"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-12-17 16:01:02 +00:00
parent 21263b0fdd
commit 73568f409b
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
40 changed files with 531 additions and 0 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14782",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.856 through 0.9.8.864 allows an attacker to get a victim's session file name from the /tmp directory, and the victim's token value from /usr/local/cwpsrv/logs/access_log, then use them to make a request to extract the victim's password (for the OS and phpMyAdmin) via an attacker account."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://centos-webpanel.com/changelog-cwp7",
"refsource": "MISC",
"name": "https://centos-webpanel.com/changelog-cwp7"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html",
"url": "https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15235",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.864 allows an attacker to get a victim's session file name from /home/[USERNAME]/tmp/session/sess_xxxxxx, and the victim's token value from /usr/local/cwpsrv/logs/access_log, then use them to gain access to the victim's password (for the OS and phpMyAdmin) via an attacker account. This is different from CVE-2019-14782."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://centos-webpanel.com/changelog-cwp7",
"refsource": "MISC",
"name": "https://centos-webpanel.com/changelog-cwp7"
},
{
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html",
"url": "https://packetstormsecurity.com/files/155676/Control-Web-Panel-0.9.8.864-phpMyAdmin-Password-Disclosure.html"
}
]
}
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4587",
"url": "https://www.debian.org/security/2019/dsa-4587"
},
{
"refsource": "DEBIAN",
"name": "DSA-4586",
"url": "https://www.debian.org/security/2019/dsa-4586"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "DEBIAN",
"name": "DSA-4587",
"url": "https://www.debian.org/security/2019/dsa-4587"
},
{
"refsource": "DEBIAN",
"name": "DSA-4586",
"url": "https://www.debian.org/security/2019/dsa-4586"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "DEBIAN",
"name": "DSA-4587",
"url": "https://www.debian.org/security/2019/dsa-4587"
},
{
"refsource": "DEBIAN",
"name": "DSA-4586",
"url": "https://www.debian.org/security/2019/dsa-4586"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1681",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1636",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1636",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1598",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1598",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1580",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1580",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1371",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1581",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1581",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -65,6 +65,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1591",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1591",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1592",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1592",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -57,6 +57,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1593",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1593",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(2)",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(2)",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1521",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1521",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1603",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1603",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1597",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1597",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602",
"url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1602",
"refsource": "CONFIRM"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191217 Multiple vulnerabilities in Jenkins plugins",
"url": "http://www.openwall.com/lists/oss-security/2019/12/17/1"
}
]
}

View File

@ -56,6 +56,11 @@
"url": "http://www.egain.com/products/email-management-software/",
"refsource": "MISC",
"name": "http://www.egain.com/products/email-management-software/"
},
{
"refsource": "MISC",
"name": "https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8",
"url": "https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18670",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Quick Access Service (QAAdminAgent.exe) in Acer Quick Access V2.01.3000 through 2.01.3027 and V3.00.3000 through V3.00.3008, a REGULAR user can load an arbitrary unsigned DLL into the signed service's process, which is running as NT AUTHORITY\\SYSTEM. This is a DLL Hijacking vulnerability (including search order hijacking, which searches for the missing DLL in the PATH environment variable), which is caused by an uncontrolled search path element for nvapi.dll, atiadlxx.dll, or atiadlxy.dll."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://drive.google.com/open?id=1r0cr-H_FMc8V4hwlqF1MAEhSSnztm5sp",
"refsource": "MISC",
"name": "https://drive.google.com/open?id=1r0cr-H_FMc8V4hwlqF1MAEhSSnztm5sp"
},
{
"refsource": "CONFIRM",
"name": "https://us.answers.acer.com/app/answers/detail/a_id/64586",
"url": "https://us.answers.acer.com/app/answers/detail/a_id/64586"
}
]
}
}

View File

@ -71,6 +71,16 @@
"refsource": "MISC",
"name": "https://github.com/bao7uo/RAU_crypto",
"url": "https://github.com/bao7uo/RAU_crypto"
},
{
"refsource": "MISC",
"name": "https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui",
"url": "https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui"
},
{
"refsource": "MISC",
"name": "https://github.com/noperator/CVE-2019-18935",
"url": "https://github.com/noperator/CVE-2019-18935"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18956",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Divisa Proxia Suite 9 < 9.12.16, 9.11.19, 9.10.26, 9.9.8, 9.8.43 and 9.7.10, 10.0 < 10.0.32, and 10.1 < 10.1.5, SparkSpace 1.0 < 1.0.30, 1.1 < 1.1.2, and 1.2 < 1.2.4, and Proxia PHR 1.0 < 1.0.30 and 1.1 < 1.1.2 allows remote code execution via untrusted Java deserialization. The proxia-error cookie is insecurely deserialized in every request (GET or POST). Thus, an unauthenticated attacker can easily craft a seria1.0lized payload in order to execute arbitrary code via the prepareError function in the com.divisait.dv2ee.controller.MVCControllerServlet class of the dv2eemvc.jar component. allows remote code execution via untrusted Java deserialization. The proxia-error cookie is insecurely deserialized in every request (GET or POST). Thus, an unauthenticated attacker can easily craft a serialized payload in order to execute arbitrary code via the prepareError function in the com.divisait.dv2ee.controller.MVCControllerServlet class of the dv2eemvc.jar component. Affected products include Proxia Premium Edition 2017 and Sparkspace."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956",
"url": "https://github.com/blackarrowsec/advisories/tree/master/2019/CVE-2019-18956"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-19847",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Libspiro through 20190731 has a stack-based buffer overflow in the spiro_to_bpath0() function in spiro.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/fontforge/libspiro/issues/21",
"refsource": "MISC",
"name": "https://github.com/fontforge/libspiro/issues/21"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19848",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-19849",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}