diff --git a/2020/22xxx/CVE-2020-22653.json b/2020/22xxx/CVE-2020-22653.json index 0baa99cd49d..c2196e0e424 100644 --- a/2020/22xxx/CVE-2020-22653.json +++ b/2020/22xxx/CVE-2020-22653.json @@ -56,6 +56,11 @@ "url": "https://support.ruckuswireless.com/security_bulletins/302", "refsource": "MISC", "name": "https://support.ruckuswireless.com/security_bulletins/302" + }, + { + "refsource": "MISC", + "name": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1", + "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } diff --git a/2020/22xxx/CVE-2020-22654.json b/2020/22xxx/CVE-2020-22654.json index 91f867f9318..c797bdee5e2 100644 --- a/2020/22xxx/CVE-2020-22654.json +++ b/2020/22xxx/CVE-2020-22654.json @@ -56,6 +56,11 @@ "url": "https://support.ruckuswireless.com/security_bulletins/302", "refsource": "MISC", "name": "https://support.ruckuswireless.com/security_bulletins/302" + }, + { + "refsource": "MISC", + "name": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1", + "url": "https://hdhrmi.blogspot.com/2020/03/multiple-vulnerabilities-in-ruckus.html?m=1" } ] } diff --git a/2024/41xxx/CVE-2024-41667.json b/2024/41xxx/CVE-2024-41667.json index 202159ae848..df108a90f8c 100644 --- a/2024/41xxx/CVE-2024-41667.json +++ b/2024/41xxx/CVE-2024-41667.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default PingOne Advanced Identity Cloud login page,they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4." + "value": "OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default OpenAM login, they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4." } ] }, diff --git a/2024/42xxx/CVE-2024-42393.json b/2024/42xxx/CVE-2024-42393.json index b9b1f26bf0e..65183b4958d 100644 --- a/2024/42xxx/CVE-2024-42393.json +++ b/2024/42xxx/CVE-2024-42393.json @@ -35,7 +35,7 @@ "product": { "product_data": [ { - "product_name": "Aruba InstantOS and Aruba Access Points running ArubaOS 10", + "product_name": "Hpe Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", "version": { "version_data": [ { @@ -70,9 +70,9 @@ "references": { "reference_data": [ { - "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", "refsource": "MISC", - "name": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt" + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" } ] }, @@ -86,7 +86,7 @@ "credits": [ { "lang": "en", - "value": "zzcentury" + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" } ], "impact": { diff --git a/2024/42xxx/CVE-2024-42394.json b/2024/42xxx/CVE-2024-42394.json index c8fac4bb9d1..41bb5a794ec 100644 --- a/2024/42xxx/CVE-2024-42394.json +++ b/2024/42xxx/CVE-2024-42394.json @@ -35,7 +35,7 @@ "product": { "product_data": [ { - "product_name": "Aruba InstantOS and Aruba Access Points running ArubaOS 10", + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", "version": { "version_data": [ { @@ -70,9 +70,9 @@ "references": { "reference_data": [ { - "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", "refsource": "MISC", - "name": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt" + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" } ] }, @@ -86,7 +86,7 @@ "credits": [ { "lang": "en", - "value": "zzcentury" + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" } ], "impact": { diff --git a/2024/42xxx/CVE-2024-42395.json b/2024/42xxx/CVE-2024-42395.json index 8a740cbaacc..0e4cec0b64c 100644 --- a/2024/42xxx/CVE-2024-42395.json +++ b/2024/42xxx/CVE-2024-42395.json @@ -35,7 +35,7 @@ "product": { "product_data": [ { - "product_name": "Aruba InstantOS and Aruba Access Points running ArubaOS 10", + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", "version": { "version_data": [ { @@ -70,9 +70,9 @@ "references": { "reference_data": [ { - "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", "refsource": "MISC", - "name": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt" + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" } ] }, @@ -86,7 +86,7 @@ "credits": [ { "lang": "en", - "value": "zzcentury" + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" } ], "impact": { diff --git a/2024/42xxx/CVE-2024-42396.json b/2024/42xxx/CVE-2024-42396.json index 5a370de53e3..93cd1dfe919 100644 --- a/2024/42xxx/CVE-2024-42396.json +++ b/2024/42xxx/CVE-2024-42396.json @@ -35,7 +35,7 @@ "product": { "product_data": [ { - "product_name": "Aruba InstantOS and Aruba Access Points running ArubaOS 10", + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", "version": { "version_data": [ { @@ -70,9 +70,9 @@ "references": { "reference_data": [ { - "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", "refsource": "MISC", - "name": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt" + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" } ] }, @@ -86,7 +86,7 @@ "credits": [ { "lang": "en", - "value": "zzcentury" + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" } ], "impact": { diff --git a/2024/42xxx/CVE-2024-42397.json b/2024/42xxx/CVE-2024-42397.json index 4e931251afa..7cc278e8b3b 100644 --- a/2024/42xxx/CVE-2024-42397.json +++ b/2024/42xxx/CVE-2024-42397.json @@ -35,7 +35,7 @@ "product": { "product_data": [ { - "product_name": "Aruba InstantOS and Aruba Access Points running ArubaOS 10", + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", "version": { "version_data": [ { @@ -70,9 +70,9 @@ "references": { "reference_data": [ { - "url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", "refsource": "MISC", - "name": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04678.txt" + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" } ] }, @@ -86,7 +86,7 @@ "credits": [ { "lang": "en", - "value": "zzcentury" + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" } ], "impact": { diff --git a/2024/42xxx/CVE-2024-42398.json b/2024/42xxx/CVE-2024-42398.json index 5d82d13d2dc..72596fad045 100644 --- a/2024/42xxx/CVE-2024-42398.json +++ b/2024/42xxx/CVE-2024-42398.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-42398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hewlett Packard Enterprise", + "product": { + "product_data": [ + { + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Version 8.12.0.0: 8.12.0.1 and below", + "version_value": "<=8.12.0.1" + }, + { + "version_affected": "<=", + "version_name": "Version 8.10.0.0: 8.10.0.12 and below", + "version_value": "<=8.10.0.12" + }, + { + "version_affected": "<=", + "version_name": "Version 10.6.0.0: 10.6.0.0 and below", + "version_value": "<=10.6.0.0" + }, + { + "version_affected": "<=", + "version_name": "Version 10.4.0.0: 10.4.1.3 and below", + "version_value": "<=10.4.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", + "refsource": "MISC", + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "HPESBNW04678", + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/42xxx/CVE-2024-42399.json b/2024/42xxx/CVE-2024-42399.json index 3884aa22018..e01188ad2b1 100644 --- a/2024/42xxx/CVE-2024-42399.json +++ b/2024/42xxx/CVE-2024-42399.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-42399", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hewlett Packard Enterprise", + "product": { + "product_data": [ + { + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Version 8.12.0.0: 8.12.0.1 and below", + "version_value": "<=8.12.0.1" + }, + { + "version_affected": "<=", + "version_name": "Version 8.10.0.0: 8.10.0.12 and below", + "version_value": "<=8.10.0.12" + }, + { + "version_affected": "<=", + "version_name": "Version 10.6.0.0: 10.6.0.0 and below", + "version_value": "<=10.6.0.0" + }, + { + "version_affected": "<=", + "version_name": "Version 10.4.0.0: 10.4.1.3 and below", + "version_value": "<=10.4.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", + "refsource": "MISC", + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "HPESBNW04678", + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/42xxx/CVE-2024-42400.json b/2024/42xxx/CVE-2024-42400.json index 434c4d03d84..b3d8af792b6 100644 --- a/2024/42xxx/CVE-2024-42400.json +++ b/2024/42xxx/CVE-2024-42400.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-42400", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@hpe.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hewlett Packard Enterprise", + "product": { + "product_data": [ + { + "product_name": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "Version 8.12.0.0: 8.12.0.1 and below", + "version_value": "<=8.12.0.1" + }, + { + "version_affected": "<=", + "version_name": "Version 8.10.0.0: 8.10.0.12 and below", + "version_value": "<=8.10.0.12" + }, + { + "version_affected": "<=", + "version_name": "Version 10.6.0.0: 10.6.0.0 and below", + "version_value": "<=10.6.0.0" + }, + { + "version_affected": "<=", + "version_name": "Version 10.4.0.0: 10.4.1.3 and below", + "version_value": "<=10.4.1.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US", + "refsource": "MISC", + "name": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "HPESBNW04678", + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/7xxx/CVE-2024-7568.json b/2024/7xxx/CVE-2024-7568.json new file mode 100644 index 00000000000..d933ebf0cea --- /dev/null +++ b/2024/7xxx/CVE-2024-7568.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7568", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7569.json b/2024/7xxx/CVE-2024-7569.json new file mode 100644 index 00000000000..f4c2c7cb785 --- /dev/null +++ b/2024/7xxx/CVE-2024-7569.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7569", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7570.json b/2024/7xxx/CVE-2024-7570.json new file mode 100644 index 00000000000..5b00b96cffd --- /dev/null +++ b/2024/7xxx/CVE-2024-7570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7571.json b/2024/7xxx/CVE-2024-7571.json new file mode 100644 index 00000000000..6f59a498b72 --- /dev/null +++ b/2024/7xxx/CVE-2024-7571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7571", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7572.json b/2024/7xxx/CVE-2024-7572.json new file mode 100644 index 00000000000..50c80211cdc --- /dev/null +++ b/2024/7xxx/CVE-2024-7572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7573.json b/2024/7xxx/CVE-2024-7573.json new file mode 100644 index 00000000000..48ce634c3e9 --- /dev/null +++ b/2024/7xxx/CVE-2024-7573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-7573", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file