Skip to content

Commit 661ce63

Browse files
rrobergerlxdev
andauthored
9/30/25 release branch (#3709)
* #3705 Add News article for the 8/20/5 Board minutes summary * #3706 Add 1 new News article about joining AWG * #3705 Add News article for the 9/3/25 Board Minutes summary * #3707 Add 1 new CNA + Update 1 CNA's info * #3708 Update CWG meeting times * #3705 Update 1 link * npm update on 8/28/2025; modifications needed for successful build * HTML: fix warnings about lists in paragraphs * AdpVulnerabilityEnrichment: fix embedded button issue * npm update on 9/30/2025 * Events: add anchor for "Recurring" events section --------- Co-authored-by: Roy Lane <[email protected]>
1 parent c4afb78 commit 661ce63

File tree

21 files changed

+5986
-9429
lines changed

21 files changed

+5986
-9429
lines changed

package-lock.json

Lines changed: 5535 additions & 9141 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 26 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -16,40 +16,41 @@
1616
},
1717
"dependencies": {
1818
"@cityssm/bulma-sticky-table": "^2.1.0",
19-
"@fortawesome/fontawesome-svg-core": "^6.5.2",
20-
"@fortawesome/free-brands-svg-icons": "^6.5.2",
21-
"@fortawesome/free-regular-svg-icons": "^6.5.1",
22-
"@fortawesome/free-solid-svg-icons": "^6.5.1",
23-
"@fortawesome/vue-fontawesome": "^3.0.5",
24-
"@unhead/vue": "^1.11.18",
25-
"axios": "^1.6.5",
19+
"@fortawesome/fontawesome-svg-core": "^6.7.2",
20+
"@fortawesome/free-brands-svg-icons": "^6.7.2",
21+
"@fortawesome/free-regular-svg-icons": "^6.7.2",
22+
"@fortawesome/free-solid-svg-icons": "^6.7.2",
23+
"@fortawesome/vue-fontawesome": "^3.1.2",
24+
"@unhead/vue": "^1.11.20",
25+
"axios": "^1.12.2",
2626
"bulma": "^0.9.4",
2727
"bulma-timeline": "^3.0.5",
2828
"leaflet": "^1.9.4",
2929
"lodash": "^4.17.21",
3030
"node-sass": "^9.0.0",
31-
"pinia": "^2.1.7",
31+
"pinia": "^2.3.1",
3232
"vue": "^3.3.11",
33-
"vue-gtag": "^2.0.1",
33+
"vue-gtag": "^2.1.2",
3434
"vue-plugin-load-script": "^2.1.1",
35-
"vue-router": "^4.2.5"
35+
"vue-router": "^4.5.1"
3636
},
3737
"devDependencies": {
38-
"@rushstack/eslint-patch": "^1.3.3",
39-
"@tsconfig/node18": "^18.2.2",
40-
"@types/lodash": "^4.17.7",
41-
"@types/node": "^18.19.3",
42-
"@vitejs/plugin-vue": "^4.5.2",
38+
"@rushstack/eslint-patch": "^1.12.0",
39+
"@tsconfig/node18": "^18.2.4",
40+
"@types/lodash": "^4.17.20",
41+
"@types/node": "^18.19.127",
42+
"@vitejs/plugin-vue": "^4.6.2",
4343
"@vitejs/plugin-vue-jsx": "^3.1.0",
44-
"@vue/eslint-config-prettier": "^8.0.0",
45-
"@vue/eslint-config-typescript": "^12.0.0",
46-
"@vue/tsconfig": "^0.5.0",
47-
"eslint": "^8.49.0",
48-
"eslint-plugin-vue": "^9.17.0",
49-
"npm-run-all2": "^6.1.1",
50-
"prettier": "^3.0.3",
44+
"@vue/eslint-config-prettier": "^10.2.0",
45+
"@vue/eslint-config-typescript": "^14.6.0",
46+
"@vue/tsconfig": "^0.5.1",
47+
"eslint": "^9.36.0",
48+
"eslint-plugin-vue": "^10.5.0",
49+
"npm-run-all2": "^6.2.6",
50+
"prettier": "^3.6.2",
51+
"sass-embedded": "^1.93.2",
5152
"typescript": "~5.3.0",
52-
"vite": "^5.0.10",
53-
"vue-tsc": "^1.8.25"
53+
"vite": "^5.4.20",
54+
"vue-tsc": "^1.8.27"
5455
}
55-
}
56+
}
68.1 KB
Loading

src/assets/data/CNAsList.json

Lines changed: 58 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26942,7 +26942,7 @@
2694226942
"shortName": "AxxonSoft",
2694326943
"cnaID": "CNA-2025-0045",
2694426944
"organizationName": "AxxonSoft Limited",
26945-
"scope": "AxxonSoft products and solutions only.",
26945+
"scope": "AxxonSoft products and solutions, GRUNDIG security products, and C-WERK software solutions.",
2694626946
"contact": [
2694726947
{
2694826948
"email": [
@@ -27333,5 +27333,62 @@
2733327333
]
2733427334
},
2733527335
"country": "USA"
27336+
},
27337+
{
27338+
"shortName": "Almaviva",
27339+
"cnaID": "CNA-2025-0052",
27340+
"organizationName": "Almaviva S.p.A.",
27341+
"scope": "Vulnerabilities in Almaviva proprietary software solutions such as Joshua CybeRisk Vision, Jiano, Sofia, and Giotto, as well as Almaviva-developed IT solutions.",
27342+
"contact": [
27343+
{
27344+
"email": [
27345+
{
27346+
"label": "Email",
27347+
"emailAddr": "[email protected]"
27348+
}
27349+
],
27350+
"contact": [],
27351+
"form": []
27352+
}
27353+
],
27354+
"disclosurePolicy": [
27355+
{
27356+
"label": "Policy",
27357+
"language": "",
27358+
"url": "https://www.almaviva.it/it_IT/CNA_vulnerability_disclosure_policy"
27359+
}
27360+
],
27361+
"securityAdvisories": {
27362+
"alerts": [],
27363+
"advisories": [
27364+
{
27365+
"label": "Advisories",
27366+
"url": "https://www.cyberiskvision.com/zero-day/"
27367+
}
27368+
]
27369+
},
27370+
"resources": [],
27371+
"CNA": {
27372+
"isRoot": false,
27373+
"root": {
27374+
"shortName": "n/a",
27375+
"organizationName": "n/a"
27376+
},
27377+
"roles": [
27378+
{
27379+
"helpText": "",
27380+
"role": "CNA"
27381+
}
27382+
],
27383+
"TLR": {
27384+
"shortName": "mitre",
27385+
"organizationName": "MITRE Corporation"
27386+
},
27387+
"type": [
27388+
"Vendor",
27389+
"Hosted Service"
27390+
]
27391+
},
27392+
"country": "Italy"
2733627393
}
2733727394
]

src/assets/data/events.json

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"currentEvents": [
33
{
4-
"id": 39,
4+
"id": 40,
55
"displayOnHomepageOrder": 1,
66
"title": "CVE Program Technical Workshop – Autumn 2025",
77
"location": "Virtual",
@@ -14,6 +14,22 @@
1414
"repeat": false
1515
}
1616
},
17+
{
18+
"id": 39,
19+
"title": "Consumer Working Group (CWG) Meeting",
20+
"location": "Virtual",
21+
"description": "CWG identifies consumer needs, evaluates the usability of CVE data, and recommends improvements to ensure that the CVE Program remains aligned with real-world use cases.<br/><br/>Meetings are held on select Thursdays, with alternating meeting times to enable worldwide participation:<br/><br/><strong>APAC/US Consumer WG at 7:00pm ET</strong><ul><li>October 2, 2025</li><li>October 23, 2025</li><li>November 13, 2025</li><li>December 4, 2025</li><li>December 25, 2025</li></ul><strong>EU/US Consumer WG at 11:00am ET</strong><ul><li>October 9, 2025</li><li>October 30, 2025</li><li>November 20, 2025</li><li>December 11, 2025</li></ul></li></ul>",
22+
"permission": "private",
23+
"url": "/ProgramOrganization/WorkingGroups#CVEConsumerWorkingGroupCWG",
24+
"date": {
25+
"start": "2025-09-01",
26+
"end": "2025-12-31",
27+
"repeat": {
28+
"day": "Thursday",
29+
"recurrence": "weekly"
30+
}
31+
}
32+
},
1733
{
1834
"id": 38,
1935
"title": "Researcher Working Group (RWG) Meeting",

src/assets/data/metrics.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1204,7 +1204,7 @@
12041204
},
12051205
{
12061206
"month": "September",
1207-
"value": "6"
1207+
"value": "7"
12081208
},
12091209
{
12101210
"month": "October",

src/assets/data/news.json

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,95 @@
11
{
22
"currentNews": [
3+
{
4+
"id": 578,
5+
"newsType": "news",
6+
"title": "Almaviva Added as CVE Numbering Authority (CNA)",
7+
"urlKeywords": "Almaviva Added as CNA",
8+
"date": "2025-09-30",
9+
"description": [
10+
{
11+
"contentnewsType": "paragraph",
12+
"content": "<a href='/PartnerInformation/ListofPartners/partner/Almaviva'>Almaviva S.p.A.</a> is now a <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authority (CNA)</a> for vulnerabilities in Almaviva proprietary software solutions such as Joshua CybeRisk Vision, Jiano, Sofia, and Giotto, as well as Almaviva-developed IT solutions."
13+
},
14+
{
15+
"contentnewsType": "paragraph",
16+
"content": "To date, <a href='/PartnerInformation/ListofPartners'>476 CNAs</a> (473 CNAs and 3 CNA-LRs) from <a href='/ProgramOrganization/CNAs'>40 countries</a> and 1 no country affiliation have partnered with the CVE Program. CNAs are organizations from around the world that are authorized to assign <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE Identifiers (CVE IDs)</a> and publish <a href='/ResourcesSupport/Glossary?activeTerm=glossaryRecord'>CVE Records</a> for vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. Almaviva is the 2nd CNA from Italy."
17+
},
18+
{
19+
"contentnewsType": "paragraph",
20+
"content": "Almaviva’s Root is the <a href='/PartnerInformation/ListofPartners/partner/mitre'>MITRE TL-Root</a>."
21+
}
22+
]
23+
},
24+
{
25+
"id": 577,
26+
"newsType": "news",
27+
"title": "Join the CVE Program’s Automation Working Group (AWG)!",
28+
"urlKeywords": "Join the Automation Working Group AWG",
29+
"date": "2025-09-30",
30+
"description": [
31+
{
32+
"contentnewsType": "paragraph",
33+
"content": "The <a href='/ProgramOrganization/WorkingGroups#AutomationWorkingGroupAWG'>CVE Automation Working Group (AWG)</a> plays a key role in shaping how the <a href='/'>CVE Program</a> uses technology to improve automation, streamline data exchange, and modernize services for the global vulnerability management community."
34+
},
35+
{
36+
"contentnewsType": "paragraph",
37+
"content": "In the past, the AWG has driven impactful initiatives such as developing the <a href='/AllResources/CveServices'>CVE Services</a> API for <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCNA'>CVE Numbering Authorities (CNAs)</a>, advancing the <a href='/AllResources/CveServices#CveRecordFormat'>CVE Record Data Format</a>, and supporting automation standards that strengthen interoperability across the ecosystem. Looking ahead, the group is focused on further modernizing CVE Program services, improving efficiency for CNAs, and expanding capabilities for data consumers worldwide."
38+
},
39+
{
40+
"contentnewsType": "paragraph",
41+
"content": "To support broader participation across the international CVE community, the AWG is now testing two alternate meeting times on Tuesdays: <ul><li>9:00 AM ET (one week)</li><li>4:00 PM ET (the next week)</li></ul>"
42+
},
43+
{
44+
"contentnewsType": "paragraph",
45+
"content": "If one of these sessions works better for your schedule, we’d love for you to join us! To start the process, simply sign up for the AWG groups.io email list by clicking here: <a href='mailto:[email protected]?subject=Request to Join CVE AWG'>[email protected]</a>. You will need a groups.io account to sign up."
46+
},
47+
{
48+
"contentnewsType": "paragraph",
49+
"content": "The AWG is open to the public&mdash;your voice and expertise can help shape the future of CVE automation and we look forward to your participation!"
50+
},
51+
{
52+
"contentnewsType": "image",
53+
"imageWidth": "",
54+
"href": "/news/CveAutomation.jpg",
55+
"altText": "CVE Program Automation"
56+
}
57+
]
58+
},
59+
{
60+
"id": 576,
61+
"newsType": "news",
62+
"title": "Minutes from CVE Board Teleconference Meeting on September 3 Now Available",
63+
"urlKeywords": "CVE Board Minutes from September 3",
64+
"date": "2025-09-30",
65+
"description": [
66+
{
67+
"contentnewsType": "paragraph",
68+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on September 3, 2025. Read the <a href='https://marc.info/?l=cve-editorial-board&m=175890383805223&w=2' target='_blank'>meeting minutes summary</a>."
69+
},
70+
{
71+
"contentnewsType": "paragraph",
72+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
73+
}
74+
]
75+
},
76+
{
77+
"id": 575,
78+
"newsType": "news",
79+
"title": "Minutes from CVE Board Teleconference Meeting on August 20 Now Available",
80+
"urlKeywords": "CVE Board Minutes from August 20",
81+
"date": "2025-09-30",
82+
"description": [
83+
{
84+
"contentnewsType": "paragraph",
85+
"content": "The <a href='/ProgramOrganization/Board'>CVE Board</a> held a teleconference meeting on August 20, 2025. Read the <a href='https://marc.info/?l=cve-editorial-board&m=175866087004529&w=2' target='_blank'>meeting minutes summary</a>."
86+
},
87+
{
88+
"contentnewsType": "paragraph",
89+
"content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
90+
}
91+
]
92+
},
393
{
494
"id": 574,
595
"newsType": "news",

src/assets/style/bulmaCveCustomizations.scss

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
@use 'variables' as *;
2+
13
/** Override Bulma's generic variables **/
24
$body-family: "Source Sans Pro", "Public Sans Web", sans-serif;
35

src/components/AdpVulnerabilityEnrichment.vue

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
<template>
22
<div :id="`${sectionAnchorId}`">
33
<div class="mb-2">
4-
<button @click="togglePanel" class="message-header cve-accordion-header">
5-
<slot></slot>
6-
<button class="button message-header-button"
7-
:style="{'background-color': '#162e51 !important', 'color': 'white !important'}"
4+
<div style="display: flex; flex: 1; flex-direction: row; background-color: #162e51 !important;">
5+
<button @click="togglePanel" class="message-header cve-accordion-header" style="flex: 1 1 auto">
6+
<slot></slot>
7+
</button>
8+
<button @click="togglePanel" class="button message-header-button"
9+
style="background-color: #162e51 !important; color: white !important; flex: 0 0 auto; align-self: center;"
810
:aria-expanded="usecveRecordStore.accordionState[organizationId] ? 'true' : 'false'"
9-
:aria-controls="`${organizationId}-panel`"
10-
>
11+
:aria-controls="`${organizationId}-panel`">
1112
<span class="icon is-small">
1213
<p :id="`expandCollapseAltText-${organizationId}`" class="is-hidden">
1314
{{usecveRecordStore.accordionState[organizationId] ? 'expand' : 'collapse'}}
1415
</p>
1516
<font-awesome-icon :icon="usecveRecordStore.accordionState[organizationId] ? 'minus' : 'plus'"
16-
aria-hidden="false" focusable="true" :aria-labelledby="`expandCollapseAltText-${organizationId}`"
17-
/>
17+
aria-hidden="false" focusable="true" :aria-labelledby="`expandCollapseAltText-${organizationId}`"/>
1818
</span>
1919
</button>
20-
</button>
20+
</div>
2121
<!-- Panel content is conditionally determined by role -->
2222
<div :id="`${organizationId}-panel`" v-if="usecveRecordStore.accordionState[organizationId]"
2323
class="pl-3 pr-3 pt-2 pb-5 cve-container-accordion-panel"

src/views/About/Overview.vue

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -63,16 +63,14 @@
6363
<iframe class="has-ratio" width="560" height="315" src="https://www.youtube.com/embed/OQB2w71JmLE" frameborder="0" allowfullscreen>
6464
</iframe>
6565
</figure>
66-
<p>
67-
<a href='/ProgramOrganization/Board'>CVE Board</a> members Tod Beardsley, Shannon Sabens, and Kent Landfield provide
68-
the truth and facts about the following myths about the CVE Program:
69-
<ul>
70-
<li class="cve-list-no-bullet">Myth #1: The CVE Program is run entirely by the MITRE Corporation.</li>
71-
<li class="cve-list-no-bullet"> Myth #2: The CVE Program is controlled by software vendors.</li>
72-
<li class="cve-list-no-bullet">Myth #3: The CVE Program doesn’t cover enough types of vulnerabilities.</li>
73-
<li class="cve-list-no-bullet">Myth #4: The CVE Program is responsible for assigning vulnerability severity scores.</li>
74-
</ul>
75-
</p>
66+
<a href='/ProgramOrganization/Board'>CVE Board</a> members Tod Beardsley, Shannon Sabens, and Kent Landfield provide
67+
the truth and facts about the following myths about the CVE Program:
68+
<ul>
69+
<li class="cve-list-no-bullet">Myth #1: The CVE Program is run entirely by the MITRE Corporation.</li>
70+
<li class="cve-list-no-bullet"> Myth #2: The CVE Program is controlled by software vendors.</li>
71+
<li class="cve-list-no-bullet">Myth #3: The CVE Program doesn’t cover enough types of vulnerabilities.</li>
72+
<li class="cve-list-no-bullet">Myth #4: The CVE Program is responsible for assigning vulnerability severity scores.</li>
73+
</ul>
7674
</div>
7775
<div class="cve-white-bg-gray-border-container">
7876
<h3 class="title mt-4">Podcast - Becoming A CNA Myths versus Facts</h3>
@@ -88,17 +86,17 @@
8886
U.S. Cybersecurity and Infrastructure Security Agency (CISA)</a>
8987
about the myths and facts of partnering with the CVE Program as a
9088
<router-link to="/ProgramOrganization/CNAs">CVE Numbering Authority</router-link> (CNA):
91-
<ul>
92-
<li class="cve-list-no-bullet">Myth #1: Only a specific category of software vendors can become CNAs.</li>
93-
<li class="cve-list-no-bullet">
94-
Myth #2: Organizations cannot leverage their existing vulnerability management and disclosure processes when they become a CNA.
95-
</li>
96-
<li class="cve-list-no-bullet">Myth #3: The requirements for becoming a CNA are overwhelming and extensive.</li>
97-
<li class="cve-list-no-bullet">Myth #4: A fee is required to become a CNA.</li>
98-
<li class="cve-list-no-bullet">Myth #5: The CNA onboarding process is too complicated and time-consuming.</li>
99-
<li class="cve-list-no-bullet">Myth #6: Organizations cannot choose the Top-Level Root or Root they want to work with.</li>
100-
</ul>
10189
</p>
90+
<ul>
91+
<li class="cve-list-no-bullet">Myth #1: Only a specific category of software vendors can become CNAs.</li>
92+
<li class="cve-list-no-bullet">
93+
Myth #2: Organizations cannot leverage their existing vulnerability management and disclosure processes when they become a CNA.
94+
</li>
95+
<li class="cve-list-no-bullet">Myth #3: The requirements for becoming a CNA are overwhelming and extensive.</li>
96+
<li class="cve-list-no-bullet">Myth #4: A fee is required to become a CNA.</li>
97+
<li class="cve-list-no-bullet">Myth #5: The CNA onboarding process is too complicated and time-consuming.</li>
98+
<li class="cve-list-no-bullet">Myth #6: Organizations cannot choose the Top-Level Root or Root they want to work with.</li>
99+
</ul>
102100
</div>
103101
<div class="cve-white-bg-gray-border-container">
104102
<h3 class="title mt-4">Podcast - CNA Onboarding Process Myths Versus Facts</h3>

0 commit comments

Comments
 (0)