diff --git a/package.json b/package.json index 4a5485f0e..27618920e 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,8 @@ { "name": "cve-website", - "version": "0.0.0", + "description": "Common Vulnerabilities and Exposures (CVE) Website", + "version": "0.1.0", + "author": "Automation Working Group", "private": true, "type": "module", "scripts": { diff --git a/src/assets/data/CNAsList.json b/src/assets/data/CNAsList.json index 925a9aa98..fa90759dc 100644 --- a/src/assets/data/CNAsList.json +++ b/src/assets/data/CNAsList.json @@ -5145,7 +5145,7 @@ "shortName": "microsoft", "cnaID": "CNA-2005-0005", "organizationName": "Microsoft Corporation", - "scope": "Microsoft issues only", + "scope": "Microsoft issues only, excluding end-of-life (EOL) as listed in the Microsoft Lifecycle Policy", "contact": [ { "email": [ @@ -6660,7 +6660,7 @@ "shortName": "Patchstack", "cnaID": "CNA-2021-0025", "organizationName": "Patchstack", - "scope": "Vulnerabilities in third-party PHP products discovered by Patchstack and Patchstack Red Team", + "scope": "Vulnerabilities in third-party products discovered by Patchstack and Patchstack Bug Bounty program unless covered by the scope of another CNA", "contact": [ { "email": [ @@ -17537,7 +17537,7 @@ "email": [ { "label": "Email", - "emailAddr": "PSIRT@crowdstrike.com" + "emailAddr": "bugs@crowdstrike.com" } ], "contact": [], @@ -20916,5 +20916,118 @@ ] }, "country": "Canada" + }, + { + "shortName": "directcyber", + "cnaID": "CNA-2024-0018", + "organizationName": "DirectCyber", + "scope": "Products in Australia (either the reporter or the target vendor must operate in AU), which are not covered by another CNA", + "contact": [ + { + "email": [ + { + "label": "Email", + "emailAddr": "report@directcyber.com.au" + } + ], + "contact": [], + "form": [] + } + ], + "disclosurePolicy": [ + { + "label": "Policy", + "language": "", + "url": "https://directcyber.com.au/report.html" + } + ], + "securityAdvisories": { + "alerts": [], + "advisories": [ + { + "label": "Advisories", + "url": "https://directcyber.com.au/advisory.html" + } + ] + }, + "resources": [], + "CNA": { + "isRoot": false, + "root": { + "shortName": "n/a", + "organizationName": "n/a" + }, + "roles": [ + { + "helpText": "", + "role": "CNA" + } + ], + "TLR": { + "shortName": "mitre", + "organizationName": "MITRE Corporation" + }, + "type": [ + "Researcher", + "Open Source" + ] + }, + "country": "Australia" + }, + { + "shortName": "sec1", + "cnaID": "CNA-2024-0019", + "organizationName": "Sec1", + "scope": "Vulnerabilities found in cybersecurity software solutions developed and maintained by Sec1 as listed on https://sec1.io/, and vulnerabilities identified in software projects or products where Sec1 has a direct and substantial contribution or partnership, unless covered by the scope of another CNA", + "contact": [ + { + "email": [ + { + "label": "Email", + "emailAddr": "security@sec1.io" + } + ], + "contact": [], + "form": [] + } + ], + "disclosurePolicy": [ + { + "label": "Policy", + "language": "", + "url": "https://sec1.io/sec1-public-disclosure-policy-for-cve-reporting/" + } + ], + "securityAdvisories": { + "alerts": [], + "advisories": [ + { + "label": "Advisories", + "url": "https://sec1.io/sec1-security-advisories/" + } + ] + }, + "resources": [], + "CNA": { + "isRoot": false, + "root": { + "shortName": "n/a", + "organizationName": "n/a" + }, + "roles": [ + { + "helpText": "", + "role": "CNA" + } + ], + "TLR": { + "shortName": "mitre", + "organizationName": "MITRE Corporation" + }, + "type": [ + "Vendor" + ] + }, + "country": "India" } ] \ No newline at end of file diff --git a/src/assets/data/NotificationBanner.json b/src/assets/data/NotificationBanner.json index c35536057..0ab9cc0b8 100644 --- a/src/assets/data/NotificationBanner.json +++ b/src/assets/data/NotificationBanner.json @@ -1,8 +1,36 @@ { "shouldDisplay":true, - "publishCount": 5, + "publishCount": 6, "collapsed": false, "notificationContents": [ + + + { + "contentType": "paragraph", + "content": "NOTICE —" + }, + + { + "contentType": "paragraph", + "content": "The CVE Request Web Forms service at " + }, + + { + "contentType": "externalLink", + "link": "https://cveform.mitre.org/", + "linkText": "https://cveform.mitre.org/" + }, + + { + "contentType": "paragraph", + "content": " is partially degraded. Responses to requests submitted via the forms may experience delays. We apologize for any inconvenience and will update this message once service is restored." + }, + + { + "contentType": "paragraph", + "content": "

" + }, + { "contentType": "paragraph", "content": "Welcome to the new CVE Beta website! " diff --git a/src/assets/data/metrics.json b/src/assets/data/metrics.json index 99d6ad1a8..0376d4443 100644 --- a/src/assets/data/metrics.json +++ b/src/assets/data/metrics.json @@ -1094,7 +1094,7 @@ }, { "month": "March", - "value": "TBA" + "value": "2" }, { "month": "April", diff --git a/src/assets/data/news.json b/src/assets/data/news.json index d39b7ce3e..79697ba8e 100644 --- a/src/assets/data/news.json +++ b/src/assets/data/news.json @@ -1,5 +1,141 @@ { "currentNews": [ + { + "id": 325, + "newsType": "news", + "title": "Sec1 Added as CVE Numbering Authority (CNA)", + "urlKeywords": "Sec1 Added as CNA", + "date": "2024-03-05", + "description": [ + { + "contentnewsType": "paragraph", + "content": "Sec1 is now a CVE Numbering Authority (CNA) for vulnerabilities found in cybersecurity software solutions developed and maintained by Sec1 as listed on https://sec1.io/, and vulnerabilities identified in software projects or products where Sec1 has a direct and substantial contribution or partnership, unless covered by the scope of another CNA." + }, + { + "contentnewsType": "paragraph", + "content": "To date, 364 CNAs (362 CNAs and 2 CNA-LRs) from 40 countries and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign CVE Identifiers (CVE IDs) and publish CVE Records for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Sec1 is the 8th CNA from India." + }, + { + "contentnewsType": "paragraph", + "content": "Sec1’s Root is the MITRE Top-Level Root." + } + ] + }, + { + "id": 324, + "newsType": "news", + "title": "DirectCyber Added as CVE Numbering Authority (CNA)", + "urlKeywords": "DirectCyber Added as CNA", + "date": "2024-03-05", + "description": [ + { + "contentnewsType": "paragraph", + "content": "DirectCyber is now a CVE Numbering Authority (CNA) for products in Australia (either the reporter or the target vendor must operate in AU), which are not covered by another CNA." + }, + { + "contentnewsType": "paragraph", + "content": "To date, 363 CNAs (361 CNAs and 2 CNA-LRs) from 40 countries and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign CVE Identifiers (CVE IDs) and publish CVE Records for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. DirectCyber is the 5th CNA from Australia." + }, + { + "contentnewsType": "paragraph", + "content": "DirectCyber’s Root is the MITRE Top-Level Root." + } + ] + }, + { + "id": 322, + "newsType": "blog", + "title": "CVE/FIRST VulnCon 2024 Registration Closing on March 11, 2024", + "urlKeywords": "VulnCon 2024 Registration Closes March 11 2024", + "date": "2024-03-05", + "author": { + "name": "CVE Program", + "organization": { + "name": "CVE Program", + "url": "" + }, + "title": "", + "bio": "" + }, + "description": [ + { + "contentnewsType": "paragraph", + "content": "Registration will close on March 11, 2024, at 11:59 UTC, for “CVE Program/FIRST VulnCon 2024,” being held at the McKimmon Center in Raleigh, North Carolina, USA, on March 25-27, 2024. View the full agenda now or register today on the conference website.

CVE Numbering Authorities (CNAs) — VulnCon 2024 takes the place of this year’s Spring CVE Global Summit." + }, + { + "contentnewsType": "image", + "imageWidth": "", + "href": "/news/VulnCon2024.png", + "altText": "CVE/FIRST VulnCon 2024", + "captionText": "CVE/FIRST VulnCon 2024" + }, + { + "contentnewsType": "paragraph", + "content": "

Registration

" + }, + { + "contentnewsType": "paragraph", + "content": "In-person and virtual registration are open until March 11, 2024, at 11:59 UTC, on this FIRST web page. Please note that discounted rates are not being offered for this event regardless of membership or speaking status. Register now using FIRST’s Event Registration Form." + }, + { + "contentnewsType": "paragraph", + "content": "" + }, + { + "contentnewsType": "paragraph", + "content": "Registration fees for standard admission include three days of coffee breaks and buffet lunches, one networking reception, and applicable meeting materials." + }, + { + "contentnewsType": "paragraph", + "content": "Additional Details: " + }, + { + "contentnewsType": "paragraph", + "content": "Venue:" + }, + { + "contentnewsType": "paragraph", + "content": "McKimmon Center
North Carolina State University
1101 Gorman St.
Raleigh, North Carolina 27606
USA" + }, + { + "contentnewsType": "paragraph", + "content": "

About VulnCon 2024

" + }, + { + "contentnewsType": "paragraph", + "content": "The purpose of VulnCon — which is open to the public — is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem. A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly." + }, + { + "contentnewsType": "paragraph", + "content": "

Learn MoreCVE/FIRST VulnCon 2024 conference page hosted on the FIRST website." + }, + { + "contentnewsType": "paragraph", + "content": "We look forward to seeing you at this first-ever community event!" + } + ] + }, + { + "id": 321, + "newsType": "news", + "title": "Minutes from CVE Board Teleconference Meeting on February 7 Now Available", + "urlKeywords": "CVE Board Minutes from February 7", + "date": "2024-03-05", + "description": [ + { + "contentnewsType": "paragraph", + "content": "The CVE Board held a teleconference meeting on February 7, 2024. Read the meeting minutes summary." + }, + { + "contentnewsType": "paragraph", + "content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information." + } + ] + }, { "id": 320, "newsType": "blog", diff --git a/src/assets/images/cvePartnersMap.png b/src/assets/images/cvePartnersMap.png index 628e7f271..16f697415 100644 Binary files a/src/assets/images/cvePartnersMap.png and b/src/assets/images/cvePartnersMap.png differ diff --git a/src/assets/style/globals.scss b/src/assets/style/globals.scss index d42f8d624..8b78254db 100644 --- a/src/assets/style/globals.scss +++ b/src/assets/style/globals.scss @@ -87,7 +87,7 @@ section.hero:first-of-type{ } .cve-button-outline { - background-color: white; + background-color: white !important; } .cve-button-accent-warm { diff --git a/src/views/About/Metrics.vue b/src/views/About/Metrics.vue index 7f000b691..cb1e27c51 100644 --- a/src/views/About/Metrics.vue +++ b/src/views/About/Metrics.vue @@ -33,8 +33,10 @@
- - + + + + @@ -75,8 +77,10 @@
Year{{year}}
Year{{year}}
- - + + + + diff --git a/src/views/CVERecord/PublishedRecord.vue b/src/views/CVERecord/PublishedRecord.vue index 68e282411..964683d08 100644 --- a/src/views/CVERecord/PublishedRecord.vue +++ b/src/views/CVERecord/PublishedRecord.vue @@ -252,17 +252,17 @@

{{row.parentVersionStatus}} - {{word}} + {{word}} 

  • - {{word}} + {{word}} 
{{row.parentVersionStatus}} - {{word}} + {{word}} {{row.parentVersionStatus}} {{row.parentVersionRange}} diff --git a/src/views/PartnerInformation/ListofPartners.vue b/src/views/PartnerInformation/ListofPartners.vue index 9119e8757..45fde8a37 100644 --- a/src/views/PartnerInformation/ListofPartners.vue +++ b/src/views/PartnerInformation/ListofPartners.vue @@ -470,4 +470,9 @@ export default { display: inline; margin-left: 5px; } + +.cve-button { + color: $theme-color-primary-darker !important; + border-color: $theme-color-primary-darker !important; +} diff --git a/src/views/ResourcesSupport/AllResources/CveServices.vue b/src/views/ResourcesSupport/AllResources/CveServices.vue index ebe42429c..32485fb7d 100644 --- a/src/views/ResourcesSupport/AllResources/CveServices.vue +++ b/src/views/ResourcesSupport/AllResources/CveServices.vue @@ -146,6 +146,17 @@ allowfullscreen>dcEJ2t2jwhE +

Current Version of CVE JSON Schema

+

+ The current official version of the CVE JSON Schema is + Version 5.0. +

+

+ A single schema file with bundled dependencies is available + here + in the + CVE JSON Schema repository on GitHub. +

Year{{year}}
Year{{year}}