{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T12:18:02.210","vulnerabilities":[{"cve":{"id":"CVE-2024-23082","sourceIdentifier":"cve@mitre.org","published":"2024-04-08T18:15:08.460","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."},{"lang":"es","value":"Se descubrió que ThreeTen Backport v1.6.8 contiene un desbordamiento de enteros a través del componente org.treeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)."}],"metrics":{},"references":[{"url":"http://threeten.com","source":"cve@mitre.org"},{"url":"https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90","source":"cve@mitre.org"},{"url":"https://github.com/ThreeTen/threetenbp","source":"cve@mitre.org"},{"url":"http://threeten.com","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/ThreeTen/threetenbp","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}