From 940c4c0a0669fe6e371c02ba44e6861d7ec85bf0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 26 Mar 2025 06:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/11xxx/CVE-2024-11847.json | 81 +++++++++++++++++++++++++++++++--- 2025/1xxx/CVE-2025-1784.json | 81 ++++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30743.json | 18 ++++++++ 2025/30xxx/CVE-2025-30744.json | 18 ++++++++ 2025/30xxx/CVE-2025-30745.json | 18 ++++++++ 2025/30xxx/CVE-2025-30746.json | 18 ++++++++ 2025/30xxx/CVE-2025-30747.json | 18 ++++++++ 2025/30xxx/CVE-2025-30748.json | 18 ++++++++ 2025/30xxx/CVE-2025-30749.json | 18 ++++++++ 2025/30xxx/CVE-2025-30750.json | 18 ++++++++ 2025/30xxx/CVE-2025-30751.json | 18 ++++++++ 2025/30xxx/CVE-2025-30752.json | 18 ++++++++ 2025/30xxx/CVE-2025-30753.json | 18 ++++++++ 2025/30xxx/CVE-2025-30754.json | 18 ++++++++ 2025/30xxx/CVE-2025-30755.json | 18 ++++++++ 2025/30xxx/CVE-2025-30756.json | 18 ++++++++ 2025/30xxx/CVE-2025-30757.json | 18 ++++++++ 2025/30xxx/CVE-2025-30758.json | 18 ++++++++ 2025/30xxx/CVE-2025-30759.json | 18 ++++++++ 2025/30xxx/CVE-2025-30760.json | 18 ++++++++ 2025/30xxx/CVE-2025-30761.json | 18 ++++++++ 2025/30xxx/CVE-2025-30762.json | 18 ++++++++ 22 files changed, 513 insertions(+), 9 deletions(-) create mode 100644 2025/30xxx/CVE-2025-30743.json create mode 100644 2025/30xxx/CVE-2025-30744.json create mode 100644 2025/30xxx/CVE-2025-30745.json create mode 100644 2025/30xxx/CVE-2025-30746.json create mode 100644 2025/30xxx/CVE-2025-30747.json create mode 100644 2025/30xxx/CVE-2025-30748.json create mode 100644 2025/30xxx/CVE-2025-30749.json create mode 100644 2025/30xxx/CVE-2025-30750.json create mode 100644 2025/30xxx/CVE-2025-30751.json create mode 100644 2025/30xxx/CVE-2025-30752.json create mode 100644 2025/30xxx/CVE-2025-30753.json create mode 100644 2025/30xxx/CVE-2025-30754.json create mode 100644 2025/30xxx/CVE-2025-30755.json create mode 100644 2025/30xxx/CVE-2025-30756.json create mode 100644 2025/30xxx/CVE-2025-30757.json create mode 100644 2025/30xxx/CVE-2025-30758.json create mode 100644 2025/30xxx/CVE-2025-30759.json create mode 100644 2025/30xxx/CVE-2025-30760.json create mode 100644 2025/30xxx/CVE-2025-30761.json create mode 100644 2025/30xxx/CVE-2025-30762.json diff --git a/2024/11xxx/CVE-2024-11847.json b/2024/11xxx/CVE-2024-11847.json index dca1690b187..95ca83e8e26 100644 --- a/2024/11xxx/CVE-2024-11847.json +++ b/2024/11xxx/CVE-2024-11847.json @@ -1,18 +1,89 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11847", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The wp-svg-upload WordPress plugin through 1.0.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "wp-svg-upload", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "semver", + "version": "0", + "lessThanOrEqual": "1.0.0" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/f57ecff2-0cff-40c7-b6e4-5b162b847d65/", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/f57ecff2-0cff-40c7-b6e4-5b162b847d65/" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Pierre Rudloff" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1784.json b/2025/1xxx/CVE-2025-1784.json index ab14a80118f..8fa3ddb7174 100644 --- a/2025/1xxx/CVE-2025-1784.json +++ b/2025/1xxx/CVE-2025-1784.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1784", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Spectra \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uagb block in all versions up to, and including, 2.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "brainstormforce", + "product": { + "product_data": [ + { + "product_name": "Spectra \u2013 WordPress Gutenberg Blocks", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.19.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac33fd5-602b-4810-96e1-850ea6ee739d?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac33fd5-602b-4810-96e1-850ea6ee739d?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-gutenberg/tags/2.19.0/classes/class-uagb-init-blocks.php#L1276", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-gutenberg/tags/2.19.0/classes/class-uagb-init-blocks.php#L1276" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3243058%40ultimate-addons-for-gutenberg&new=3243058%40ultimate-addons-for-gutenberg&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3243058%40ultimate-addons-for-gutenberg&new=3243058%40ultimate-addons-for-gutenberg&sfp_email=&sfph_mail=" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Peter Thaleikis" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/30xxx/CVE-2025-30743.json b/2025/30xxx/CVE-2025-30743.json new file mode 100644 index 00000000000..5dd9b225f9c --- /dev/null +++ b/2025/30xxx/CVE-2025-30743.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30743", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30744.json b/2025/30xxx/CVE-2025-30744.json new file mode 100644 index 00000000000..0dfd7afed05 --- /dev/null +++ b/2025/30xxx/CVE-2025-30744.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30744", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30745.json b/2025/30xxx/CVE-2025-30745.json new file mode 100644 index 00000000000..1ed947e9223 --- /dev/null +++ b/2025/30xxx/CVE-2025-30745.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30745", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30746.json b/2025/30xxx/CVE-2025-30746.json new file mode 100644 index 00000000000..3b1a976689f --- /dev/null +++ b/2025/30xxx/CVE-2025-30746.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30746", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30747.json b/2025/30xxx/CVE-2025-30747.json new file mode 100644 index 00000000000..114fa29afc1 --- /dev/null +++ b/2025/30xxx/CVE-2025-30747.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30747", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30748.json b/2025/30xxx/CVE-2025-30748.json new file mode 100644 index 00000000000..af6dd2d79c8 --- /dev/null +++ b/2025/30xxx/CVE-2025-30748.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30748", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30749.json b/2025/30xxx/CVE-2025-30749.json new file mode 100644 index 00000000000..8d7fd7a444c --- /dev/null +++ b/2025/30xxx/CVE-2025-30749.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30749", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30750.json b/2025/30xxx/CVE-2025-30750.json new file mode 100644 index 00000000000..4a3a06d1388 --- /dev/null +++ b/2025/30xxx/CVE-2025-30750.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30750", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30751.json b/2025/30xxx/CVE-2025-30751.json new file mode 100644 index 00000000000..5bd5976c20f --- /dev/null +++ b/2025/30xxx/CVE-2025-30751.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30751", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30752.json b/2025/30xxx/CVE-2025-30752.json new file mode 100644 index 00000000000..57f904b4af7 --- /dev/null +++ b/2025/30xxx/CVE-2025-30752.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30752", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30753.json b/2025/30xxx/CVE-2025-30753.json new file mode 100644 index 00000000000..4c4c9d3e14e --- /dev/null +++ b/2025/30xxx/CVE-2025-30753.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30753", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30754.json b/2025/30xxx/CVE-2025-30754.json new file mode 100644 index 00000000000..9410db1290b --- /dev/null +++ b/2025/30xxx/CVE-2025-30754.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30754", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30755.json b/2025/30xxx/CVE-2025-30755.json new file mode 100644 index 00000000000..3c345dc0e17 --- /dev/null +++ b/2025/30xxx/CVE-2025-30755.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30755", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30756.json b/2025/30xxx/CVE-2025-30756.json new file mode 100644 index 00000000000..f7e22c9f1f2 --- /dev/null +++ b/2025/30xxx/CVE-2025-30756.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30756", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30757.json b/2025/30xxx/CVE-2025-30757.json new file mode 100644 index 00000000000..f227db081fb --- /dev/null +++ b/2025/30xxx/CVE-2025-30757.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30757", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30758.json b/2025/30xxx/CVE-2025-30758.json new file mode 100644 index 00000000000..66a5b8f2878 --- /dev/null +++ b/2025/30xxx/CVE-2025-30758.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30758", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30759.json b/2025/30xxx/CVE-2025-30759.json new file mode 100644 index 00000000000..2aac0e8db78 --- /dev/null +++ b/2025/30xxx/CVE-2025-30759.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30759", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30760.json b/2025/30xxx/CVE-2025-30760.json new file mode 100644 index 00000000000..5eaf3cda0dc --- /dev/null +++ b/2025/30xxx/CVE-2025-30760.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30760", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30761.json b/2025/30xxx/CVE-2025-30761.json new file mode 100644 index 00000000000..e2ba9975914 --- /dev/null +++ b/2025/30xxx/CVE-2025-30761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/30xxx/CVE-2025-30762.json b/2025/30xxx/CVE-2025-30762.json new file mode 100644 index 00000000000..94b631a5dae --- /dev/null +++ b/2025/30xxx/CVE-2025-30762.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-30762", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file