From 90b682276728ddc3a78033e94c598f2cf4bf7c9d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 7 Jan 2025 20:01:01 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/35xxx/CVE-2022-35914.json | 15 ++++++ 2022/41xxx/CVE-2022-41572.json | 61 ++++++++++++++++++++++--- 2022/41xxx/CVE-2022-41573.json | 66 ++++++++++++++++++++++++--- 2022/45xxx/CVE-2022-45185.json | 66 ++++++++++++++++++++++++--- 2022/45xxx/CVE-2022-45186.json | 66 ++++++++++++++++++++++++--- 2024/13xxx/CVE-2024-13182.json | 18 ++++++++ 2024/35xxx/CVE-2024-35532.json | 61 ++++++++++++++++++++++--- 2024/53xxx/CVE-2024-53522.json | 66 ++++++++++++++++++++++++--- 2024/54xxx/CVE-2024-54819.json | 61 ++++++++++++++++++++++--- 2024/55xxx/CVE-2024-55218.json | 61 ++++++++++++++++++++++--- 2024/5xxx/CVE-2024-5445.json | 4 +- 2025/0xxx/CVE-2025-0218.json | 83 ++++++++++++++++++++++++++++++++-- 2025/0xxx/CVE-2025-0317.json | 18 ++++++++ 13 files changed, 592 insertions(+), 54 deletions(-) create mode 100644 2024/13xxx/CVE-2024-13182.json create mode 100644 2025/0xxx/CVE-2025-0317.json diff --git a/2022/35xxx/CVE-2022-35914.json b/2022/35xxx/CVE-2022-35914.json index 77beceac81b..cb6bcffa76c 100644 --- a/2022/35xxx/CVE-2022-35914.json +++ b/2022/35xxx/CVE-2022-35914.json @@ -71,6 +71,21 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html", "url": "http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_2022-35914.sh", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_2022-35914.sh" + }, + { + "refsource": "MISC", + "name": "https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/", + "url": "https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/" } ] } diff --git a/2022/41xxx/CVE-2022-41572.json b/2022/41xxx/CVE-2022-41572.json index 47ca7f123c2..86f0b5ffbd9 100644 --- a/2022/41xxx/CVE-2022-41572.json +++ b/2022/41xxx/CVE-2022-41572.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-41572", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-41572", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Privilege escalation can be accomplished on the server because nmap can be run as root. The attacker achieves total control over the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/120", + "refsource": "MISC", + "name": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/120" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/" } ] } diff --git a/2022/41xxx/CVE-2022-41573.json b/2022/41xxx/CVE-2022-41573.json index 4ed1d5a9ea6..2374eeaff4b 100644 --- a/2022/41xxx/CVE-2022-41573.json +++ b/2022/41xxx/CVE-2022-41573.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-41573", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-41573", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Ovidentia 8.3. The file upload feature does not prevent the uploading of executable files. A user can upload a .png file containing PHP code and then rename it to have the .php extension. It will then be accessible at an images/common/ URI for remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bitbucket.org/cantico/ovidentia/branches/", + "refsource": "MISC", + "name": "https://bitbucket.org/cantico/ovidentia/branches/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_CVE-2022-41573.txt", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_CVE-2022-41573.txt" } ] } diff --git a/2022/45xxx/CVE-2022-45185.json b/2022/45xxx/CVE-2022-45185.json index dba2a2144c2..9d78c294c46 100644 --- a/2022/45xxx/CVE-2022-45185.json +++ b/2022/45xxx/CVE-2022-45185.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-45185", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-45185", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SuiteCRM 7.12.7. Authenticated users can use CRM functions to upload malicious files. Then, deserialization can be used to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.suitecrm.com/admin/releases/7.12.x/", + "refsource": "MISC", + "name": "https://docs.suitecrm.com/admin/releases/7.12.x/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py" } ] } diff --git a/2022/45xxx/CVE-2022-45186.json b/2022/45xxx/CVE-2022-45186.json index 6d23c329cf9..44ba37ac483 100644 --- a/2022/45xxx/CVE-2022-45186.json +++ b/2022/45xxx/CVE-2022-45186.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-45186", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-45186", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in SuiteCRM 7.12.7. Authenticated users can recover an arbitrary field of a database." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://docs.suitecrm.com/admin/releases/7.12.x/", + "refsource": "MISC", + "name": "https://docs.suitecrm.com/admin/releases/7.12.x/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py", + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py" } ] } diff --git a/2024/13xxx/CVE-2024-13182.json b/2024/13xxx/CVE-2024-13182.json new file mode 100644 index 00000000000..49100444449 --- /dev/null +++ b/2024/13xxx/CVE-2024-13182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/35xxx/CVE-2024-35532.json b/2024/35xxx/CVE-2024-35532.json index 025cf56def2..0e2427e6a29 100644 --- a/2024/35xxx/CVE-2024-35532.json +++ b/2024/35xxx/CVE-2024-35532.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-35532", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-35532", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An XML External Entity (XXE) injection vulnerability in Intersec Geosafe-ea 2022.12, 2022.13, and 2022.14 allows attackers to perform arbitrary file reading under the privileges of the running process, make SSRF requests, or cause a Denial of Service (DoS) via unspecified vectors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2024-35532.pdf", + "url": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2024-35532.pdf" + }, + { + "refsource": "MISC", + "name": "https://intersec.com/public-safety", + "url": "https://intersec.com/public-safety" } ] } diff --git a/2024/53xxx/CVE-2024-53522.json b/2024/53xxx/CVE-2024-53522.json index 5e10c786007..e5ed43bdfa6 100644 --- a/2024/53xxx/CVE-2024-53522.json +++ b/2024/53xxx/CVE-2024-53522.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-53522", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-53522", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Bangkok Medical Software HOSxP XE v4.64.11.3 was discovered to contain a hardcoded IDEA Key-IV pair in the HOSxPXE4.exe and HOS-WIN32.INI components. This allows attackers to access sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://bangkok.com", + "refsource": "MISC", + "name": "http://bangkok.com" + }, + { + "url": "http://hosxp.com", + "refsource": "MISC", + "name": "http://hosxp.com" + }, + { + "refsource": "MISC", + "name": "https://www.safecloud.co.th/researches/blog/CVE-2024-53522", + "url": "https://www.safecloud.co.th/researches/blog/CVE-2024-53522" } ] } diff --git a/2024/54xxx/CVE-2024-54819.json b/2024/54xxx/CVE-2024-54819.json index 6839848190a..6e0c4244e93 100644 --- a/2024/54xxx/CVE-2024-54819.json +++ b/2024/54xxx/CVE-2024-54819.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54819", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54819", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to improper input validation in classes/security/validation.php" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/mkucej/i-librarian-free/commit/ed36f6f258392fa2ec72f9820661ded75d91accc", + "refsource": "MISC", + "name": "https://github.com/mkucej/i-librarian-free/commit/ed36f6f258392fa2ec72f9820661ded75d91accc" + }, + { + "refsource": "MISC", + "name": "https://github.com/partywavesec/CVE-2024-55557", + "url": "https://github.com/partywavesec/CVE-2024-55557" } ] } diff --git a/2024/55xxx/CVE-2024-55218.json b/2024/55xxx/CVE-2024-55218.json index 30ead251191..a0b9e2d0c5a 100644 --- a/2024/55xxx/CVE-2024-55218.json +++ b/2024/55xxx/CVE-2024-55218.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-55218", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-55218", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IceWarp Server 10.2.1 is vulnerable to Cross Site Scripting (XSS) via the meta parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.icewarp.com/", + "refsource": "MISC", + "name": "https://www.icewarp.com/" + }, + { + "refsource": "MISC", + "name": "https://resources.s4e.io/blog/icewarp-server-10-2-1-reflected-xss-vulnerability-cve-2024-55218/", + "url": "https://resources.s4e.io/blog/icewarp-server-10-2-1-reflected-xss-vulnerability-cve-2024-55218/" } ] } diff --git a/2024/5xxx/CVE-2024-5445.json b/2024/5xxx/CVE-2024-5445.json index fe8f78a8a23..2b4b756e108 100644 --- a/2024/5xxx/CVE-2024-5445.json +++ b/2024/5xxx/CVE-2024-5445.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Ecosystem Agent version 4 < 4.5.1.2597 and Ecosystem Agent version 5 < 5.1.4.2473 did not properly validate SSL/TLS certificates, which could allow a malicious actor to perform a Man-in-the-Middle and intercept traffic between the agent and N-able servers from a privileged network position." + "value": "Ecosystem Agent version 4 < 4.1.5.2597 and Ecosystem Agent version 5 < 5.1.4.2473 did not properly validate SSL/TLS certificates, which could allow a malicious actor to perform a Man-in-the-Middle and intercept traffic between the agent and N-able servers from a privileged network position." } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "<4.5.1.2597" + "version_value": "< 4.1.5.2597" }, { "version_affected": "=", diff --git a/2025/0xxx/CVE-2025-0218.json b/2025/0xxx/CVE-2025-0218.json index 7330ccb118d..c59d3bc54ae 100644 --- a/2025/0xxx/CVE-2025-0218.json +++ b/2025/0xxx/CVE-2025-0218.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0218", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@postgresql.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Generation of Predictable Numbers or Identifiers", + "cweId": "CWE-340" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "pgAgent", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.2", + "version_value": "4.2.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pgadmin-org/pgagent/commit/1ecd193a2be3a3dc9e98f369495e1a792e6d508c", + "refsource": "MISC", + "name": "https://github.com/pgadmin-org/pgagent/commit/1ecd193a2be3a3dc9e98f369495e1a792e6d508c" + } + ] + }, + "configuration": [ + { + "lang": "en", + "value": "attacker has permission to write to the system temporary directory" + } + ], + "work_around": [ + { + "lang": "en", + "value": "None." + } + ], + "credits": [ + { + "lang": "en", + "value": "The pgAdmin project thanks Wolfgang Frisch from SUSE for reporting this problem." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/0xxx/CVE-2025-0317.json b/2025/0xxx/CVE-2025-0317.json new file mode 100644 index 00000000000..0fa6c265677 --- /dev/null +++ b/2025/0xxx/CVE-2025-0317.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0317", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file