diff --git a/README.md b/README.md
index 226bc4b..c891ab4 100644
--- a/README.md
+++ b/README.md
@@ -34,6 +34,7 @@ Got a bogus CVE? Please share here!
|28| [CVE-2024-27322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27322) | [HiddenLayer Inc.](https://hiddenlayer.com/research/r-bitrary-code-execution/) | https://github.com/traversc/qs/issues/93#issuecomment-2089733765
https://mstdn.social/@gws/112359739655466497
https://stackoverflow.com/questions/58426972/r-could-malicious-code-be-injected-into-an-rds-object
https://rud.is/b/2024/05/03/cve-2024-27322-should-never-have-been-assigned-and-r-data-files-are-still-super-risky-even-in-r-4-4-0/ |
|29| [CVE-2024-23081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23081) and [CVE-2024-23082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23082) | [LLMISP](https://github.com/LLMISP/LLMISP/issues/1), [LLM4IG](https://gist.github.com/llm4ig) | https://www.threeten.org/threetenbp/security.html
https://github.com/ThreeTen/threetenbp/issues/191
https://gist.github.com/LLM4IG/3cc9183dcd887020368a0bafeafec5e3
https://gist.github.com/LLM4IG/d2618f5f4e5ac37eb75cff5617e58b90 |
|30| [CVE-2019-8341](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8341) | [JameelNabbo](https://github.com/JameelNabbo) | https://bugzilla.redhat.com/show_bug.cgi?id=1677653#c4 |
+|31| [CVE-2023-42282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42282) | [cosmosofcyberspace](https://github.com/cosmosofcyberspace) | https://github.com/indutny/node-ip/pull/138#issuecomment-1938010731
https://github.com/github/advisory-database/pull/3504#issuecomment-2189530624 |
## Why do people do this?