cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-30046,https://securityvulnerability.io/vulnerability/CVE-2024-30046,Visual Studio Denial of Service Vulnerability Affects Developers Worldwide,Visual Studio Denial of Service Vulnerability,Microsoft,".net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",5.9,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T16:57:30.222Z,0 CVE-2024-30045,https://securityvulnerability.io/vulnerability/CVE-2024-30045,Remote Code Execution Vulnerability Affects .NET and Visual Studio,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,".net 8.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.4",6.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-05-14T16:57:29.676Z,0 CVE-2024-21409,https://securityvulnerability.io/vulnerability/CVE-2024-21409,Remote Code Execution Vulnerability Affects Microsoft Products,"A vulnerability has been identified in .NET, .NET Framework, and Visual Studio that allows for remote code execution. This flaw can enable an attacker to execute arbitrary code on the affected system, potentially leading to unauthorized access and control. The issue affects multiple versions of these platforms, requiring immediate attention from users to mitigate risks and safeguard sensitive data. Users are advised to apply the appropriate security updates as detailed in the vendor advisory.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Powershell 7.3,Powershell 7.4,Powershell 7.2,.net 6.0,.net 7.0,.net 8.0,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2",7.3,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-09T17:00:08.248Z,0 CVE-2024-26190,https://securityvulnerability.io/vulnerability/CVE-2024-26190,Denial of Service Vulnerability in Microsoft QUIC Protocol,The Denial of Service vulnerability in Microsoft QUIC can allow an attacker to disrupt services by exploiting weaknesses in the protocol implementation. This vulnerability poses a risk to the availability of affected systems and may be leveraged in targeted attacks. Proper mitigation strategies should be employed to ensure network security and maintain service uptime. Organizations using Microsoft products that implement the QUIC protocol should closely monitor for updates and apply recommended security patches.,Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Powershell 7.3,Powershell 7.4,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0",7.5,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-03-12T16:57:52.923Z,0 CVE-2024-21392,https://securityvulnerability.io/vulnerability/CVE-2024-21392,.NET and Visual Studio Denial of Service Vulnerability,"This vulnerability in Microsoft .NET and Visual Studio allows an attacker to execute a denial of service attack, potentially disrupting application functionality and affecting the availability of services. Proper security measures, including timely updates and monitoring, are essential to mitigate risks associated with this vulnerability.",Microsoft,"Microsoft Visual Studio 2022 Version 17.9,Powershell 7.3,Powershell 7.4,.net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-03-12T16:57:42.012Z,0 CVE-2024-21404,https://securityvulnerability.io/vulnerability/CVE-2024-21404,.NET Denial of Service Vulnerability,"The .NET Denial of Service vulnerability presents risks that can allow attackers to disrupt the availability of affected applications by exploiting specific flaws in the .NET Framework. This can lead to interruptions in service and potentially expose sensitive information, impacting both system functionality and organizational operations. It is critical for users to address this vulnerability through timely updates and patching recommendations provided by Microsoft to ensure continued security and reliability of their systems.",Microsoft,".net 6.0,.net 7.0,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8",7.5,HIGH,0.0019499999471008778,false,false,false,false,,false,false,2024-02-13T18:02:24.234Z,0 CVE-2024-21319,https://securityvulnerability.io/vulnerability/CVE-2024-21319,Microsoft Identity Denial of service vulnerability,"A denial of service vulnerability exists within Microsoft Identity, which could allow an attacker to impair the functions of the affected services. This vulnerability may lead to disruption in user authentication and application access, resulting in negative impacts on operations relying on these critical identity services. Organizations utilizing Microsoft Identity platforms must take necessary precautions to mitigate any potential exploitation of this vulnerability, ensuring the security and continuity of their operations.",Microsoft,".net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.8,.net 7.0,.net 8.0,Microsoft Identity Model V6.0.0 Fornuget,Microsoft Identity Model V7.0.0 For Nuget,Microsoft Identity Model V6.0.0,Microsoft Identity Model V5.0.0,Microsoft Identity Model V7.0.0,Microsoft Identity Model V5.0.0 For Nuget",6.8,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2024-01-09T18:59:01.270Z,0 CVE-2024-0057,https://securityvulnerability.io/vulnerability/CVE-2024-0057,"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability","A vulnerability exists in the .NET Framework and Visual Studio that allows an attacker to bypass security features. This can enable unauthorized access to system functions that would typically be restricted. The potential exploit could lead to increased risk for applications utilizing these frameworks if not addressed. Microsoft has highlighted this in its advisory, emphasizing the need for developers and IT administrators to apply patches and updates to safeguard their environments from potential exploitation.",Microsoft,".net 8.0,.net 7.0,.net 6.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Nuget 5.11.0,Nuget 17.4.0,Nuget 17.6.0,Nuget 17.8.0,Powershell 7.2,Powershell 7.3,Powershell 7.4,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2",9.1,CRITICAL,0.0012100000167265534,false,true,false,true,,false,false,2024-01-09T18:15:00.000Z,0 CVE-2024-20672,https://securityvulnerability.io/vulnerability/CVE-2024-20672,.NET Denial of Service Vulnerability,"A vulnerability exists in the .NET Framework that could allow an attacker to exploit the system through a Denial of Service (DoS) attack. This vulnerability could potentially result in the affected service crashing and becoming unresponsive, causing interruptions in operations and service delivery. It is critical for users to implement the necessary security updates and patches from Microsoft to mitigate the risks associated with this vulnerability. Regular monitoring and assessments of .NET applications can further enhance security posture against potential attacks.",Microsoft,".net 6.0,.net 7.0",7.5,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-01-09T18:15:00.000Z,0 CVE-2024-0056,https://securityvulnerability.io/vulnerability/CVE-2024-0056,Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability,"A security feature bypass vulnerability exists in Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Providers. This vulnerability allows an attacker to bypass security measures intended to restrict user access and control over SQL database activities. Successful exploitation could lead to unauthorized data access or manipulation, posing significant risks to the integrity and confidentiality of sensitive information. Organizations utilizing these data providers must assess their environment to apply necessary mitigations and protect their database systems.",Microsoft,"Microsoft Sql Server 2022 (gdr),.net 6.0,.net 7.0,.net 8.0,Microsoft.data.sqlclient,System.data.sqlclient,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.8,Microsoft Sql Server 2022 (cu 10),Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 2.0 Service Pack 2",8.7,HIGH,0.0005300000193528831,false,true,false,false,,false,false,2024-01-09T18:15:00.000Z,0 CVE-2023-36558,https://securityvulnerability.io/vulnerability/CVE-2023-36558,ASP.NET Core - Security Feature Bypass Vulnerability,ASP.NET Core Security Feature Bypass Vulnerability,Microsoft,".net 6.0,Asp.net Core 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,.net 8.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Asp.net Core 7.0,Asp.net Core 8.0",5.5,MEDIUM,0.0004299999854993075,false,true,false,false,,false,false,2023-11-14T22:15:00.000Z,0 CVE-2023-36049,https://securityvulnerability.io/vulnerability/CVE-2023-36049,Elevation of Privilege Vulnerability Affects Microsoft Products,"A vulnerability with high CVSS scores has been identified in the .NET Framework, allowing for the elevation of privilege and security feature bypass. This vulnerability specifically affects FTP operations and allows unauthorized users to write or delete files on the server, potentially leading to data loss, data corruption, or unauthorized access to sensitive information. Microsoft has released patches to address the flaws, and users are urged to apply the updates promptly in order to safeguard against potential attacks. The exploitation of these vulnerabilities could have a significant impact on affected systems, especially those relying on the .NET Framework for FTP operations.",Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6,.net 8.0,.net 6.0,.net 7.0,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6/4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.6,HIGH,0.00215000007301569,false,true,true,true,,false,false,2023-11-14T21:15:00.000Z,0 CVE-2023-38171,https://securityvulnerability.io/vulnerability/CVE-2023-38171,Microsoft QUIC Denial of Service Vulnerability,Microsoft QUIC Denial of Service Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0,Powershell 7.3",7.5,HIGH,0.0017500000540167093,false,false,false,false,,false,false,2023-10-10T18:15:00.000Z,0 CVE-2023-36435,https://securityvulnerability.io/vulnerability/CVE-2023-36435,Microsoft QUIC Denial of Service Vulnerability,Microsoft QUIC Denial of Service Vulnerability,Microsoft,"Powershell 7.3,Windows Server 2022,Windows 11 Version 21h2,Windows 11 Version 22h2,.net 7.0",7.5,HIGH,0.00046999999904073775,false,false,false,false,,false,false,2023-10-10T18:15:00.000Z,0 CVE-2023-36799,https://securityvulnerability.io/vulnerability/CVE-2023-36799,.NET Core and Visual Studio Denial of Service Vulnerability,.NET Core and Visual Studio Denial of Service Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",6.5,MEDIUM,0.0005099999834783375,false,true,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-36796,https://securityvulnerability.io/vulnerability/CVE-2023-36796,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2013 Update 5,Microsoft Visual Studio 2015 Update 3,.net 7.0,.net 6.0,Powershell 7.2,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-36794,https://securityvulnerability.io/vulnerability/CVE-2023-36794,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,Powershell 7.2,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-36793,https://securityvulnerability.io/vulnerability/CVE-2023-36793,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,.net 7.0,.net 6.0,Powershell 7.2,Microsoft Visual Studio 2022 Version 17.6,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-36792,https://securityvulnerability.io/vulnerability/CVE-2023-36792,Visual Studio Remote Code Execution Vulnerability,Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2019 Version 16.11 (includes 16.0 - 16.10),Microsoft Visual Studio 2022 Version 17.4,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Microsoft Visual Studio 2022 Version 17.7,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-09-12T17:15:00.000Z,0 CVE-2023-38180,https://securityvulnerability.io/vulnerability/CVE-2023-38180,.NET and Visual Studio Denial of Service Vulnerability,.NET and Visual Studio Denial of Service Vulnerability,Microsoft,"Asp.net Core 2.1,.net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6",7.5,HIGH,0.006639999803155661,true,false,false,true,,false,false,2023-08-08T19:15:00.000Z,0 CVE-2023-35391,https://securityvulnerability.io/vulnerability/CVE-2023-35391,ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability,ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Asp.net Core 2.1,.net 6.0,.net 7.0",6.2,MEDIUM,0.003539999946951866,false,false,false,false,,false,false,2023-08-08T19:15:00.000Z,0 CVE-2023-35390,https://securityvulnerability.io/vulnerability/CVE-2023-35390,.NET and Visual Studio Remote Code Execution Vulnerability,.NET and Visual Studio Remote Code Execution Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,.net 6.0,.net 7.0",7.8,HIGH,0.0015200000489130616,false,false,false,false,,false,false,2023-08-08T18:15:00.000Z,0 CVE-2023-33170,https://securityvulnerability.io/vulnerability/CVE-2023-33170,ASP.NET and Visual Studio Security Feature Bypass Vulnerability,ASP.NET and Visual Studio Security Feature Bypass Vulnerability,Microsoft,"Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,.net 6.0,.net 7.0",8.1,HIGH,0.0006000000284984708,false,false,false,false,,false,false,2023-07-11T18:15:00.000Z,0 CVE-2023-33127,https://securityvulnerability.io/vulnerability/CVE-2023-33127,.NET and Visual Studio Elevation of Privilege Vulnerability,.NET and Visual Studio Elevation of Privilege Vulnerability,Microsoft,".net 6.0,.net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3",8.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-07-11T18:15:00.000Z,0 CVE-2023-24895,https://securityvulnerability.io/vulnerability/CVE-2023-24895,".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability",Microsoft,".net 7.0,Microsoft Visual Studio 2022 Version 17.0,Microsoft Visual Studio 2022 Version 17.2,Microsoft Visual Studio 2022 Version 17.4,Microsoft Visual Studio 2022 Version 17.6,Powershell 7.2,Powershell 7.3,Microsoft .net Framework 4.8,Microsoft .net Framework 3.5 And 4.8,Microsoft .net Framework 3.5 And 4.7.2,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.5 And 4.8.1,Microsoft .net Framework 4.6.2,Microsoft .net Framework 3.5 And 4.6.2,Microsoft .net Framework 2.0 Service Pack 2,Microsoft .net Framework 3.0 Service Pack 2,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1",7.8,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2023-06-14T15:15:00.000Z,0