mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
52 lines
1.7 KiB
JSON
52 lines
1.7 KiB
JSON
{
|
|
"id": "CVE-2024-23082",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-04-08T18:15:08.460",
|
|
"lastModified": "2024-11-21T08:56:54.977",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"tags": [
|
|
"disputed"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 contiene un desbordamiento de enteros a trav\u00e9s del componente org.treeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "http://threeten.com",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/ThreeTen/threetenbp",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://threeten.com",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://github.com/ThreeTen/threetenbp",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |