From 6350732fdb368ec92a23c6184b99fb3a8d2b61d3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 26 Dec 2024 16:01:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/12xxx/CVE-2024-12908.json | 94 +++++++++++++++++++++++++-- 2024/12xxx/CVE-2024-12956.json | 114 +++++++++++++++++++++++++++++++-- 2024/12xxx/CVE-2024-12958.json | 114 +++++++++++++++++++++++++++++++-- 2024/12xxx/CVE-2024-12975.json | 18 ++++++ 2024/51xxx/CVE-2024-51540.json | 79 +++++++++++++++++++++-- 2024/56xxx/CVE-2024-56497.json | 18 ++++++ 2024/56xxx/CVE-2024-56498.json | 18 ++++++ 2024/56xxx/CVE-2024-56499.json | 18 ++++++ 2024/56xxx/CVE-2024-56500.json | 18 ++++++ 2024/56xxx/CVE-2024-56501.json | 18 ++++++ 2024/56xxx/CVE-2024-56502.json | 18 ++++++ 2024/56xxx/CVE-2024-56503.json | 18 ++++++ 2024/56xxx/CVE-2024-56504.json | 18 ++++++ 2024/56xxx/CVE-2024-56505.json | 18 ++++++ 2024/56xxx/CVE-2024-56506.json | 18 ++++++ 15 files changed, 583 insertions(+), 16 deletions(-) create mode 100644 2024/12xxx/CVE-2024-12975.json create mode 100644 2024/56xxx/CVE-2024-56497.json create mode 100644 2024/56xxx/CVE-2024-56498.json create mode 100644 2024/56xxx/CVE-2024-56499.json create mode 100644 2024/56xxx/CVE-2024-56500.json create mode 100644 2024/56xxx/CVE-2024-56501.json create mode 100644 2024/56xxx/CVE-2024-56502.json create mode 100644 2024/56xxx/CVE-2024-56503.json create mode 100644 2024/56xxx/CVE-2024-56504.json create mode 100644 2024/56xxx/CVE-2024-56505.json create mode 100644 2024/56xxx/CVE-2024-56506.json diff --git a/2024/12xxx/CVE-2024-12908.json b/2024/12xxx/CVE-2024-12908.json index 3c92dd7e109..fe1645f62e3 100644 --- a/2024/12xxx/CVE-2024-12908.json +++ b/2024/12xxx/CVE-2024-12908.json @@ -1,17 +1,103 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12908", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@delinea.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delinea addressed a reported case on Secret Server v11.7.31 (protocol handler version\u00a06.0.3.26)\u00a0where, within the protocol handler function, URI's were compared before normalization and canonicalization, potentially leading to over matching against the approved list. If this attack were successfully exploited, a\u00a0remote attacker may be able to convince a user to visit a malicious web-page, or open a\nmalicious document which could trigger the vulnerable handler, allowing them to execute\narbitrary code on the user's machine.\u00a0Delinea added additional validation that the downloaded installer's batch file was in the expected format." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Delinea", + "product": { + "product_data": [ + { + "product_name": "Secret Server", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "11.7.31" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm", + "refsource": "MISC", + "name": "https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000049.htm" + }, + { + "url": "https://trust.delinea.com/", + "refsource": "MISC", + "name": "https://trust.delinea.com/" + }, + { + "url": "https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/", + "refsource": "MISC", + "name": "https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "David Cash and Richard Warren of Amber Wolf" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/12xxx/CVE-2024-12956.json b/2024/12xxx/CVE-2024-12956.json index e59cf52a710..3a496f66791 100644 --- a/2024/12xxx/CVE-2024-12956.json +++ b/2024/12xxx/CVE-2024-12956.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12956", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. This issue affects some unknown processing of the file /add_achievement_details.php. The manipulation of the argument ach_certy leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in 1000 Projects Portfolio Management System MCA 1.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /add_achievement_details.php. Durch Manipulieren des Arguments ach_certy mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Unrestricted Upload", + "cweId": "CWE-434" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Controls", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "1000 Projects", + "product": { + "product_data": [ + { + "product_name": "Portfolio Management System MCA", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.289319", + "refsource": "MISC", + "name": "https://vuldb.com/?id.289319" + }, + { + "url": "https://vuldb.com/?ctiid.289319", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.289319" + }, + { + "url": "https://vuldb.com/?submit.468540", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.468540" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README2.md", + "refsource": "MISC", + "name": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README2.md" + }, + { + "url": "https://1000projects.org/", + "refsource": "MISC", + "name": "https://1000projects.org/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wangjiawei (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/12xxx/CVE-2024-12958.json b/2024/12xxx/CVE-2024-12958.json index 04074584843..e1d6c5c3674 100644 --- a/2024/12xxx/CVE-2024-12958.json +++ b/2024/12xxx/CVE-2024-12958.json @@ -1,17 +1,123 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12958", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. This affects an unknown part of the file /update_pro_details.php. The manipulation of the argument q leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in 1000 Projects Portfolio Management System MCA 1.0 entdeckt. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /update_pro_details.php. Dank Manipulation des Arguments q mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "1000 Projects", + "product": { + "product_data": [ + { + "product_name": "Portfolio Management System MCA", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.289323", + "refsource": "MISC", + "name": "https://vuldb.com/?id.289323" + }, + { + "url": "https://vuldb.com/?ctiid.289323", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.289323" + }, + { + "url": "https://vuldb.com/?submit.468799", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.468799" + }, + { + "url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README6.md", + "refsource": "MISC", + "name": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README6.md" + }, + { + "url": "https://1000projects.org/", + "refsource": "MISC", + "name": "https://1000projects.org/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wangjiawei (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/12xxx/CVE-2024-12975.json b/2024/12xxx/CVE-2024-12975.json new file mode 100644 index 00000000000..4f570bc63a4 --- /dev/null +++ b/2024/12xxx/CVE-2024-12975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/51xxx/CVE-2024-51540.json b/2024/51xxx/CVE-2024-51540.json index 846dee8df6e..fffa24ca772 100644 --- a/2024/51xxx/CVE-2024-51540.json +++ b/2024/51xxx/CVE-2024-51540.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-51540", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@dell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell ECS, versions prior to 3.8.1.3 contains an arithmetic overflow vulnerability exists in retention period handling of ECS. An authenticated user with bucket or object-level access and the necessary privileges could potentially exploit this vulnerability to bypass retention policies and delete objects." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Dell", + "product": { + "product_data": [ + { + "product_name": "ECS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "N/A", + "version_value": "3.8.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities", + "refsource": "MISC", + "name": "https://www.dell.com/support/kbdoc/en-us/000256642/dsa-2024-483-security-update-for-dell-ecs-multiple-vulnerabilities" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/56xxx/CVE-2024-56497.json b/2024/56xxx/CVE-2024-56497.json new file mode 100644 index 00000000000..a869aab05ca --- /dev/null +++ b/2024/56xxx/CVE-2024-56497.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56497", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56498.json b/2024/56xxx/CVE-2024-56498.json new file mode 100644 index 00000000000..8b1bce547b3 --- /dev/null +++ b/2024/56xxx/CVE-2024-56498.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56498", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56499.json b/2024/56xxx/CVE-2024-56499.json new file mode 100644 index 00000000000..eaa54760df0 --- /dev/null +++ b/2024/56xxx/CVE-2024-56499.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56499", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56500.json b/2024/56xxx/CVE-2024-56500.json new file mode 100644 index 00000000000..a8dc3133a10 --- /dev/null +++ b/2024/56xxx/CVE-2024-56500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56501.json b/2024/56xxx/CVE-2024-56501.json new file mode 100644 index 00000000000..3bb3c8f74a9 --- /dev/null +++ b/2024/56xxx/CVE-2024-56501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56502.json b/2024/56xxx/CVE-2024-56502.json new file mode 100644 index 00000000000..75cf97f8359 --- /dev/null +++ b/2024/56xxx/CVE-2024-56502.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56502", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56503.json b/2024/56xxx/CVE-2024-56503.json new file mode 100644 index 00000000000..741cb9fa771 --- /dev/null +++ b/2024/56xxx/CVE-2024-56503.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56503", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56504.json b/2024/56xxx/CVE-2024-56504.json new file mode 100644 index 00000000000..5f0c294a3b4 --- /dev/null +++ b/2024/56xxx/CVE-2024-56504.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56504", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56505.json b/2024/56xxx/CVE-2024-56505.json new file mode 100644 index 00000000000..8ac9ae59fed --- /dev/null +++ b/2024/56xxx/CVE-2024-56505.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56505", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56506.json b/2024/56xxx/CVE-2024-56506.json new file mode 100644 index 00000000000..1b3d30fe339 --- /dev/null +++ b/2024/56xxx/CVE-2024-56506.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56506", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file