From ecde6a945ee19c696440137ebeb97f5faaa0f66b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 Aug 2022 16:00:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/23xxx/CVE-2021-23394.json | 5 +++ 2021/29xxx/CVE-2021-29439.json | 5 +++ 2021/29xxx/CVE-2021-29440.json | 5 +++ 2021/32xxx/CVE-2021-32607.json | 5 +++ 2021/32xxx/CVE-2021-32608.json | 5 +++ 2021/32xxx/CVE-2021-32682.json | 5 +++ 2021/39xxx/CVE-2021-39172.json | 5 +++ 2021/39xxx/CVE-2021-39173.json | 5 +++ 2021/39xxx/CVE-2021-39174.json | 5 +++ 2022/1xxx/CVE-2022-1293.json | 9 ++-- 2022/2xxx/CVE-2022-2631.json | 18 ++++++++ 2022/2xxx/CVE-2022-2632.json | 18 ++++++++ 2022/34xxx/CVE-2022-34625.json | 76 +++++++++++++++++++++++++++++++--- 2022/35xxx/CVE-2022-35217.json | 11 ++--- 2022/35xxx/CVE-2022-35218.json | 11 ++--- 2022/35xxx/CVE-2022-35219.json | 11 ++--- 2022/35xxx/CVE-2022-35220.json | 7 ++-- 2022/35xxx/CVE-2022-35221.json | 7 ++-- 2022/35xxx/CVE-2022-35222.json | 5 ++- 2022/35xxx/CVE-2022-35223.json | 7 ++-- 2022/37xxx/CVE-2022-37392.json | 18 ++++++++ 21 files changed, 207 insertions(+), 36 deletions(-) create mode 100644 2022/2xxx/CVE-2022-2631.json create mode 100644 2022/2xxx/CVE-2022-2632.json create mode 100644 2022/37xxx/CVE-2022-37392.json diff --git a/2021/23xxx/CVE-2021-23394.json b/2021/23xxx/CVE-2021-23394.json index e37251dca06..3841485776f 100644 --- a/2021/23xxx/CVE-2021-23394.json +++ b/2021/23xxx/CVE-2021-23394.json @@ -66,6 +66,11 @@ "refsource": "MISC", "url": "https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1", "name": "https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/", + "url": "https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/" } ] }, diff --git a/2021/29xxx/CVE-2021-29439.json b/2021/29xxx/CVE-2021-29439.json index 5a19952df3c..94e6a261abd 100644 --- a/2021/29xxx/CVE-2021-29439.json +++ b/2021/29xxx/CVE-2021-29439.json @@ -73,6 +73,11 @@ "name": "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-wg37-cf5x-55hq", "refsource": "CONFIRM", "url": "https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-wg37-cf5x-55hq" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities", + "url": "https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities" } ] }, diff --git a/2021/29xxx/CVE-2021-29440.json b/2021/29xxx/CVE-2021-29440.json index 6885d6a38f1..0a819ae7b97 100644 --- a/2021/29xxx/CVE-2021-29440.json +++ b/2021/29xxx/CVE-2021-29440.json @@ -83,6 +83,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html", "url": "http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities", + "url": "https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities" } ] }, diff --git a/2021/32xxx/CVE-2021-32607.json b/2021/32xxx/CVE-2021-32607.json index 2a0f6813fb6..6fc0c37c77a 100644 --- a/2021/32xxx/CVE-2021-32607.json +++ b/2021/32xxx/CVE-2021-32607.json @@ -56,6 +56,11 @@ "url": "https://github.com/smartstore/SmartStoreNET/commit/5b4e60ae7124df0898975cb8f994f9f23db1fae3", "refsource": "MISC", "name": "https://github.com/smartstore/SmartStoreNET/commit/5b4e60ae7124df0898975cb8f994f9f23db1fae3" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/smartstorenet-malicious-message-leading-to-e-commerce-takeover/", + "url": "https://blog.sonarsource.com/smartstorenet-malicious-message-leading-to-e-commerce-takeover/" } ] } diff --git a/2021/32xxx/CVE-2021-32608.json b/2021/32xxx/CVE-2021-32608.json index 0ccda7e5c4a..555efd73af3 100644 --- a/2021/32xxx/CVE-2021-32608.json +++ b/2021/32xxx/CVE-2021-32608.json @@ -56,6 +56,11 @@ "url": "https://github.com/smartstore/SmartStoreNET/commit/ae03d45e23734555a2aef0b0c3d33c21e076c20f", "refsource": "MISC", "name": "https://github.com/smartstore/SmartStoreNET/commit/ae03d45e23734555a2aef0b0c3d33c21e076c20f" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/smartstorenet-malicious-message-leading-to-e-commerce-takeover/", + "url": "https://blog.sonarsource.com/smartstorenet-malicious-message-leading-to-e-commerce-takeover/" } ] } diff --git a/2021/32xxx/CVE-2021-32682.json b/2021/32xxx/CVE-2021-32682.json index 7e0ea402a42..c124956240a 100644 --- a/2021/32xxx/CVE-2021-32682.json +++ b/2021/32xxx/CVE-2021-32682.json @@ -99,6 +99,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html", "url": "http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/", + "url": "https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/" } ] }, diff --git a/2021/39xxx/CVE-2021-39172.json b/2021/39xxx/CVE-2021-39172.json index 13be25c1e8b..b7acb21c588 100644 --- a/2021/39xxx/CVE-2021-39172.json +++ b/2021/39xxx/CVE-2021-39172.json @@ -78,6 +78,11 @@ "name": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1", "refsource": "MISC", "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/", + "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ] }, diff --git a/2021/39xxx/CVE-2021-39173.json b/2021/39xxx/CVE-2021-39173.json index 499e1b00ccc..e2cd954095b 100644 --- a/2021/39xxx/CVE-2021-39173.json +++ b/2021/39xxx/CVE-2021-39173.json @@ -78,6 +78,11 @@ "name": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83", "refsource": "CONFIRM", "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/", + "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ] }, diff --git a/2021/39xxx/CVE-2021-39174.json b/2021/39xxx/CVE-2021-39174.json index c69a6122f37..c49a7d78a21 100644 --- a/2021/39xxx/CVE-2021-39174.json +++ b/2021/39xxx/CVE-2021-39174.json @@ -78,6 +78,11 @@ "name": "https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688", "refsource": "CONFIRM", "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688" + }, + { + "refsource": "MISC", + "name": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/", + "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ] }, diff --git a/2022/1xxx/CVE-2022-1293.json b/2022/1xxx/CVE-2022-1293.json index 297fc797996..c50db5b4c05 100644 --- a/2022/1xxx/CVE-2022-1293.json +++ b/2022/1xxx/CVE-2022-1293.json @@ -65,7 +65,7 @@ "description_data": [ { "lang": "eng", - "value": "The embedded neutralization of Script-Related HTML Tag, was by-passed in the case of some extra conditions. " + "value": "The embedded neutralization of Script-Related HTML Tag, was by-passed in the case of some extra conditions." } ] }, @@ -103,8 +103,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.ercom.com/security-updates" + "refsource": "MISC", + "url": "https://www.ercom.com/security-updates", + "name": "https://www.ercom.com/security-updates" } ] }, @@ -117,4 +118,4 @@ "source": { "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2631.json b/2022/2xxx/CVE-2022-2631.json new file mode 100644 index 00000000000..64a30951c53 --- /dev/null +++ b/2022/2xxx/CVE-2022-2631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2632.json b/2022/2xxx/CVE-2022-2632.json new file mode 100644 index 00000000000..e750be03aac --- /dev/null +++ b/2022/2xxx/CVE-2022-2632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/34xxx/CVE-2022-34625.json b/2022/34xxx/CVE-2022-34625.json index 8d8001af2b8..5d2717579a4 100644 --- a/2022/34xxx/CVE-2022-34625.json +++ b/2022/34xxx/CVE-2022-34625.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-34625", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-34625", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Mealie1.0.0beta3 was discovered to contain a Server-Side Template Injection vulnerability, which allows attackers to execute arbitrary code via a crafted Jinja2 template." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cwe.mitre.org/data/definitions/94.html", + "refsource": "MISC", + "name": "https://cwe.mitre.org/data/definitions/94.html" + }, + { + "url": "https://hub.docker.com/r/hkotel/mealie", + "refsource": "MISC", + "name": "https://hub.docker.com/r/hkotel/mealie" + }, + { + "url": "https://docs.mealie.io/changelog/v0.5.6/", + "refsource": "MISC", + "name": "https://docs.mealie.io/changelog/v0.5.6/" + }, + { + "url": "https://cwe.mitre.org/data/definitions/1336.html", + "refsource": "MISC", + "name": "https://cwe.mitre.org/data/definitions/1336.html" + }, + { + "refsource": "MISC", + "name": "https://gainsec.com/2022/08/02/cve-2022-34625-ssti-rce-mealie/", + "url": "https://gainsec.com/2022/08/02/cve-2022-34625-ssti-rce-mealie/" } ] } diff --git a/2022/35xxx/CVE-2022-35217.json b/2022/35xxx/CVE-2022-35217.json index d7e9ef3d804..0baabfc6ab7 100644 --- a/2022/35xxx/CVE-2022-35217.json +++ b/2022/35xxx/CVE-2022-35217.json @@ -5,7 +5,7 @@ "DATE_PUBLIC": "2022-07-29T06:33:00.000Z", "ID": "CVE-2022-35217", "STATE": "PUBLIC", - "TITLE": "NHI card’s web service component - Stack-based Buffer Overflow-1" + "TITLE": "NHI card\u2019s web service component - Stack-based Buffer Overflow-1" }, "affects": { "vendor": { @@ -14,7 +14,7 @@ "product": { "product_data": [ { - "product_name": "card’s web service component", + "product_name": "card\u2019s web service component", "version": { "version_data": [ { @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "The NHI card’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service." + "value": "The NHI card\u2019s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A local area network attacker with general user privilege can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service." } ] }, @@ -77,8 +77,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6353-31470-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6353-31470-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6353-31470-1.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35218.json b/2022/35xxx/CVE-2022-35218.json index 5788de89ee5..55d3aeb51c8 100644 --- a/2022/35xxx/CVE-2022-35218.json +++ b/2022/35xxx/CVE-2022-35218.json @@ -5,7 +5,7 @@ "DATE_PUBLIC": "2022-07-29T06:33:00.000Z", "ID": "CVE-2022-35218", "STATE": "PUBLIC", - "TITLE": "NHI card’s web service component - Heap-based Buffer Overflow" + "TITLE": "NHI card\u2019s web service component - Heap-based Buffer Overflow" }, "affects": { "vendor": { @@ -14,7 +14,7 @@ "product": { "product_data": [ { - "product_name": "card’s web service component", + "product_name": "card\u2019s web service component", "version": { "version_data": [ { @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "The NHI card’s web service component has a heap-based buffer overflow vulnerability due to insufficient validation for packet origin parameter length. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service." + "value": "The NHI card\u2019s web service component has a heap-based buffer overflow vulnerability due to insufficient validation for packet origin parameter length. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service." } ] }, @@ -77,8 +77,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6354-1cf61-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6354-1cf61-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6354-1cf61-1.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35219.json b/2022/35xxx/CVE-2022-35219.json index 963388c7f4d..991c20896a0 100644 --- a/2022/35xxx/CVE-2022-35219.json +++ b/2022/35xxx/CVE-2022-35219.json @@ -5,7 +5,7 @@ "DATE_PUBLIC": "2022-07-29T06:33:00.000Z", "ID": "CVE-2022-35219", "STATE": "PUBLIC", - "TITLE": "NHI card’s web service component - Stack-based Buffer Overflow-2" + "TITLE": "NHI card\u2019s web service component - Stack-based Buffer Overflow-2" }, "affects": { "vendor": { @@ -14,7 +14,7 @@ "product": { "product_data": [ { - "product_name": "card’s web service component", + "product_name": "card\u2019s web service component", "version": { "version_data": [ { @@ -39,7 +39,7 @@ "description_data": [ { "lang": "eng", - "value": "The NHI card’s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet key parameter. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service." + "value": "The NHI card\u2019s web service component has a stack-based buffer overflow vulnerability due to insufficient validation for network packet key parameter. A LAN attacker with general user privilege can exploit this vulnerability to disrupt service." } ] }, @@ -77,8 +77,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6355-3bdab-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6355-3bdab-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6355-3bdab-1.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35220.json b/2022/35xxx/CVE-2022-35220.json index 96d092f4e0c..91c7c03ac7a 100644 --- a/2022/35xxx/CVE-2022-35220.json +++ b/2022/35xxx/CVE-2022-35220.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Teamplus Pro community discussion function has an ‘allocation of resource without limits or throttling’ vulnerability. A remote attacker with general user privilege posting a thread with large content can cause the receiving client device to allocate too much memory, leading to abnormal termination of this client’s Teamplus Pro application." + "value": "Teamplus Pro community discussion function has an \u2018allocation of resource without limits or throttling\u2019 vulnerability. A remote attacker with general user privilege posting a thread with large content can cause the receiving client device to allocate too much memory, leading to abnormal termination of this client\u2019s Teamplus Pro application." } ] }, @@ -82,8 +82,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6359-f5d1c-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6359-f5d1c-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6359-f5d1c-1.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35221.json b/2022/35xxx/CVE-2022-35221.json index 14707fddd3d..c802c3f5fbd 100644 --- a/2022/35xxx/CVE-2022-35221.json +++ b/2022/35xxx/CVE-2022-35221.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Teamplus Pro community discussion has an ‘allocation of resource without limits or throttling’ vulnerability on thread subject field. A remote attacker with general user privilege posting a thread subject with large content can cause the server to allocate too much memory, leading to missing partial post content and disrupt partial service." + "value": "Teamplus Pro community discussion has an \u2018allocation of resource without limits or throttling\u2019 vulnerability on thread subject field. A remote attacker with general user privilege posting a thread subject with large content can cause the server to allocate too much memory, leading to missing partial post content and disrupt partial service." } ] }, @@ -82,8 +82,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6360-7bf50-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6360-7bf50-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6360-7bf50-1.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35222.json b/2022/35xxx/CVE-2022-35222.json index c711f2f003f..497f0670b83 100644 --- a/2022/35xxx/CVE-2022-35222.json +++ b/2022/35xxx/CVE-2022-35222.json @@ -87,8 +87,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6363-f5ec2-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6363-f5ec2-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6363-f5ec2-1.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35223.json b/2022/35xxx/CVE-2022-35223.json index be67c3eefea..4a6dff50756 100644 --- a/2022/35xxx/CVE-2022-35223.json +++ b/2022/35xxx/CVE-2022-35223.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "EasyUse MailHunter Ultimate’s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote attacker to execute arbitrary code, manipulate system command or interrupt service." + "value": "EasyUse MailHunter Ultimate\u2019s cookie deserialization function has an inadequate validation vulnerability. Deserializing a cookie containing malicious payload will trigger this insecure deserialization vulnerability, allowing an unauthenticated remote attacker to execute arbitrary code, manipulate system command or interrupt service." } ] }, @@ -76,8 +76,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html" + "refsource": "MISC", + "url": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html", + "name": "https://www.twcert.org.tw/tw/cp-132-6365-b056c-1.html" } ] }, diff --git a/2022/37xxx/CVE-2022-37392.json b/2022/37xxx/CVE-2022-37392.json new file mode 100644 index 00000000000..c5342fd95c4 --- /dev/null +++ b/2022/37xxx/CVE-2022-37392.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-37392", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file