diff --git a/index.html b/index.html index 36cf74b8..a81f271a 100644 --- a/index.html +++ b/index.html @@ -5,7 +5,7 @@ - + diff --git a/public/robots.txt b/public/robots.txt index 589f8fd7..eb053628 100644 --- a/public/robots.txt +++ b/public/robots.txt @@ -1,8 +1,2 @@ User-agent: * -Disallow: /*.pdf$ -Disallow: /*.jpg$ -Disallow: /*.png$ -Disallow: /*.svg$ -Disallow: /*.css$ -Disallow: /images/ -Disallow: /Resources/ +Disallow: diff --git a/src/assets/data/CNAsList.json b/src/assets/data/CNAsList.json index f5cf64ec..29932e70 100644 --- a/src/assets/data/CNAsList.json +++ b/src/assets/data/CNAsList.json @@ -1826,7 +1826,7 @@ "advisories": [ { "label": "Advisories", - "url": "https://www.dahuasecurity.com/support/cybersecurity/annoucementNotice" + "url": "https://www.dahuasecurity.com/aboutUs/trustedCenter/trustworthy" } ] }, @@ -3598,7 +3598,7 @@ "email": [ { "label": "Email", - "emailAddr": "psirt@hcl.com" + "emailAddr": "psirt@hcl-software.com" } ], "contact": [], @@ -3609,7 +3609,7 @@ { "label": "Policy", "language": "", - "url": "https://www.hcltech.com/software/psirt/hcl-software-vulnerability-disclosure-policy" + "url": "https://www.hcl-software.com/resources/psirt" } ], "securityAdvisories": { @@ -3617,7 +3617,7 @@ "advisories": [ { "label": "Advisories", - "url": "https://hclpnpsupport.hcltech.com/csm?id=search&spa=1&t=kb&q=Security%20Bulletin" + "url": "https://support.hcl-software.com/community?id=community_forum&sys_id=038a2b921b7bb34c77761fc58d4bcb0d" } ] }, @@ -20348,7 +20348,7 @@ { "label": "Policy", "language": "", - "url": "https://help.sonatype.com/repomanager3/product-information/repository-security-vulnerabilities" + "url": "https://help.sonatype.com/en/responsible-disclosure.html" } ], "securityAdvisories": { @@ -25715,5 +25715,179 @@ ] }, "country": "USA" + }, + { + "shortName": "TQtC", + "cnaID": "CNA-2025-0016", + "organizationName": "The Qt Company", + "scope": "All supported The Qt Company products.", + "contact": [ + { + "email": [ + { + "label": "Email", + "emailAddr": "security@qt.io" + } + ], + "contact": [], + "form": [] + } + ], + "disclosurePolicy": [ + { + "label": "Policy", + "language": "", + "url": "https://www.qt.io/terms-conditions/responsible-vulnerability-disclosure-process" + } + ], + "securityAdvisories": { + "alerts": [], + "advisories": [ + { + "label": "Advisories", + "url": "https://wiki.qt.io/List_of_known_vulnerabilities_in_Qt_products" + } + ] + }, + "resources": [], + "CNA": { + "isRoot": false, + "root": { + "shortName": "n/a", + "organizationName": "n/a" + }, + "roles": [ + { + "helpText": "", + "role": "CNA" + } + ], + "TLR": { + "shortName": "mitre", + "organizationName": "MITRE Corporation" + }, + "type": [ + "Vendor" + ] + }, + "country": "Finland" + }, + { + "shortName": "TPLink", + "cnaID": "CNA-2025-0017", + "organizationName": "TP-Link Systems Inc.", + "scope": "TP-Link issues only.", + "contact": [ + { + "email": [ + { + "label": "Email", + "emailAddr": "security@tp-link.com" + } + ], + "contact": [ + { + "label": "Report a Vulnerability", + "url": "https://www.tp-link.com/us/press/security-advisory/" + } + ], + "form": [] + } + ], + "disclosurePolicy": [ + { + "label": "Policy", + "language": "", + "url": "https://www.tp-link.com/us/press/security-advisory/" + } + ], + "securityAdvisories": { + "alerts": [], + "advisories": [ + { + "label": "Advisories", + "url": "https://www.tp-link.com/us/press/security-advisory/" + } + ] + }, + "resources": [], + "CNA": { + "isRoot": false, + "root": { + "shortName": "n/a", + "organizationName": "n/a" + }, + "roles": [ + { + "helpText": "", + "role": "CNA" + } + ], + "TLR": { + "shortName": "mitre", + "organizationName": "MITRE Corporation" + }, + "type": [ + "Vendor", + "Hosted Service" + ] + }, + "country": "USA" + }, + { + "shortName": "SDC", + "cnaID": "CNA-2025-0018", + "organizationName": "Sandisk", + "scope": "Sandisk products listed at https://shop.sandisk.com/product-portfolio only.", + "contact": [ + { + "email": [ + { + "label": "Email", + "emailAddr": "psirt@sandisk.com" + } + ], + "contact": [], + "form": [] + } + ], + "disclosurePolicy": [ + { + "label": "Policy", + "language": "", + "url": "https://shop.sandisk.com/support/product-security/vulnerability-disclosure-policy" + } + ], + "securityAdvisories": { + "alerts": [], + "advisories": [ + { + "label": "Advisories", + "url": "https://shop.sandisk.com/support/product-security" + } + ] + }, + "resources": [], + "CNA": { + "isRoot": false, + "root": { + "shortName": "n/a", + "organizationName": "n/a" + }, + "roles": [ + { + "helpText": "", + "role": "CNA" + } + ], + "TLR": { + "shortName": "mitre", + "organizationName": "MITRE Corporation" + }, + "type": [ + "Vendor" + ] + }, + "country": "USA" } ] \ No newline at end of file diff --git a/src/assets/data/events.json b/src/assets/data/events.json index fc073e7c..22d39318 100644 --- a/src/assets/data/events.json +++ b/src/assets/data/events.json @@ -34,7 +34,7 @@ "displayOnHomepageOrder": 1, "title": "CVE/FIRST VulnCon 2025", "location": "Raleigh, North Carolina, USA & Virtual", - "description": "VulnCon 2025 is co-sponsored by the CVE Program and FIRST and is open to the public.

SPECIAL MESSAGE FOR CVE NUMBERING AUTHORITIES (CNAs):
VulnCon 2025 takes the place of this year’s Spring CVE Global Summit.

Agenda:
Available here.

Registration:
Virtual registration available until April 4, 2025. Details here.
Registration fees include four days of coffee breaks and buffet lunches, one networking reception hosted at the McKimmon Center, and applicable meeting materials. Note that discounted rates are not being offered for this event regardless of membership or speaking status.

An offsite social event is planned for Tuesday, April 8, from 19:00-21:00 in downtown Raleigh. Location to be announced in January. You may purchase a ticket during your main registration or access a separate purchase form link found in your registration email confirmation. Tickets are US $30.00 per person.

Program Overview:
* Day 1: Monday, April 7 — Plenary, Vendor Tables, Welcome Reception
* Day 2: Tuesday, April 8 — Plenary, Vendor Tables, Off-site Social Event
* Day 3: Wednesday, April 9 — Plenary, Breakouts, Vendor Tables
* Day 4: Thursday, April 10 — Plenary, Breakouts, Vendor Tables

Venue:
McKimmon Center,
North Carolina State University
,
1101 Gorman St.,
Raleigh, North Carolina 27606
USA

Call for Papers:
Closed on January 31, 2025. Details here.

Purpose:
The purpose of VulnCon is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem.

A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly.", + "description": "VulnCon 2025 is co-sponsored by the CVE Program and FIRST and is open to the public.

SPECIAL MESSAGE FOR CVE NUMBERING AUTHORITIES (CNAs):
VulnCon 2025 takes the place of this year’s Spring CVE Global Summit.

Agenda:
Available here.

Program Overview:
* Day 1: Monday, April 7 — Plenary, Vendor Tables, Welcome Reception
* Day 2: Tuesday, April 8 — Plenary, Vendor Tables, Off-site Social Event
* Day 3: Wednesday, April 9 — Plenary, Breakouts, Vendor Tables
* Day 4: Thursday, April 10 — Plenary, Breakouts, Vendor Tables

Venue:
McKimmon Center,
North Carolina State University
,
1101 Gorman St.,
Raleigh, North Carolina 27606
USA

Registration:
Registration is now closed. Details here.
Registration fees include four days of coffee breaks and buffet lunches, one networking reception hosted at the McKimmon Center, and applicable meeting materials. Note that discounted rates are not being offered for this event regardless of membership or speaking status.

An offsite social event is planned for Tuesday, April 8, from 19:00-21:00 in downtown Raleigh. You may purchase a ticket during your main registration or access a separate purchase form link found in your registration email confirmation. Tickets are US $30.00 per person.

Call for Papers:
Closed on January 31, 2025. Details here.

Purpose:
The purpose of VulnCon is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem.

A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly.", "permission": "public", "url": "https://www.first.org/conference/vulncon2025/", "date": { diff --git a/src/assets/data/metrics.json b/src/assets/data/metrics.json index ce346914..44794648 100644 --- a/src/assets/data/metrics.json +++ b/src/assets/data/metrics.json @@ -1141,7 +1141,7 @@ }, { "month": "April", - "value": "TBA" + "value": "3" }, { "month": "May", diff --git a/src/assets/data/news.json b/src/assets/data/news.json index a6e7059c..c78b4fc2 100644 --- a/src/assets/data/news.json +++ b/src/assets/data/news.json @@ -1,8 +1,180 @@ { "currentNews": [ + { + "id": 509, + "newsType": "blog", + "title": "Happening This Week: CVE/FIRST VulnCon 2025, April 7–10, 2025", + "urlKeywords": "Happening This Week VulnCon 2025", + "date": "2025-04-08", + "author": { + "name": "CVE Program", + "organization": { + "name": "CVE Program", + "url": "" + }, + "title": "", + "bio": "" + }, + "description": [ + { + "contentnewsType": "image", + "imageWidth": "", + "href": "/news/VulnCon2025.png", + "altText": "CVE/FIRST VulnCon 2025, April 7-10, 2025", + "captionText": "Click here to see the “VulnCon 2025” program agenda for all four days." + }, + { + "contentnewsType": "paragraph", + "content": "The CVE Program and FIRST are co-hosting VulnCon 2025 this week at the McKimmon Center in Raleigh, North Carolina, USA, April 7–10, 2025." + }, + { + "contentnewsType": "paragraph", + "content": "

Agenda

" + }, + { + "contentnewsType": "paragraph", + "content": "The full agenda is available now on this conference web page or view the schedule by day. Virtual attendees should check your email for session links and other details." + }, + { + "contentnewsType": "paragraph", + "content": "Monday, April 7View day 1 schedule
Tuesday, April 8View day 2 schedule
Wednesday, April 9View day 3 schedule
Thursday, April 10View day 4 schedule" + }, + { + "contentnewsType": "paragraph", + "content": "

Venue

" + }, + { + "contentnewsType": "paragraph", + "content": "McKimmon Center
North Carolina State University
1101 Gorman St.
Raleigh, North Carolina 27606
USA" + }, + { + "contentnewsType": "paragraph", + "content": "

Learn More About VulnCon 2025

" + }, + { + "contentnewsType": "paragraph", + "content": "The purpose of the VulnCon — which is open to the public — is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem. A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly." + }, + { + "contentnewsType": "paragraph", + "content": "For the most up-to-date information, visit the CVE/FIRST VulnCon 2025 conference page hosted on the FIRST website." + } + ] + }, + { + "id": 508, + "newsType": "news", + "title": "Sandisk Added as CVE Numbering Authority (CNA)", + "urlKeywords": "Sandisk Added as CNA", + "date": "2025-04-08", + "description": [ + { + "contentnewsType": "paragraph", + "content": "Sandisk is now a CVE Numbering Authority (CNA) for Sandisk products listed at https://shop.sandisk.com/product-portfolio only." + }, + { + "contentnewsType": "paragraph", + "content": "To date, 450 CNAs (447 CNAs and 3 CNA-LRs) from 40 countries and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign CVE Identifiers (CVE IDs) and publish CVE Records for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Sandisk is the 242nd CNA from USA." + }, + { + "contentnewsType": "paragraph", + "content": "Sandisk’s Root is the MITRE Top-Level Root." + } + ] + }, + { + "id": 507, + "newsType": "news", + "title": "TP-Link Added as CVE Numbering Authority (CNA)", + "urlKeywords": "TP-Link Added as CNA", + "date": "2025-04-08", + "description": [ + { + "contentnewsType": "paragraph", + "content": "TP-Link Systems Inc. is now a CVE Numbering Authority (CNA) for TP-Link issues only." + }, + { + "contentnewsType": "paragraph", + "content": "To date, 449 CNAs (446 CNAs and 3 CNA-LRs) from 40 countries and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign CVE Identifiers (CVE IDs) and publish CVE Records for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. TP-Link is the 241st CNA from USA." + }, + { + "contentnewsType": "paragraph", + "content": "TP-Link’s Root is the MITRE Top-Level Root." + } + ] + }, + { + "id": 506, + "newsType": "news", + "title": "The Qt Company Added as CVE Numbering Authority (CNA)", + "urlKeywords": "The Qt Company Added as CNA", + "date": "2025-04-08", + "description": [ + { + "contentnewsType": "paragraph", + "content": "The Qt Company is now a CVE Numbering Authority (CNA) for all supported The Qt Company products." + }, + { + "contentnewsType": "paragraph", + "content": "To date, 448 CNAs (445 CNAs and 3 CNA-LRs) from 40 countries and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign CVE Identifiers (CVE IDs) and publish CVE Records for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. The Qt Company is the 5th CNA from Finland." + }, + { + "contentnewsType": "paragraph", + "content": "The Qt Company’s Root is the MITRE Top-Level Root." + } + ] + }, + { + "id": 505, + "newsType": "blog", + "title": "Vulnerability Data Enrichment for CVE Records: 249 CNAs on the Enrichment Recognition List for April 7, 2025", + "urlKeywords": "CNA Enrichment Recognition List Update", + "date": "2025-04-08", + "author": { + "name": "CVE Program", + "organization": { + "name": "CVE Program", + "url": "" + }, + "title": "", + "bio": "" + }, + "description": [ + { + "contentnewsType": "image", + "imageWidth": "", + "href": "/news/CnaEnrichmentRecognitionList.png", + "altText": "Increasing the Value of the CVE Record - CNA Enrichment Recognition List" + }, + { + "contentnewsType": "paragraph", + "content": "The “CNA Enrichment Recognition List” for April 7, 2025, is now available with 249 CNAs listed. Published every two weeks on the CVE website, the list recognizes those CVE Numbering Authorities (CNAs) that are actively providing enhanced vulnerability data in their CVE Records. CNAs are added to the list if they provide Common Vulnerability Scoring System (CVSS) and Common Weakness Enumeration (CWE™) information 98% of the time or more within the two-week period of their last published CVE Record." + }, + { + "contentnewsType": "paragraph", + "content": "For more about the recognition list, see “Recognition for CNAs Actively Providing Vulnerability Data Enrichment for CVE Records.” To learn more about vulnerability information types like CVSS and CWE, see the CVE Record User Guide. View the most current CNA Enrichment Recognition List on the CVE website Metrics page here." + }, + { + "contentnewsType": "paragraph", + "content": "CNA Enrichment Recognition List for April 7, 2025, with 249 CNAs listed: " + } + ] + }, + { + "id": 504, + "newsType": "news", + "title": "Thank You for Participating in Our “CVE Data Usage and Satisfaction Survey”", + "urlKeywords": "Data Usage and Satisfaction Survey Thank You", + "date": "2025-04-08", + "description": [ + { + "contentnewsType": "paragraph", + "content": "The CVE Program sincerely thanks everyone who responded to our “CVE Data Usage and Satisfaction Survey” that opened on March 4, 2025, and closed on April 4, 2025. Your feedback will play a crucial role in enhancing the CVE Program and its service offerings." + } + ] + }, { "id": 503, - "displayOnHomepageOrder": 1, "newsType": "blog", "title": "LAST CHANCE — Virtual Registration for CVE/FIRST VulnCon 2025 Closes April 4", "urlKeywords": "VulnCon 2025 Registration Closes April 4", @@ -72,7 +244,6 @@ }, { "id": 502, - "displayOnHomepageOrder": 2, "newsType": "blog", "title": "FINAL REMINDER — Please Complete Our “CVE Data Usage and Satisfaction Survey” by April 4", "urlKeywords": "CVE Data Usage Satisfaction Survey Final Reminder", @@ -120,7 +291,6 @@ }, { "id": 500, - "displayOnHomepageOrder": 4, "newsType": "news", "title": "Digi Added as CVE Numbering Authority (CNA)", "urlKeywords": "Digi Added as CNA", @@ -142,7 +312,6 @@ }, { "id": 499, - "displayOnHomepageOrder": 3, "newsType": "blog", "title": "Vulnerability Data Enrichment for CVE Records: 250 CNAs on the Enrichment Recognition List for March 25, 2025", "urlKeywords": "CNA Enrichment Recognition List Update", diff --git a/src/views/About/Metrics.vue b/src/views/About/Metrics.vue index e3750fe5..43867491 100644 --- a/src/views/About/Metrics.vue +++ b/src/views/About/Metrics.vue @@ -295,8 +295,8 @@

CNA Enrichment Recognition List

-

Last Updated:
- Total CNAs: 250

+

Last Updated:
+ Total CNAs: 249