diff --git a/src/assets/data/CNAsList.json b/src/assets/data/CNAsList.json
index f4484fd2..16689145 100644
--- a/src/assets/data/CNAsList.json
+++ b/src/assets/data/CNAsList.json
@@ -7477,7 +7477,7 @@
"email": [
{
"label": "Email",
- "emailAddr": "cybersecurity@se.com"
+ "emailAddr": "cpcert@se.com"
}
],
"contact": [
@@ -9231,14 +9231,14 @@
{
"shortName": "vmware",
"cnaID": "CNA-2016-0025",
- "organizationName": "VMware",
+ "organizationName": "VMware by Broadcom",
"scope": "VMware, Spring, and Cloud Foundry issues only",
"contact": [
{
"email": [
{
"label": "Email",
- "emailAddr": "security@vmware.com"
+ "emailAddr": "vmware.psirt@broadcom.com"
}
],
"contact": [],
@@ -9249,7 +9249,7 @@
{
"label": "Policy",
"language": "",
- "url": "https://www.vmware.com/support/policies/security_response.html"
+ "url": "https://www.broadcom.com/support/vmware-services/security-response"
}
],
"securityAdvisories": {
@@ -9257,7 +9257,7 @@
"advisories": [
{
"label": "Advisories",
- "url": "https://www.vmware.com/security/advisories.html"
+ "url": "https://www.broadcom.com/support/vmware-security-advisories"
}
]
},
diff --git a/src/assets/data/events.json b/src/assets/data/events.json
index 7c60f029..4059fc2e 100644
--- a/src/assets/data/events.json
+++ b/src/assets/data/events.json
@@ -1,11 +1,27 @@
{
"currentEvents": [
+ {
+ "id": 35,
+ "title": "CVE Artificial Intelligence Working Group (CVEAI WG) Meeting",
+ "location": "Virtual",
+ "description": "Focused on defining swim lanes for AI vulnerability disclosure within the CVE Program.",
+ "permission": "private",
+ "url": "/ProgramOrganization/WorkingGroups#CVEArtificialIntelligenceWorkingGroupCVEAIWG",
+ "date": {
+ "start": "2024-10-15",
+ "end": "2024-12-31",
+ "repeat": {
+ "day": "Monday",
+ "recurrence": "biweekly"
+ }
+ }
+ },
{
"id": 34,
"displayOnHomepageOrder": 1,
"title": "CVE Program Workshop – Autumn 2024",
"location": "Virtual",
- "description": "A collaborative virtual community event of CVE Partners focused on improving CVE.
Event Time: 10:00 AM to 2:00 PM EDT both days.
Workshop “save the date” announcement, with expected topics and other details, sent to partners on September 19, 2024.",
+ "description": "A collaborative virtual community event of CVE Partners focused on improving CVE.
Event Time: 10:00 AM to 2:00 PM EDT both days.
Please refer to the CNA partners email announcements for agenda topics, deadlines, and other workshop details.",
"permission": "private",
"url": "",
"date": {
@@ -430,15 +446,15 @@
"id": 3,
"title": "CVE Outreach and Communications Working Group (OCWG) Meeting",
"location": "Virtual",
- "description": "Promote the CVE Program to achieve program adoption and coverage goals through increased community awareness. Each calendar year there are six meetings held on a Monday (UTC-08:00) and six meetings held on a Wednesday (UTC-12:00).",
+ "description": "Promote the CVE Program to achieve program adoption and coverage goals through increased community awareness.",
"permission": "private",
"url": "/ProgramOrganization/WorkingGroups#OutreachandCommunicationsWorkingGroupOCWG",
"date": {
"start": "2024-01-01",
"end": "2024-12-31",
"repeat": {
- "day": "Monday or Wednesday alternating every other month",
- "recurrence": "monthly"
+ "day": "Friday",
+ "recurrence": "weekly"
}
}
},
diff --git a/src/assets/data/faqs.json b/src/assets/data/faqs.json
index 2e2e5286..b090f4c1 100644
--- a/src/assets/data/faqs.json
+++ b/src/assets/data/faqs.json
@@ -256,7 +256,7 @@
"questionText": "Are there CVE List data feeds",
"questionResponseParagraphs": [
"Yes, both internal and external feeds of CVE List content are available.",
- "CVE Program:
",
+ "CVE Program:",
"External:- CVE Change Logs free tool from CERIAS/Purdue University that provides daily and monthly changes to CVE Records.
"
]
},
@@ -272,9 +272,7 @@
"questionText": "How do I search the CVE List",
"questionResponseParagraphs": [
"Search Tips",
- "- By CVE ID
- Must include only one CVE ID per search.
- CVE ID must include all letters, numbers, and hyphens associated with the CVE ID, e.g., CVE-2024-12345678.
- “CVE” may be entered as “cve”, “CVE”, or as a combination of uppercase and lowercase, as casing is ignored during search.
- By other keyword(s)
- Must contain only alphanumeric characters.
- May contain one or more keywords, separated by a space.
- Keywords may be entered in lowercase, uppercase, or a combination of both. Casing is ignored during search, e.g., Vulnerabilities, vulnerabilities, VULNERABILITIES.
",
- "2. Other CVE List search options",
- ""
+ "- By CVE ID
- Must include only one CVE ID per search.
- CVE ID must include all letters, numbers, and hyphens associated with the CVE ID, e.g., CVE-2024-12345678.
- “CVE” may be entered as “cve”, “CVE”, or as a combination of uppercase and lowercase, as casing is ignored during search.
- By other keyword(s)
- Must contain only alphanumeric characters, e.g., letters or numbers.
- May contain one or more keywords, separated by a space.
- Keywords may be entered in lowercase, uppercase, or a combination of both. Casing is ignored during search, e.g., Vulnerabilities, vulnerabilities, VULNERABILITIES.
"
]
},
{
diff --git a/src/assets/data/navigation.json b/src/assets/data/navigation.json
index a9ac6295..b1d94fac 100644
--- a/src/assets/data/navigation.json
+++ b/src/assets/data/navigation.json
@@ -201,6 +201,10 @@
"anchorId": "CNAOrganizationOfPeersCOOP",
"label": "CNA Organization of Peers (COOP)"
},
+ "CVE Artificial Intelligence Working Group (CVEAI WG)": {
+ "anchorId": "CVEArtificialIntelligenceWorkingGroupCVEAIWG",
+ "label": "CVE Artificial Intelligence Working Group (CVEAI WG)"
+ },
"Outreach and Communications Working Group (OCWG)": {
"anchorId": "OutreachandCommunicationsWorkingGroupOCWG",
"label": "Outreach and Communications Working Group (OCWG)"
diff --git a/src/assets/data/news.json b/src/assets/data/news.json
index f3c61604..d6962a51 100644
--- a/src/assets/data/news.json
+++ b/src/assets/data/news.json
@@ -1,5 +1,43 @@
{
"currentNews": [
+ {
+ "id": 421,
+ "newsType": "news",
+ "title": "CVE Program Adds New “CVE Artificial Intelligence Working Group (CVEAI WG)”",
+ "urlKeywords": "New CVE Artificial Intelligence Working Group",
+ "date": "2024-10-15",
+ "description": [
+ {
+ "contentnewsType": "paragraph",
+ "content": "The CVE Program’s newest working group (WG), CVE Artificial Intelligence (CVEAI WG), is open to CVE community members such as CVE Numbering Authorities (CNAs), the CVE Board, Authorized Data Publishers (ADPs), and participants from the CVE Program Secretariat; members of corporate vulnerability management programs and related standards, initiatives, and associations; and members of the AI community with expertise in AI and AI-related security concerns."
+ },
+ {
+ "contentnewsType": "paragraph",
+ "content": "The CVEAI WG will focus on: “determining what is a CVE-able vulnerability in AI technology. It is expected the CVEAI WG will produce documentation that defines how the CVE Program will address AI technologies moving forward. The CVEAI WG efforts are focused on defining swim lanes for AI vulnerability disclosure within CVE. This WG will discuss the concerns in defining what is within the responsibilities of the CVE Program. Because not all AI issues are appropriate for a CVE assignment, it will also try to define when other AI security-related initiatives are needed to address concerns outside the CVE Program.”"
+ },
+ {
+ "contentnewsType": "paragraph",
+ "content": "Read the CVEAI WG charter."
+ }
+ ]
+ },
+ {
+ "id": 420,
+ "newsType": "news",
+ "title": "Minutes from CVE Board Teleconference Meeting on October 2 Now Available",
+ "urlKeywords": "CVE Board Minutes from October 2",
+ "date": "2024-10-15",
+ "description": [
+ {
+ "contentnewsType": "paragraph",
+ "content": "The CVE Board held a teleconference meeting on October 2, 2024. Read the meeting minutes summary."
+ },
+ {
+ "contentnewsType": "paragraph",
+ "content": "The CVE Board is the organization responsible for the strategic direction, governance, operational structure, policies, and rules of the CVE Program. The Board includes members from numerous cybersecurity-related organizations including commercial security tool vendors, academia, research institutions, government departments and agencies, and other prominent security experts, as well as end-users of vulnerability information."
+ }
+ ]
+ },
{
"id": 419,
"newsType": "blog",
@@ -32,6 +70,7 @@
},
{
"id": 418,
+ "displayOnHomepageOrder": 0,
"newsType": "news",
"title": "Minutes from CVE Board Teleconference Meeting on September 18 Now Available",
"urlKeywords": "CVE Board Minutes from September 18",
diff --git a/src/components/AdpVulnerabilityEnrichment.vue b/src/components/AdpVulnerabilityEnrichment.vue
index 9dc937d0..d0245574 100644
--- a/src/components/AdpVulnerabilityEnrichment.vue
+++ b/src/components/AdpVulnerabilityEnrichment.vue
@@ -5,7 +5,6 @@