diff --git a/2016/8xxx/CVE-2016-8493.json b/2016/8xxx/CVE-2016-8493.json index 907be6efc2f..e33dfa1563c 100644 --- a/2016/8xxx/CVE-2016-8493.json +++ b/2016/8xxx/CVE-2016-8493.json @@ -1,60 +1,18 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@fortinet.com", - "ID": "CVE-2016-8493", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2016-8493", + "STATE" : "REJECT" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Fortinet FortiClient", - "version": { - "version_data": [ - { - "version_value": "FortiClient 5.4.2, 5.4.1" - } - ] - } - } - ] - }, - "vendor_name": "Fortinet" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClientNamedPipe vulnerability." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Privilege escalation" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://fortiguard.com/psirt/FG-IR-16-095" + "lang" : "eng", + "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none." } ] } -} \ No newline at end of file +}