Skip to content

Commit c94557e

Browse files
authored
Merge pull request #3640 from CVEProject/int
7/15/25 Release: INT to MAIN
2 parents d745519 + faa234a commit c94557e

File tree

7 files changed

+291
-8
lines changed

7 files changed

+291
-8
lines changed

src/assets/data/CNAsList.json

Lines changed: 61 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1278,7 +1278,7 @@
12781278
"shortName": "CERTVDE",
12791279
"cnaID": "CNA-2020-0010",
12801280
"organizationName": "CERT@VDE",
1281-
"scope": "Products of CERT@VDE cooperative partners and brands listed at <a href='https://cert.vde.com/en/cna/' target='_blank'>https://cert.vde.com/en/cna/</a>. Also, industrial and infrastructure control systems (and its components) of European Union (EU) based vendors unless covered by the scope of another CNA. Partners and brands include but are not limited to: ADS-TEC Industrial IT, Auma, sipos, Beckhoff, Bender, Bucher Automation, CLAAS, 365FarmNet, Satinfo, Carlo Gavazzi Controls, Codesys, DURAG GROUP, Draeger, Endress+Hauser, Euchner, Festo Didactic, Festo, Frauscher, GEA, HIMA, Harman, Helmholz, Hilscher, K4 DIGITAL, KEB, Krohne, Kuka, Lenze, BHN Services, MB connect line, Miele, Murrelektronik, PHOENIX CONTACT, Etherwan Systems, Innominate, Pepperl+Fuchs, Pilz, SMA, SWARCO, Trumpf, TRUMPF Laser, TRUMPF Werkzeugmaschinen, VARTA Storage, VEGA, WAGO, M&amp;M Software, Weidmueller, Welotec, Wiesemann &amp; Theis, ifm.",
1281+
"scope": "<strong>Root Scope:</strong> Organizations that are cooperative partners of CERT@VDE.<br/><strong>CNA Scope:</strong> Products of CERT@VDE cooperative partners and brands listed at <a href='https://cert.vde.com/en/cna/' target='_blank'>https://cert.vde.com/en/cna/</a>. Also, industrial and infrastructure control systems (and its components) of European Union (EU) based vendors unless covered by the scope of another CNA. Partners and brands include but are not limited to: ADS-TEC Industrial IT, Auma, sipos, Beckhoff, Bender, Bucher Automation, CLAAS, 365FarmNet, Satinfo, Carlo Gavazzi Controls, Codesys, DURAG GROUP, Draeger, Endress+Hauser, Euchner, Festo Didactic, Festo, Frauscher, GEA, HIMA, Harman, Helmholz, Hilscher, K4 DIGITAL, KEB, Krohne, Kuka, Lenze, BHN Services, MB connect line, Miele, Murrelektronik, PHOENIX CONTACT, Etherwan Systems, Innominate, Pepperl+Fuchs, Pilz, SMA, SWARCO, Trumpf, TRUMPF Laser, TRUMPF Werkzeugmaschinen, VARTA Storage, VEGA, WAGO, M&amp;M Software, Weidmueller, Welotec, Wiesemann &amp; Theis, ifm.",
12821282
"contact": [
12831283
{
12841284
"email": [
@@ -1322,6 +1322,10 @@
13221322
"organizationName": "Cybersecurity and Infrastructure Security Agency (CISA)"
13231323
},
13241324
"roles": [
1325+
{
1326+
"helpText": "",
1327+
"role": "Root"
1328+
},
13251329
{
13261330
"helpText": "",
13271331
"role": "CNA"
@@ -26309,5 +26313,61 @@
2630926313
]
2631026314
},
2631126315
"country": "USA"
26316+
},
26317+
{
26318+
"shortName": "TYPO3",
26319+
"cnaID": "CNA-2025-0034",
26320+
"organizationName": "TYPO3 Association",
26321+
"scope": "Vulnerabilities in TYPO3 open-source products only, including TYPO3 CMS core and 3rd party extensions for TYPO3, unless covered by the scope of another CNA.",
26322+
"contact": [
26323+
{
26324+
"email": [
26325+
{
26326+
"label": "Email",
26327+
"emailAddr": "security@typo3.org"
26328+
}
26329+
],
26330+
"contact": [],
26331+
"form": []
26332+
}
26333+
],
26334+
"disclosurePolicy": [
26335+
{
26336+
"label": "Policy",
26337+
"language": "",
26338+
"url": "https://typo3.org/community/teams/security/security-in-typo3"
26339+
}
26340+
],
26341+
"securityAdvisories": {
26342+
"alerts": [],
26343+
"advisories": [
26344+
{
26345+
"label": "Advisories",
26346+
"url": "https://advisories.typo3.org/"
26347+
}
26348+
]
26349+
},
26350+
"resources": [],
26351+
"CNA": {
26352+
"isRoot": false,
26353+
"root": {
26354+
"shortName": "n/a",
26355+
"organizationName": "n/a"
26356+
},
26357+
"roles": [
26358+
{
26359+
"helpText": "",
26360+
"role": "CNA"
26361+
}
26362+
],
26363+
"TLR": {
26364+
"shortName": "mitre",
26365+
"organizationName": "MITRE Corporation"
26366+
},
26367+
"type": [
26368+
"Open Source"
26369+
]
26370+
},
26371+
"country": "Switzerland"
2631226372
}
2631326373
]

src/assets/data/glossaryEntries.json

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@
6363
"id": "glossaryEOL",
6464
"term": "End of Life (EOL)",
6565
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossaryEOL",
66-
"definition": "The CVE Program treats End of Life (EOL) and End of Support (EOS) as the same, even though various Suppliers may not. EOL essentially means the Supplier has decided the product in question has reached the end of its “useful lifespan.” After this date, the manufacturer no longer markets, sells, provides security fixes, technical support, sustains, enhances, or fixes bugs in the product."
66+
"definition": "A Product that no longer receives security Fixes. EOL typically indicates that a Product no longer receives any support, maintenance, or new features."
6767
},
6868
{
6969
"id": "glossaryFix",
@@ -117,7 +117,7 @@
117117
"id": "glossarySupplier",
118118
"term": "Supplier",
119119
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossarySupplier",
120-
"definition": "The entity that develops, maintains, or provides a product regardless of whether the product is an open source project or a proprietary product. A supplier is typically responsible for and capable of investigating vulnerability reports and developing fixes or mitigations for vulnerabilities. “Supplier” is used broadly and includes common terms such as vendor, producer, developer, maintainer, author, owner, manufacturer, and provider."
120+
"definition": "The entity that develops, maintains, or provides a Product. A supplier is typically responsible for and capable of investigating vulnerability reports and developing fixes or mitigations for vulnerabilities. “Supplier” is used broadly and includes common terms such as vendor, producer, developer, maintainer, author, owner, manufacturer, and provider."
121121
},
122122
{
123123
"id": "glossaryTags",
@@ -154,5 +154,23 @@
154154
"term": "Authorized Data Publisher (ADP)",
155155
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossaryADP",
156156
"definition": "An authorized entity with specific scope and responsibility to enrich the content of CVE Records published by CVE Numbering Authorities (CNAs) with additional, pertinent information (e.g., risk scores, references, vulnerability characteristics, translations)."
157+
},
158+
{
159+
"id": "glossaryAdjudicator",
160+
"term": "Adjudicator",
161+
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossaryAdjudicator",
162+
"definition": "Organization with the role of CVE Numbering Authority (CNA), Root, or Top-Level Root (TL-Root) executing the defined Dispute Process. In cases of Dispute escalations there would be multiple Adjudicators."
163+
},
164+
{
165+
"id": "glossaryDispute",
166+
"term": "CVE Record Dispute",
167+
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossaryDispute",
168+
"definition": "Disagreements with the accuracy or completeness of a CVE Record in accordance with the CVE Program Rules, or the validity of a vulnerability upon which a CVE Record is, or could be, based."
169+
},
170+
{
171+
"id": "glossaryEscalation",
172+
"term": "Escalation",
173+
"termLink": "/ResourcesSupport/Glossary?activeTerm=glossaryEscalation",
174+
"definition": "The process by which disputes are evaluated and resolved."
157175
}
158176
]

src/assets/data/metrics.json

Lines changed: 44 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,26 @@
11
{
22
"publishedCveRecords": [
3+
{
4+
"year": "2025",
5+
"data": [
6+
{
7+
"quarter": "1",
8+
"value": "12,009"
9+
},
10+
{
11+
"quarter": "2",
12+
"value": "TBA"
13+
},
14+
{
15+
"quarter": "3",
16+
"value": "TBA"
17+
},
18+
{
19+
"quarter": "4",
20+
"value": "TBA"
21+
}
22+
]
23+
},
324
{
425
"year": "2024",
526
"data": [
@@ -548,6 +569,15 @@
548569
}
549570
],
550571
"reservedCveIds": [
572+
{
573+
"year": "2025",
574+
"data": [
575+
{
576+
"quarter": "all",
577+
"value": "15,445"
578+
}
579+
]
580+
},
551581
{
552582
"year": "2024",
553583
"data": [
@@ -784,6 +814,19 @@
784814
}
785815
],
786816
"cveRecordPublications": [
817+
{
818+
"year": "2025",
819+
"data": [
820+
{
821+
"heading": "All CNAs",
822+
"percentage": "86"
823+
},
824+
{
825+
"heading": "CNA-LRs",
826+
"percentage": "14"
827+
}
828+
]
829+
},
787830
{
788831
"year": "2024",
789832
"data": [
@@ -1153,7 +1196,7 @@
11531196
},
11541197
{
11551198
"month": "July",
1156-
"value": "3"
1199+
"value": "4"
11571200
},
11581201
{
11591202
"month": "August",

0 commit comments

Comments
 (0)