+ -
+ CVE 25th Anniversary Report
+
- About CVE
- Process
- Program Organization
diff --git a/src/views/About/History.vue b/src/views/About/History.vue
index 58145fa7..911dbf6f 100644
--- a/src/views/About/History.vue
+++ b/src/views/About/History.vue
@@ -8,11 +8,19 @@
{{cvenavs['About']['submenu']['History']['items']['Overview']['label']}}
+
+ The CVE Program is celebrating 25 years of impact in cybersecurity! For a more comprehensive history of the program, in addition to what’s next for the program,
+ read the
+
+ CVE 25th Anniversary Report
+ .
+ For a higher-level overview, see below.
+
The original concept for what would become the
CVE List was presented by the co-creators of CVE, The MITRE Corporation’s
David E. Mann and Steven M. Christey, as a white paper entitled,
-
+
Towards a Common Enumeration of Vulnerabilities (PDF, 0.3MB), at the
2nd Workshop on Research with Security Vulnerability Databases on January 21-22, 1999 at Purdue
University in West Lafayette, Indiana, USA.
diff --git a/src/views/About/Overview.vue b/src/views/About/Overview.vue
index 9b3798af..d8df5b50 100644
--- a/src/views/About/Overview.vue
+++ b/src/views/About/Overview.vue
@@ -10,17 +10,24 @@
class="title">
{{cvenavs['About']['submenu']['Overview']['items']['About the CVE Program']['label']}}
+
+ The CVE Program is celebrating 25 years of impact in cybersecurity! Read the
+
+ CVE 25th Anniversary Report
+ .
+
The mission of the CVE® Program is to identify,
define, and catalog publicly disclosed cybersecurity
- vulnerabilities. There is one
- CVE Record for each
- vulnerability in the catalog. The vulnerabilities are discovered then assigned and published
+ vulnerabilities.
+ There is one
+ CVE Record
+ for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published
by organizations from around the world that have partnered with the CVE Program.
- Partners publish CVE Records to communicate
- consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use
- CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and
- address the vulnerabilities.
+ Partners
+ publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity
+ professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize
+ and address the vulnerabilities.
CVE Program Overview
diff --git a/src/views/ResourcesSupport/Resources.vue b/src/views/ResourcesSupport/Resources.vue
index 3c6dd07e..1d6ecdcb 100644
--- a/src/views/ResourcesSupport/Resources.vue
+++ b/src/views/ResourcesSupport/Resources.vue
@@ -635,12 +635,17 @@
+ -
+
+ CVE 25th Anniversary Report
+
+
-
- CVE Program Professional Code of Conduct
+ CVE Program Professional Code of Conduct
From 5cdde6c6d9d7da54083e8c8aee6dec315e6f0ada Mon Sep 17 00:00:00 2001
From: rroberge
Date: Tue, 22 Oct 2024 00:06:19 +0000
Subject: [PATCH 3/3] #3180 Update PDF link on Overview page
---
src/components/HomeModule.vue | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/components/HomeModule.vue b/src/components/HomeModule.vue
index 517e8999..8423ad0f 100644
--- a/src/components/HomeModule.vue
+++ b/src/components/HomeModule.vue
@@ -73,12 +73,12 @@
Learn
- -
- CVE 25th Anniversary Report
-
- About CVE
- Process
- Program Organization
+ -
+ CVE 25th Anniversary Report
+
-
Related Efforts