From 02a3043db571d5faa25ddd21cce42c0b650fbc4d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 23 Mar 2023 19:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/0xxx/CVE-2023-0391.json | 5 ++ 2023/1xxx/CVE-2023-1606.json | 106 +++++++++++++++++++++++++++++++++ 2023/1xxx/CVE-2023-1607.json | 18 ++++++ 2023/1xxx/CVE-2023-1608.json | 18 ++++++ 2023/1xxx/CVE-2023-1609.json | 18 ++++++ 2023/1xxx/CVE-2023-1610.json | 18 ++++++ 2023/1xxx/CVE-2023-1611.json | 18 ++++++ 2023/1xxx/CVE-2023-1612.json | 18 ++++++ 2023/1xxx/CVE-2023-1613.json | 18 ++++++ 2023/28xxx/CVE-2023-28793.json | 18 ++++++ 2023/28xxx/CVE-2023-28794.json | 18 ++++++ 2023/28xxx/CVE-2023-28795.json | 18 ++++++ 2023/28xxx/CVE-2023-28796.json | 18 ++++++ 2023/28xxx/CVE-2023-28797.json | 18 ++++++ 2023/28xxx/CVE-2023-28798.json | 18 ++++++ 2023/28xxx/CVE-2023-28799.json | 18 ++++++ 2023/28xxx/CVE-2023-28800.json | 18 ++++++ 2023/28xxx/CVE-2023-28801.json | 18 ++++++ 2023/28xxx/CVE-2023-28802.json | 18 ++++++ 2023/28xxx/CVE-2023-28803.json | 18 ++++++ 2023/28xxx/CVE-2023-28804.json | 18 ++++++ 2023/28xxx/CVE-2023-28805.json | 18 ++++++ 2023/28xxx/CVE-2023-28806.json | 18 ++++++ 2023/28xxx/CVE-2023-28807.json | 18 ++++++ 24 files changed, 507 insertions(+) create mode 100644 2023/1xxx/CVE-2023-1606.json create mode 100644 2023/1xxx/CVE-2023-1607.json create mode 100644 2023/1xxx/CVE-2023-1608.json create mode 100644 2023/1xxx/CVE-2023-1609.json create mode 100644 2023/1xxx/CVE-2023-1610.json create mode 100644 2023/1xxx/CVE-2023-1611.json create mode 100644 2023/1xxx/CVE-2023-1612.json create mode 100644 2023/1xxx/CVE-2023-1613.json create mode 100644 2023/28xxx/CVE-2023-28793.json create mode 100644 2023/28xxx/CVE-2023-28794.json create mode 100644 2023/28xxx/CVE-2023-28795.json create mode 100644 2023/28xxx/CVE-2023-28796.json create mode 100644 2023/28xxx/CVE-2023-28797.json create mode 100644 2023/28xxx/CVE-2023-28798.json create mode 100644 2023/28xxx/CVE-2023-28799.json create mode 100644 2023/28xxx/CVE-2023-28800.json create mode 100644 2023/28xxx/CVE-2023-28801.json create mode 100644 2023/28xxx/CVE-2023-28802.json create mode 100644 2023/28xxx/CVE-2023-28803.json create mode 100644 2023/28xxx/CVE-2023-28804.json create mode 100644 2023/28xxx/CVE-2023-28805.json create mode 100644 2023/28xxx/CVE-2023-28806.json create mode 100644 2023/28xxx/CVE-2023-28807.json diff --git a/2023/0xxx/CVE-2023-0391.json b/2023/0xxx/CVE-2023-0391.json index 204fa684136..753a923a9b5 100644 --- a/2023/0xxx/CVE-2023-0391.json +++ b/2023/0xxx/CVE-2023-0391.json @@ -59,6 +59,11 @@ "url": "https://www.rapid7.com/blog/post/2023/03/21/cve-2023-0391-mgt-commerce-cloudpanel-shared-certificate-vulnerability-and-weak-installation-procedures/", "refsource": "MISC", "name": "https://www.rapid7.com/blog/post/2023/03/21/cve-2023-0391-mgt-commerce-cloudpanel-shared-certificate-vulnerability-and-weak-installation-procedures/" + }, + { + "url": "https://www.bleepingcomputer.com/news/security/cloudpanel-installations-use-the-same-ssl-certificate-private-key/", + "refsource": "MISC", + "name": "https://www.bleepingcomputer.com/news/security/cloudpanel-installations-use-the-same-ssl-certificate-private-key/" } ] }, diff --git a/2023/1xxx/CVE-2023-1606.json b/2023/1xxx/CVE-2023-1606.json new file mode 100644 index 00000000000..d898a5f4b05 --- /dev/null +++ b/2023/1xxx/CVE-2023-1606.json @@ -0,0 +1,106 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2023-1606", + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223736." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in novel-plus 3.6.2 gefunden. Sie wurde als kritisch eingestuft. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei DictController.java. Durch das Manipulieren des Arguments orderby mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "novel-plus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.6.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.223736", + "refsource": "MISC", + "name": "https://vuldb.com/?id.223736" + }, + { + "url": "https://vuldb.com/?ctiid.223736", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.223736" + }, + { + "url": "https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf", + "refsource": "MISC", + "name": "https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "OYyunshen (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseSeverity": "MEDIUM" + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1607.json b/2023/1xxx/CVE-2023-1607.json new file mode 100644 index 00000000000..3baba6afe42 --- /dev/null +++ b/2023/1xxx/CVE-2023-1607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1608.json b/2023/1xxx/CVE-2023-1608.json new file mode 100644 index 00000000000..5621b8eb7f2 --- /dev/null +++ b/2023/1xxx/CVE-2023-1608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1609.json b/2023/1xxx/CVE-2023-1609.json new file mode 100644 index 00000000000..af35ffee2eb --- /dev/null +++ b/2023/1xxx/CVE-2023-1609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1610.json b/2023/1xxx/CVE-2023-1610.json new file mode 100644 index 00000000000..df030385ea1 --- /dev/null +++ b/2023/1xxx/CVE-2023-1610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1611.json b/2023/1xxx/CVE-2023-1611.json new file mode 100644 index 00000000000..a95ba42136a --- /dev/null +++ b/2023/1xxx/CVE-2023-1611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1612.json b/2023/1xxx/CVE-2023-1612.json new file mode 100644 index 00000000000..658bad10e3d --- /dev/null +++ b/2023/1xxx/CVE-2023-1612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1613.json b/2023/1xxx/CVE-2023-1613.json new file mode 100644 index 00000000000..4d60064f4d7 --- /dev/null +++ b/2023/1xxx/CVE-2023-1613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28793.json b/2023/28xxx/CVE-2023-28793.json new file mode 100644 index 00000000000..250fecd3056 --- /dev/null +++ b/2023/28xxx/CVE-2023-28793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28794.json b/2023/28xxx/CVE-2023-28794.json new file mode 100644 index 00000000000..ff7a91943b0 --- /dev/null +++ b/2023/28xxx/CVE-2023-28794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28795.json b/2023/28xxx/CVE-2023-28795.json new file mode 100644 index 00000000000..25b6351af72 --- /dev/null +++ b/2023/28xxx/CVE-2023-28795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28796.json b/2023/28xxx/CVE-2023-28796.json new file mode 100644 index 00000000000..4f58d62409f --- /dev/null +++ b/2023/28xxx/CVE-2023-28796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28797.json b/2023/28xxx/CVE-2023-28797.json new file mode 100644 index 00000000000..55aeea77b01 --- /dev/null +++ b/2023/28xxx/CVE-2023-28797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28798.json b/2023/28xxx/CVE-2023-28798.json new file mode 100644 index 00000000000..763b5953ef9 --- /dev/null +++ b/2023/28xxx/CVE-2023-28798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28799.json b/2023/28xxx/CVE-2023-28799.json new file mode 100644 index 00000000000..a18bd13740d --- /dev/null +++ b/2023/28xxx/CVE-2023-28799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28800.json b/2023/28xxx/CVE-2023-28800.json new file mode 100644 index 00000000000..d56701ed04a --- /dev/null +++ b/2023/28xxx/CVE-2023-28800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28801.json b/2023/28xxx/CVE-2023-28801.json new file mode 100644 index 00000000000..84d8fb84ce6 --- /dev/null +++ b/2023/28xxx/CVE-2023-28801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28802.json b/2023/28xxx/CVE-2023-28802.json new file mode 100644 index 00000000000..0ecaaf9e455 --- /dev/null +++ b/2023/28xxx/CVE-2023-28802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28803.json b/2023/28xxx/CVE-2023-28803.json new file mode 100644 index 00000000000..a5fbed8ebe7 --- /dev/null +++ b/2023/28xxx/CVE-2023-28803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28804.json b/2023/28xxx/CVE-2023-28804.json new file mode 100644 index 00000000000..773a7357ca2 --- /dev/null +++ b/2023/28xxx/CVE-2023-28804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28805.json b/2023/28xxx/CVE-2023-28805.json new file mode 100644 index 00000000000..c821ff9a6fb --- /dev/null +++ b/2023/28xxx/CVE-2023-28805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28806.json b/2023/28xxx/CVE-2023-28806.json new file mode 100644 index 00000000000..dd10c7a273d --- /dev/null +++ b/2023/28xxx/CVE-2023-28806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/28xxx/CVE-2023-28807.json b/2023/28xxx/CVE-2023-28807.json new file mode 100644 index 00000000000..77d1d1268af --- /dev/null +++ b/2023/28xxx/CVE-2023-28807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-28807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file