Skip to content

Commit c6f9231

Browse files
rrobergerlxdev
andauthored
6/17/25 release branch (#3617)
* #3608 Add 1 blog * #3614 Add 1 new News article @ the 5/28/25 Board meeting minutes * #3612 Add 1 new CNA + Update 1 CNA's info * #3615 Update Resources page * #3608 Update Blog News ID numbers * #3608 * #3614 Update News ID article numbers * #3608 Update blog text * #3616 Update Search banner and tips * faqs: pull out 1 search item as separate question/answer --------- Co-authored-by: Roy Lane <[email protected]>
1 parent 663e874 commit c6f9231

File tree

6 files changed

+145
-10
lines changed

6 files changed

+145
-10
lines changed

src/assets/data/CNAsList.json

Lines changed: 58 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17624,15 +17624,15 @@
1762417624
{
1762517625
"label": "Policy",
1762617626
"language": "",
17627-
"url": "https://www.securin.io/disclosure-policy/"
17627+
"url": "https://www.securin.io/disclosure-policy"
1762817628
}
1762917629
],
1763017630
"securityAdvisories": {
1763117631
"alerts": [],
1763217632
"advisories": [
1763317633
{
1763417634
"label": "Advisories",
17635-
"url": "https://www.securin.io/zero-days-list/"
17635+
"url": "https://www.securin.io/discover-zero-days"
1763617636
}
1763717637
]
1763817638
},
@@ -26140,5 +26140,61 @@
2614026140
]
2614126141
},
2614226142
"country": "USA"
26143+
},
26144+
{
26145+
"shortName": "Toreon",
26146+
"cnaID": "CNA-2025-0031",
26147+
"organizationName": "Toreon",
26148+
"scope": "Vulnerabilities discovered by or reported to Toreon that are not in another CNA’s scope.",
26149+
"contact": [
26150+
{
26151+
"email": [
26152+
{
26153+
"label": "Email",
26154+
"emailAddr": "[email protected]"
26155+
}
26156+
],
26157+
"contact": [],
26158+
"form": []
26159+
}
26160+
],
26161+
"disclosurePolicy": [
26162+
{
26163+
"label": "Policy",
26164+
"language": "",
26165+
"url": "https://www.toreon.com/cna-disclosure-policy/"
26166+
}
26167+
],
26168+
"securityAdvisories": {
26169+
"alerts": [],
26170+
"advisories": [
26171+
{
26172+
"label": "Advisories",
26173+
"url": "https://www.toreon.com/news/"
26174+
}
26175+
]
26176+
},
26177+
"resources": [],
26178+
"CNA": {
26179+
"isRoot": false,
26180+
"root": {
26181+
"shortName": "n/a",
26182+
"organizationName": "n/a"
26183+
},
26184+
"roles": [
26185+
{
26186+
"helpText": "",
26187+
"role": "CNA"
26188+
}
26189+
],
26190+
"TLR": {
26191+
"shortName": "mitre",
26192+
"organizationName": "MITRE Corporation"
26193+
},
26194+
"type": [
26195+
"Researcher"
26196+
]
26197+
},
26198+
"country": "Belgium"
2614326199
}
2614426200
]

src/assets/data/NotificationBanner.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@
1818
},
1919
{
2020
"contentType": "paragraph",
21-
"content": "is now available in the search box above. Text searches may include CVE IDs (e.g., “CVE-2025-1234”), CWE-IDs (e.g., “CWE-123”), exact version strings (e.g., “6.17.4”), exact IPv4 strings, file names, URLs, combinations of search terms (e.g., “apache cwe-502 cve-2025”), and"
21+
"content": "is now available in the search box above. Learn more"
2222
},
2323
{
2424
"contentType": "internalLink",
2525
"link": "/Media/News/item/blog/2025/06/11/CVE-List-Keyword-Search-Updated",
26-
"linkText": "more"
26+
"linkText": "here"
2727
},
2828
{
2929
"contentType": "paragraph",

src/assets/data/faqs.json

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,14 @@
271271
"questionId": "search_cve",
272272
"questionText": "How do I search the CVE List",
273273
"questionResponseParagraphs": [
274-
"You may search using:<br/><ul><li><strong>IDs</strong><ul><li>CVE ID<ul><li>Specific <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE ID</a> (e.g., “CVE-2015-8405”)</li><li>Note that this returns records where there is a match for the CVE ID anywhere in the CVE Record (e.g., “CVE-2015-8405” returns the CVE named, as well as any CVEs that have that CVE ID in other fields, such as in the description)</li><li>The nominal CVE ID Year (e.g., “CVE-2025” returns all CVEs reserved in the CVE-2025 year series)</li><li>The year must be a full year (e.g., “CVE-202” is invalid and will produce no results)</li></ul></li><li>CWE ID<ul><li>Specific <a href='/About/RelatedEfforts#CWE'>Common Weakness Enumeration (CWE&trade;)</a> entries (e.g., “CWE-123”)</li></ul></li><li> CAPEC ID<ul><li>Specific <a href='/About/RelatedEfforts#CAPEC'>Common Attack Pattern Enumerations and Classification (CAPEC&trade;)</a> entries (e.g., “CAPEC-123”)</li></ul></li></ul></li><li><strong>General</strong><ul><li>All CVE Record fields are searched when using the search box on CVE.ORG. However, if the search comprises more than one keyword, all keywords must be present in a given field for the record to be returned</li><li>Note that if you provide multiple CVE IDs, the search will only return results that contain ALL CVE IDs you specify in each record, which may not be what you expect</li><li>Search terms are case-insensitive and may contain words of alphanumeric and Unicode characters</li><li>Supported search scenarios include:<ul><li>Hyphenated words (e.g., “man-in-the-middle”)</li><li>Exact version strings (e.g., “6.17.4”)<li>Exact IPv4 strings (e.g., “127.0.0.1”)</li><li>Exact filenames (e.g., “main.cpp”)</li><li>URLs (e.g., “http://www.ibm.com/support/docview.wss?uid”)</li><li>Combination of any of the above: by separating terms with a space you can search for CVEs that contain ALL of the specified search terms (e.g., “apache cwe-502 cve-2025” will return all CVEs each of which containing all 3 terms)</li></ul></li><li>Symbols currently not supported are:\u00a0\u00a0\u00a0() {} [] \" ' ` &lt;&gt; | ; ! ~ ^ * + %</li></ul></li></ul>"
274+
"You may search using:<br/><ul><li><strong>IDs</strong><ul><li>CVE ID<ul><li>Specific <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE ID</a> (e.g., “CVE-2015-8405”)</li><li>Note that this returns records where there is a match for the CVE ID anywhere in the CVE Record (e.g., “CVE-2015-8405” returns the CVE named, as well as any CVEs that have that CVE ID in other fields, such as in the description)</li><li>The nominal CVE ID Year (e.g., “CVE-2025” returns all CVEs reserved in the CVE-2025 year series)</li><li>The year must be a full year (e.g., “CVE-202” is invalid and will produce no results)</li></ul></li><li>CWE ID<ul><li>Specific <a href='/About/RelatedEfforts#CWE'>Common Weakness Enumeration (CWE&trade;)</a> entries (e.g., “CWE-123”)</li></ul></li><li> CAPEC ID<ul><li>Specific <a href='/About/RelatedEfforts#CAPEC'>Common Attack Pattern Enumerations and Classification (CAPEC&trade;)</a> entries (e.g., “CAPEC-123”)</li></ul></li></ul></li><li><strong>General</strong><ul><li>Note that if you provide multiple CVE IDs, the search will only return results that contain ALL CVE IDs you specify in each record, which may not be what you expect</li><li>Search terms are case-insensitive and may contain words of alphanumeric and Unicode characters</li><li>Supported search scenarios include:<ul><li>Hyphenated words (e.g., “man-in-the-middle”)</li><li>Exact version strings (e.g., “6.17.4”)<li>Exact IPv4 strings (e.g., “127.0.0.1”)</li><li>Exact filenames (e.g., “main.cpp”)</li><li>URLs (e.g., “http://www.ibm.com/support/docview.wss?uid”)</li></ul></li><li>Symbols currently not supported are:\u00a0\u00a0\u00a0() {} [] \" ' ` &lt;&gt; | ; ! ~ ^ * + %</li></ul></li></ul>"
275+
]
276+
},
277+
{
278+
"questionId": "search_cve_and",
279+
"questionText": "In the search box on CVE.ORG, what CVE Record fields are searched",
280+
"questionResponseParagraphs": [
281+
"All CVE Record fields are searched when using the search box on CVE.ORG. However, if the search comprises more than one keyword, all keywords must be present in a given field for the record to be returned."
275282
]
276283
},
277284
{

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1149,7 +1149,7 @@
11491149
},
11501150
{
11511151
"month": "June",
1152-
"value": "3"
1152+
"value": "4"
11531153
},
11541154
{
11551155
"month": "July",

src/assets/data/news.json

Lines changed: 74 additions & 2 deletions
Large diffs are not rendered by default.

src/views/ResourcesSupport/Resources.vue

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
</li>
5757
<li>
5858
<router-link to="/Resources/General/End-of-Life-EOL-Assignment-Process.pdf" target="_blank">
59-
End-of-Life (EOL) Assignment Policy (PDF, 0.3MB)
59+
End-of-Life (EOL) Assignment Process (PDF, 0.3MB)
6060
</router-link>
6161
<br/><span class="cve-help-text">Establishes the policy for the EOL CVE assignment process</span>
6262
</li>
@@ -135,7 +135,7 @@
135135
</li>
136136
<li>
137137
<router-link to="/Resources/General/End-of-Life-EOL-Assignment-Process.pdf" target="_blank">
138-
End-of-Life (EOL) Assignment Policy (PDF, 0.3MB)
138+
End-of-Life (EOL) Assignment Process (PDF, 0.3MB)
139139
</router-link>
140140
</li>
141141
<li>

0 commit comments

Comments
 (0)