url": "https://www.csa.gov.sg/alerts-advisories"
23868+
}
23869+
]
23870+
},
23871+
"resources": [],
23872+
"CNA": {
23873+
"isRoot": false,
23874+
"root": {
23875+
"shortName": "n/a",
23876+
"organizationName": "n/a"
23877+
},
23878+
"roles": [
23879+
{
23880+
"helpText": "",
23881+
"role": "CNA"
23882+
}
23883+
],
23884+
"TLR": {
23885+
"shortName": "mitre",
23886+
"organizationName": "MITRE Corporation"
23887+
},
23888+
"type": [
23889+
"CERT"
23890+
]
23891+
},
23892+
"country": "Singapore"
2372323893
}
2372423894
]

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1165,7 +1165,7 @@
11651165
},
11661166
{
11671167
"month": "October",
1168-
"value": "3"
1168+
"value": "6"
11691169
},
11701170
{
11711171
"month": "November",

src/assets/data/news.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,69 @@
103103
}
104104
]
105105
},
106+
{
107+
"id": 427,
108+
"newsType": "news",
109+
"title": "Cyber Security Agency of Singapore Added as CVE Numbering Authority (CNA)",
110+
"urlKeywords": "Cyber Security Agency of Singapore Added as CNA",
111+
"date": "2024-10-22",
112+
"description": [
113+
{
114+
"contentnewsType": "paragraph",
115+
"content": "<a href='/PartnerInformation/ListofPartners/partner/CSA'>Cyber Security Agency of Singapore</a> (CSA) is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities reported to CSA unless covered by the scope of another CNA."
116+
},
117+
{
118+
"contentnewsType": "paragraph",
119+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>414 CNAs</a> (412 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Cyber Security Agency of Singapore is the 3rd CNA from Singapore."
120+
},
121+
{
122+
"contentnewsType": "paragraph",
123+
"content": "Cyber Security Agency of Singapore’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
124+
}
125+
]
126+
},
127+
{
128+
"id": 426,
129+
"newsType": "news",
130+
"title": "OMRON Added as CVE Numbering Authority (CNA)",
131+
"urlKeywords": "OMRON Added as CNA",
132+
"date": "2024-10-22",
133+
"description": [
134+
{
135+
"contentnewsType": "paragraph",
136+
"content": "<a href='/PartnerInformation/ListofPartners/partner/OMRON'>OMRON Corporation</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for Omron Group companies’ Industrial Automation, Healthcare, Social Systems, Device &amp; Module Solutions issues only."
137+
},
138+
{
139+
"contentnewsType": "paragraph",
140+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>413 CNAs</a> (411 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. OMRON is the 13th CNA from Japan."
141+
},
142+
{
143+
"contentnewsType": "paragraph",
144+
"content": "OMRON’s Root is the <a href='/PartnerInformation/ListofPartners/partner/jpcert'>JPCERT/CC Root</a>."
145+
}
146+
]
147+
},
148+
{
149+
"id": 425,
150+
"newsType": "news",
151+
"title": "PingCAP Added as CVE Numbering Authority (CNA)",
152+
"urlKeywords": "PingCAP Added as CNA",
153+
"date": "2024-10-22",
154+
"description": [
155+
{
156+
"contentnewsType": "paragraph",
157+
"content": "<a href='/PartnerInformation/ListofPartners/partner/PingCAP'>PingCAP (US), Inc.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in the following PingCAP maintained products and components: TiDB (code available at <a href='https://github.com/pingcap/tidb' target='_blank'>https://github.com/pingcap/tidb</a>); TiKV (code available at <a href='https://github.com/tikv/tikv' target='_blank'>https://github.com/tikv/tikv</a>); PD (Placement Driver, code available at <a href='https://github.com/tikv/pd' target='_blank'>https://github.com/tikv/pd</a>); TiFlash (code available at <a href='https://github.com/pingcap/tiflash' target='_blank'>https://github.com/pingcap/tiflash</a>); and tidbcloud (PingCAP’s cloud database service). This scope includes vulnerabilities in all supported versions of these products. CVE IDs will not be assigned for vulnerabilities found in unsupported versions or for third-party dependencies not maintained by PingCAP."
158+
},
159+
{
160+
"contentnewsType": "paragraph",
161+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>412 CNAs</a> (410 CNAs and 2 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. PingCAP is the 224th CNA from USA."
162+
},
163+
{
164+
"contentnewsType": "paragraph",
165+
"content": "PingCAP’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE Top-Level Root</a>."
166+
}
167+
]
168+
},
106169
{
107170
"id": 424,
108171
"newsType": "blog",
234 KB
Loading

0 commit comments

Comments
 (0)