Skip to content

Commit ba4444a

Browse files
committed
Merge branch 'int-main' of https://github.com/CVEProject/cve-website into content-rjr-3182
2 parents bc7989f + f20aa29 commit ba4444a

File tree

4 files changed

+87
-14
lines changed

4 files changed

+87
-14
lines changed

src/assets/data/currentBoardMembersList.json

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,6 @@
3131
"organizationURL": "https://www.mitre.org/",
3232
"role": "MITRE At-Large"
3333
},
34-
{
35-
"familyName": "Cox",
36-
"firstName": "Mark",
37-
"imageURL": "",
38-
"organization": "",
39-
"organizationURL": "",
40-
"role": "Board"
41-
},
4234
{
4335
"familyName": "Cox",
4436
"firstName": "William",

src/assets/data/news.json

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,82 @@
6363
}
6464
]
6565
},
66+
{
67+
"id": 424,
68+
"newsType": "blog",
69+
"title": "Vulnerability Data Enrichment for CVE Records: 221 CNAs on the Enrichment Recognition List for October 21, 2024",
70+
"urlKeywords": "CNA Enrichment Recognition List Update",
71+
"date": "2024-10-22",
72+
"author": {
73+
"name": "CVE Program",
74+
"organization": {
75+
"name": "CVE Program",
76+
"url": ""
77+
},
78+
"title": "",
79+
"bio": ""
80+
},
81+
"description": [
82+
{
83+
"contentnewsType": "paragraph",
84+
"content": "The “<a href='/About/Metrics#CNAEnrichmentRecognition'>CNA Enrichment Recognition List</a>” for October 21, 2024, is now available with 221 CNAs listed. Published every two weeks on the CVE website, the list recognizes those <a href='/ProgramOrganization/CNAs'>CVE Numbering Authorities (CNAs)</a> that are actively providing enhanced vulnerability data in their <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a>. CNAs are added to the list if they provide <a href='https://www.first.org/cvss/' target='_blank'>Common Vulnerability Scoring System (CVSS)</a> and <a href='https://cwe.mitre.org/' target='_blank'>Common Weakness Enumeration (CWE&trade;)</a> information 98% of the time or more within the two-week period of their last published CVE Record."
85+
},
86+
{
87+
"contentnewsType": "paragraph",
88+
"content": "For more about the recognition list, see “<a href='/Media/News/item/blog/2024/09/10/CNA-Enrichment-Recognition-List'>Recognition for CNAs Actively Providing Vulnerability Data Enrichment for CVE Records</a>.” To learn more about vulnerability information types like CVSS and CWE, see the <a href='/CVERecord/UserGuide'>CVE Record User Guide</a>. View the CNA Enrichment Recognition List on the CVE website Metrics page <a href='/About/Metrics#CNAEnrichmentRecognition'>here</a>."
89+
},
90+
{
91+
"contentnewsType": "paragraph",
92+
"content": "CNA Enrichment Recognition List for October 21, 2024, with 221 CNAs listed: <ul><li>9front Systems</li><li>Absolute Software</li><li>Acronis International GmbH</li><li>Adobe Systems Incorporated</li><li>AlgoSec</li><li>AMI</li><li>AppCheck Ltd.</li><li>Arista Networks, Inc.</li><li>Asea Brown Boveri Ltd.</li><li>ASR Microelectronics Co., Ltd.</li><li>Autodesk</li><li>Automotive Security Research Group (ASRG)</li><li>Avaya Inc.</li><li>Baicells Technologies Co., Ltd.</li><li>Baidu, Inc.</li><li>Baxter Healthcare</li><li>Becton, Dickinson and Company (BD)</li><li>BeyondTrust Inc.</li><li>Bitdefender</li><li>BlackBerry</li><li>Brocade Communications Systems, Inc.</li><li>Canon EMEA</li><li>Canon Inc.</li><li>Carrier Global Corporation</li><li>Cato Networks</li><li>CERT.PL</li><li>CERT@VDE</li><li>Check Point Software Technologies Ltd.</li><li>Checkmarx</li><li>Checkmk GmbH</li><li>Ciena Corporation</li><li>cirosec GmbH</li><li>Cisco Systems, Inc.</li><li>ClickHouse, Inc.</li><li>Cloudflare, Inc.</li><li>Concrete CMS</li><li>CyberDanube</li><li>Dassault Systèmes</li><li>Dell EMC</li><li>Dfinity Foundation</li><li>DirectCyber</li><li>Docker Inc.</li><li>dotCMS LLC</li><li>Dragos, Inc.</li><li>Dutch Institute for Vulnerability Disclosure (DIVD)</li><li>Eaton</li><li>Eclipse Foundation</li><li>ELAN Microelectronics Corp.</li><li>Elastic</li><li>EnterpriseDB Corporation</li><li>Environmental Systems Research Institute, Inc. (Esri)</li><li>Ericsson</li><li>ESET, spol. s r.o.</li><li>EU Agency for Cybersecurity (ENISA)</li><li>Exodus Intelligence</li><li>F5 Networks</li><li>Fedora Project (Infrastructure Software)</li><li>Flexera Software LLC</li><li>Fluid Attacks</li><li>Forcepoint</li><li>ForgeRock, Inc.</li><li>Fortinet, Inc.</li><li>Fortra, LLC</li><li>Gallagher Group Ltd</li><li>GE Healthcare</li><li>Gitea Limited</li><li>GitHub (maintainer security advisories)</li><li>GitHub Inc, (Products Only)</li><li>GitLab Inc.</li><li>Glyph & Cog, LLC</li><li>Google LLC</li><li>Grafana Labs</li><li>Hallo Welt! GmbH</li><li>Hanwha Vision Co., Ltd.</li><li>HashiCorp Inc.</li><li>HeroDevs</li><li>HiddenLayer, Inc.</li><li>Hillstone Networks Inc.</li><li>Hitachi Energy</li><li>Hitachi Vantara</li><li>Hitachi, Ltd.</li><li>Honeywell International Inc.</li><li>HP Inc.</li><li>Huawei Technologies</li><li>HYPR Corp</li><li>IBM Corporation</li><li>ICS-CERT</li><li>IDEMIA</li><li>Indian Computer Emergency Response Team (CERT-In)</li><li>Intel Corporation</li><li>Israel National Cyber Directorate</li><li>Ivanti</li><li>JetBrains s.r.o.</li><li>Johnson Controls</li><li>JPCERT/CC</li><li>Kaspersky</li><li>KNIME AG</li><li>KrCERT/CC</li><li>Kubernetes</li><li>Lenovo Group Ltd.</li><li>Lexmark International Inc.</li><li>LG Electronics</li><li>Liferay, Inc.</li><li>Logitech</li><li>M-Files Corporation</li><li>ManageEngine</li><li>Mattermost, Inc</li><li>Mautic</li><li>Microchip Technology</li><li>Microsoft Corporation</li><li>Milestone Systems A/S</li><li>Mitsubishi Electric Corporation</li><li>MongoDB</li><li>Moxa Inc.</li><li>N-able</li><li>National Cyber Security Centre - Netherlands (NCSC-NL)</li><li>National Cyber Security Centre SK-CERT</li><li>National Instruments</li><li>Netflix, Inc.</li><li>Netskope</li><li>Network Optix</li><li>NLnet Labs</li><li>NortonLifeLock Inc</li><li>Nozomi Networks Inc.</li><li>Nvidia Corporation</li><li>Octopus Deploy</li><li>Okta</li><li>ONEKEY GmbH</li><li>Open Design Alliance</li><li>Open-Xchange</li><li>OpenAnolis</li><li>openEuler</li><li>OpenHarmony</li><li>OpenText (formerly Micro Focus)</li><li>OTRS AG</li><li>Palantir Technologies</li><li>Palo Alto Networks</li><li>Panasonic Holdings Corporation</li><li>Pandora FMS</li><li>PaperCut Software Pty Ltd</li><li>Patchstack OÜ</li><li>Payara</li><li>Pegasystems</li><li>Pentraze Cybersecurity</li><li>Perforce</li><li>Ping Identity Corporation</li><li>Progress Software Corporation</li><li>Proofpoint Inc.</li><li>Protect AI</li><li>Pure Storage, Inc.</li><li>QNAP Systems, Inc.</li><li>Qualcomm, Inc.</li><li>Qualys, Inc.</li><li>rami.io GmbH</li><li>Rapid7, Inc.</li><li>Red Hat, Inc.</li><li>Robert Bosch GmbH</li><li>Rockwell Automation</li><li>SailPoint Technologies</li><li>Samsung TV & Appliance</li><li>SAP SE</li><li>SBA Research gGmbH</li><li>Schneider Electric SE</li><li>Schweitzer Engineering Laboratories, Inc.</li><li>Secomea</li><li>Securin</li><li>Security Risk Advisors</li><li>ServiceNow</li><li>SHENZHEN CoolKit Technology CO., LTD.</li><li>SICK AG</li><li>Siemens</li><li>Sierra Wireless Inc.</li><li>Silicon Labs</li><li>Snow Software</li><li>Snyk</li><li>SoftIron</li><li>SolarWinds</li><li>Sonatype Inc.</li><li>Sophos</li><li>Spanish National Cybersecurity Institute, S.A.</li><li>Splunk</li><li>STAR Labs SG Pte. Ltd.</li><li>Switzerland National Cyber Security Centre (NCSC)</li><li>Synaptics</li><li>Synology Inc.</li><li>Talos</li><li>TeamViewer Germany GmbH</li><li>Temporal Technologies Inc.</li><li>Tenable Network Security, Inc.</li><li>Thales Group</li><li>The Document Foundation</li><li>The Missing Link Australia (TML)</li><li>The OpenNMS Group</li><li>The Tcpdump Group</li><li>The Wikimedia Foundation</li><li>TianoCore.org</li><li>Tigera</li><li>Toshiba Corporation</li><li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li><li>Trellix</li><li>TWCERT/CC</li><li>upKeeper Solutions</li><li>VulDB</li><li>VulnCheck</li><li>WatchGuard Technologies, Inc.</li><li>Western Digital</li><li>Wiz, Inc.</li><li>Wordfence</li><li>Xerox Corporation</li><li>Xiaomi Technology Co Ltd</li><li>Yandex N.V.</li><li>Yokogawa Group</li><li>Yugabyte, Inc.</li><li>Zabbix</li><li>Zephyr Project</li><li>Zero Day Initiative</li><li>Zoom Video Communications, Inc.</li><li>Zscaler, Inc.</li><li>ZTE Corporation</li><li>ZUSO Advanced Research Team (ZUSO ART)</li><li>Zyxel Corporation</li></ul>"
93+
}
94+
]
95+
},
96+
{
97+
"id": 423,
98+
"newsType": "blog",
99+
"title": "Our CVE Story: Biohacking Village",
100+
"urlKeywords": "Our CVE Story: Biohacking Village",
101+
"date": "2024-10-22",
102+
"author": {
103+
"name": "Janine (Nina Alli) Medina and Jennifer Agüero",
104+
"organization": {
105+
"name": " Biohacking Village",
106+
"url": "https://www.villageb.io/"
107+
},
108+
"title": "CNA",
109+
"bio": "Guest authors Janine (Nina Alli) and Jennifer Agüero are both from Biohacking Village. Janine is CEO/Executive Director and Jennifer is a Marketing Communications Specialist. Biohacking Village is a CVE Numbering Authority (CNA) partner under the CISA ICS Root."
110+
},
111+
"description": [
112+
{
113+
"contentnewsType": "paragraph",
114+
"content": "<i>Guest authors Janine (Nina Alli) and Jennifer Agüero are both from Biohacking Village. Janine is CEO/Executive Director and Jennifer is a Marketing Communications Specialist. Biohacking Village is a CVE Numbering Authority (CNA) partner under the CISA ICS Root.</i>"
115+
},
116+
{
117+
"contentnewsType": "paragraph",
118+
"content": "Since our founding in 2014, <a href='/PartnerInformation/ListofPartners/partner/BHV'>Biohacking Village</a> has recognized the critical need to raise awareness about cybersecurity in patient care &mdash; long before cybersecurity in healthcare became the priority it is today. Our mission, “Healthier Tech for Healthier People” places cybersecurity at the heart of fostering innovation and ensuring patient safety in healthcare technology. We are driven by two core goals: addressing public interest in healthcare security and ensuring patient safety through proactive action."
119+
},
120+
{
121+
"contentnewsType": "paragraph",
122+
"content": "Each year, we organize Biohacking Village events for both domestic and international conferences, and we participate in one of the world’s largest hacker events, <a href='https://www.villageb.io/def-con' target='_blank'>DEF CON</a>. Over time, we’ve built strong relationships with leading medical device manufacturers, inviting them to our <a href='https://www.villageb.io/device-lab' target='_blank'>Device Lab</a>, where they bring products for testing on one of the most perilous networks, by some of the most skilled hackers in the world. We maintain an ethical approach to vulnerability testing and are a trusted partner, focusing on improving security while prioritizing patient protection."
123+
},
124+
{
125+
"contentnewsType": "paragraph",
126+
"content": "Before partnering with the <a href='/'>CVE® Program</a> as a <a href='/ProgramOrganization/CNAs'>CVE Numbering Authority (CNA)</a>, responsibility for managing vulnerabilities lay solely with the device manufacturers participating in our Device Lab. While many manufacturers have their own Coordinated Vulnerability Disclosure (CVD) policies, not all do. Additionally, vulnerabilities are sometimes discovered by researchers or security professionals in our <a href='https://www.villageb.io/speaker-lab' target='_blank'>Speaker Lab</a> or <a href='https://www.villageb.io/catalyst-lab' target='_blank'>Catalyst Workshops</a>. In these situations, it’s crucial to have the capability to disclose these findings responsibly. Our ability to assist in responsible disclosure is central to our commitment to public interest and patient safety, ensuring vulnerabilities are addressed efficiently."
127+
},
128+
{
129+
"contentnewsType": "paragraph",
130+
"content": "In June 2023, we reached a major milestone by becoming a <a href='/ProgramOrganization/CNAs'>CNA</a>. This designation enables us to proactively identify, assign, and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities found in medical devices that are not in another CNA’s scope . By adopting the CVE Program’s processes, we enhanced our ability to manage vulnerabilities swiftly and accurately. Becoming a CNA was a strategic decision that empowers us to contribute more effectively to the global healthcare security landscape."
131+
},
132+
{
133+
"contentnewsType": "paragraph",
134+
"content": "The benefits of participating in the CVE Program go beyond our organization. As a CNA, we are better positioned to coordinate vulnerability management efforts with manufacturers, security researchers, and the broader healthcare community. For any organization involved in technology, especially in critical sectors like healthcare, becoming a CNA demonstrates a commitment to cybersecurity and patient safety. It enables companies to take ownership of vulnerabilities, coordinate responses effectively, and ensure risks are mitigated before they escalate into threats."
135+
},
136+
{
137+
"contentnewsType": "paragraph",
138+
"content": "At Biohacking Village, our goal is not only to protect patients but also to support medical device manufacturers in continuously improving product security. We believe that collaboration between the public and private sectors, along with clear communication and transparency, is essential for reducing risks and building safer medical technologies. <a href='/PartnerInformation/Partner#HowToBecomeAPartner'>Becoming a CNA</a> reinforces our dedication to fostering a secure, innovative healthcare environment. Our journey with the CVE Program is just the beginning, and we’re excited to be part of this initiative to enhance safety for all."
139+
}
140+
]
141+
},
66142
{
67143
"id": 422,
68144
"newsType": "blog",

src/views/About/Metrics.vue

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -295,8 +295,8 @@
295295
</p>
296296
</div>
297297
<h3 class="title">CNA Enrichment Recognition List</h3>
298-
<p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>October 7, 2024</time><br/>
299-
<span class="has-text-weight-bold">Total CNAs: </span>217</p>
298+
<p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>October 21, 2024</time><br/>
299+
<span class="has-text-weight-bold">Total CNAs: </span>221</p>
300300
<div>
301301
<ul>
302302
<li>9front Systems</li>
@@ -336,7 +336,6 @@
336336
<li>Cloudflare, Inc.</li>
337337
<li>Concrete CMS</li>
338338
<li>CyberDanube</li>
339-
<li>Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government</li>
340339
<li>Dassault Systèmes</li>
341340
<li>Dell EMC</li>
342341
<li>Dfinity Foundation</li>
@@ -394,7 +393,7 @@
394393
<li>Ivanti</li>
395394
<li>JetBrains s.r.o.</li>
396395
<li>Johnson Controls</li>
397-
<li>Juniper Networks, Inc.</li>
396+
<li>JPCERT/CC</li>
398397
<li>Kaspersky</li>
399398
<li>KNIME AG</li>
400399
<li>KrCERT/CC</li>
@@ -410,6 +409,7 @@
410409
<li>Mautic</li>
411410
<li>Microchip Technology</li>
412411
<li>Microsoft Corporation</li>
412+
<li>Milestone Systems A/S</li>
413413
<li>Mitsubishi Electric Corporation</li>
414414
<li>MongoDB</li>
415415
<li>Moxa Inc.</li>
@@ -443,7 +443,7 @@
443443
<li>Payara</li>
444444
<li>Pegasystems</li>
445445
<li>Pentraze Cybersecurity</li>
446-
<li>Perforce (formerly Puppet)</li>
446+
<li>Perforce</li>
447447
<li>Ping Identity Corporation</li>
448448
<li>Progress Software Corporation</li>
449449
<li>Proofpoint Inc.</li>
@@ -454,6 +454,7 @@
454454
<li>Qualys, Inc.</li>
455455
<li>rami.io GmbH</li>
456456
<li>Rapid7, Inc.</li>
457+
<li>Red Hat, Inc.</li>
457458
<li>Robert Bosch GmbH</li>
458459
<li>Rockwell Automation</li>
459460
<li>SailPoint Technologies</li>
@@ -463,6 +464,7 @@
463464
<li>Schneider Electric SE</li>
464465
<li>Schweitzer Engineering Laboratories, Inc.</li>
465466
<li>Secomea</li>
467+
<li>Securin</li>
466468
<li>Security Risk Advisors</li>
467469
<li>ServiceNow</li>
468470
<li>SHENZHEN CoolKit Technology CO., LTD.</li>
@@ -479,6 +481,7 @@
479481
<li>Spanish National Cybersecurity Institute, S.A.</li>
480482
<li>Splunk</li>
481483
<li>STAR Labs SG Pte. Ltd.</li>
484+
<li>Switzerland National Cyber Security Centre (NCSC)</li>
482485
<li>Synaptics</li>
483486
<li>Synology Inc.</li>
484487
<li>Talos</li>
@@ -504,6 +507,7 @@
504507
<li>Western Digital</li>
505508
<li>Wiz, Inc.</li>
506509
<li>Wordfence</li>
510+
<li>Xerox Corporation</li>
507511
<li>Xiaomi Technology Co Ltd</li>
508512
<li>Yandex N.V.</li>
509513
<li>Yokogawa Group</li>

src/views/ProgramOrganization/Board.vue

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,12 @@
122122
<li>Scott Blake</li>
123123
<li>Harold Booth</li>
124124
<li>Steve Christey Coley</li>
125-
<li>Andre Frech</li>
125+
<li>Mark Cox</li>
126126
</ul>
127127
</div>
128128
<div class="column">
129129
<ul>
130+
<li>Andre Frech</li>
130131
<li>Chris Levendis</li>
131132
<li>Elias Levy</li>
132133
<li>Peter Mell</li>

0 commit comments

Comments
 (0)