{
    "bomFormat": "CycloneDX",
    "specVersion": "1.5",
    "serialNumber": "urn:uuid:493e5f23-5c3b-45ba-a931-cda115442d70",
    "version": 1,
    "metadata": {
        "timestamp": "2025-01-16T00:00:00Z",
        "authors": [
            {
                "name": "Connext Security Team",
                "email": "security@rti.com"
            }
        ],
        "component": {
            "type": "framework",
            "bom-ref": "Connext Pro",
            "supplier": {
                "name": "Real-Time Innovations, Inc. (RTI)",
                "url": [
                    "https://www.rti.com"
                ]
            },
            "name": "Connext Professional",
            "version": "7.3.0.7"
        },
        "properties": [
            {
                "name": "last_updated",
                "value": "2025-05-12T22:22:45Z"
            }
        ]
    },
    "vulnerabilities": [
        {
            "bom-ref": "CVE-2022-33099",
            "id": "CVE-2022-33099",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33099"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-33099&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-33099&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                787
            ],
            "description": "An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.",
            "published": "2022-07-01T12:15:08Z",
            "updated": "2024-11-21T07:07:32Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2022-10-05T13:24:28.660000Z",
                "lastUpdated": "2022-10-19T11:20:02.434000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-32"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-230272"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-28805",
            "id": "CVE-2022-28805",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28805"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-28805&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H&version=3.1"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-28805&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:P)&version=2"
                    },
                    "score": 6.4,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:P"
                }
            ],
            "cwes": [
                125
            ],
            "description": "singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.",
            "published": "2022-04-08T06:15:07Z",
            "updated": "2024-11-21T06:57:57Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The code path that leads to the vulnerability is not reachable in our usage of Lua.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-203400"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-44647",
            "id": "CVE-2021-44647",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44647"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44647&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44647&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                843
            ],
            "description": "Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.",
            "published": "2022-01-11T13:15:07Z",
            "updated": "2024-11-21T06:31:18Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-194232"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-43519",
            "id": "CVE-2021-43519",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43519&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43519&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                674
            ],
            "description": "Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.",
            "published": "2021-11-09T13:15:08Z",
            "updated": "2024-11-21T06:29:20Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The impacted code is not reachable in the product",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-189532"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-3520",
            "id": "CVE-2021-3520",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-3520&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-3520&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                190,
                787
            ],
            "description": "There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.",
            "published": "2021-06-02T13:15:13Z",
            "updated": "2024-11-21T06:21:44Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "response": [
                    "update"
                ],
                "detail": "We never pass an outputSize < 0 (see fix under https://github.com/lz4/lz4/pull/972/commits/8301a21773ef61656225e264f4f06ae14462bca7) . We always sanitize the passed outputSize parameter in all current usages.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-177195"
                }
            ]
        },
        {
            "bom-ref": "CVE-2012-2657",
            "id": "CVE-2012-2657",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2657"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2012-2657&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "Buffer overflow in the SQLDriverConnect function in unixODBC 2.0.10, 2.3.1, and earlier allows local users to cause a denial of service (crash) via a long string in the FILEDSN option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.",
            "published": "2012-08-31T18:55:00Z",
            "updated": "2024-11-21T01:39:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-169235"
                }
            ]
        },
        {
            "bom-ref": "CVE-2018-7409",
            "id": "CVE-2018-7409",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7409"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-7409&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv3",
                    "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-7409&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.",
            "published": "2018-02-22T18:29:00Z",
            "updated": "2024-11-21T04:12:05Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-148319"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24371",
            "id": "CVE-2020-24371",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24371"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24371&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24371&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                763
            ],
            "description": "lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.",
            "published": "2020-08-17T17:15:13Z",
            "updated": "2024-11-21T05:14:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-142250"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-46908",
            "id": "CVE-2022-46908",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46908"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-46908&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L&version=3.1"
                    },
                    "score": 7.3,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
                }
            ],
            "description": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.",
            "published": "2022-12-12T06:15:10Z",
            "updated": "2024-11-21T07:31:17Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since Connext does not use sqlite3 shell.",
                "firstIssued": "2023-01-09T13:10:29.483000Z",
                "lastUpdated": "2023-02-06T16:18:39.398000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-53"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-263479"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-37434",
            "id": "CVE-2022-37434",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-37434&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
            "published": "2022-08-05T07:15:07Z",
            "updated": "2024-11-21T07:14:59Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since we are not using inflateGetHeader function from the zlib library.",
                "firstIssued": "2023-04-26T13:47:24.750000Z",
                "lastUpdated": "2023-06-26T14:05:02.317000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-81"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-248499"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-45985",
            "id": "CVE-2021-45985",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45985"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-45985&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.",
            "published": "2023-04-10T09:15:07Z",
            "updated": "2024-11-21T06:33:25Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-04-20T20:18:32.307000Z",
                "lastUpdated": "2023-07-17T10:50:34.215000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-95"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-513829"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-1255",
            "id": "CVE-2023-1255",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1255"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-1255&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                125
            ],
            "description": "Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\nplatform contains a bug that could cause it to read past the input buffer,\nleading to a crash.\n\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\nused for disk encryption.\n\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\nbuffer is unmapped, this will trigger a crash which results in a denial of\nservice.\n\nIf an attacker can control the size and location of the ciphertext buffer\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\napplication is affected. This is fairly unlikely making this issue\na Low severity one.",
            "published": "2023-04-20T17:15:06Z",
            "updated": "2024-11-21T07:38:46Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since Connext does not use AES-XTS.",
                "firstIssued": "2023-05-26T15:46:06.203000Z",
                "lastUpdated": "2023-07-17T10:50:04.377000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-104"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-519119"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-35116",
            "id": "CVE-2023-35116",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-35116&vector=AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 4.7,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                770
            ],
            "description": "jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.",
            "published": "2023-06-14T14:15:10Z",
            "updated": "2024-11-21T08:07:58Z",
            "rejected": "2024-11-21T08:07:58Z",
            "analysis": {
                "state": "false_positive",
                "firstIssued": "2024-03-07T18:02:19.418000Z",
                "lastUpdated": "2024-03-07T18:02:19.438000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-117"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-522015"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-36191",
            "id": "CVE-2023-36191",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36191"
            },
            "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
            "published": "2023-06-23T02:15:09Z",
            "updated": "2023-11-07T04:16:25Z",
            "rejected": "2023-09-12T16:15:09Z",
            "analysis": {
                "state": "false_positive",
                "firstIssued": "2024-03-07T17:59:08.936000Z",
                "lastUpdated": "2024-03-07T17:59:08.968000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-124"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-522458"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-3817",
            "id": "CVE-2023-3817",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3817"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-3817&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                606,
                834
            ],
            "description": "Issue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
            "published": "2023-07-31T16:15:10Z",
            "updated": "2024-11-21T08:18:08Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since it does no calls to DH_check(), DH_check_ex(), or EVP_PKEY_param_check().",
                "firstIssued": "2023-08-07T14:41:15.985000Z",
                "lastUpdated": "2024-01-23T22:02:03.336000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-128"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-526983"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-45322",
            "id": "CVE-2023-45322",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45322"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-45322&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 6.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                416
            ],
            "description": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is \"I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail.\"",
            "published": "2023-10-06T22:15:11Z",
            "updated": "2024-11-21T08:26:44Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use xmllint.",
                "firstIssued": "2024-01-16T11:11:02.831000Z",
                "lastUpdated": "2024-02-26T11:29:59.604000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-156"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-533094"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-5678",
            "id": "CVE-2023-5678",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5678"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-5678&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                606,
                754
            ],
            "description": "Issue summary: Generating excessively long X9.42 DH keys or checking\nexcessively long X9.42 DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_generate_key() to\ngenerate an X9.42 DH key may experience long delays.  Likewise, applications\nthat use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()\nto check an X9.42 DH key or X9.42 DH parameters may experience long delays.\nWhere the key or parameters that are being checked have been obtained from\nan untrusted source this may lead to a Denial of Service.\n\nWhile DH_check() performs all the necessary checks (as of CVE-2023-3817),\nDH_check_pub_key() doesn't make any of these checks, and is therefore\nvulnerable for excessively large P and Q parameters.\n\nLikewise, while DH_generate_key() performs a check for an excessively large\nP, it doesn't check for an excessively large Q.\n\nAn application that calls DH_generate_key() or DH_check_pub_key() and\nsupplies a key or parameters obtained from an untrusted source could be\nvulnerable to a Denial of Service attack.\n\nDH_generate_key() and DH_check_pub_key() are also called by a number of\nother OpenSSL functions.  An application calling any of those other\nfunctions may similarly be affected.  The other functions affected by this\nare DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().\n\nAlso vulnerable are the OpenSSL pkey command line application when using the\n\"-pubcheck\" option, as well as the OpenSSL genpkey command line application.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
            "published": "2023-11-06T16:15:42Z",
            "updated": "2024-11-21T08:42:15Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_by_mitigating_control",
                "detail": "Connext is not affected since the only affected function it calls is EVP_PKEY_public_check() and only with trusted data.",
                "firstIssued": "2023-11-20T22:04:59.046000Z",
                "lastUpdated": "2024-02-27T15:06:42.981000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-159"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-535172"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-6378",
            "id": "CVE-2023-6378",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6378"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-6378&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 7.1,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                502
            ],
            "description": "A serialization vulnerability in logback receiver component part of \nlogback version 1.4.11 allows an attacker to mount a Denial-Of-Service \nattack by sending poisoned data.\n\n",
            "published": "2023-11-29T12:15:07Z",
            "updated": "2024-11-29T12:15:06Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted logback functionality.",
                "firstIssued": "2024-02-16T11:07:50.937000Z",
                "lastUpdated": "2024-02-20T14:48:09.733000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-172"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-539985"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-7104",
            "id": "CVE-2023-7104",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7104"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-7104&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L&version=3.1"
                    },
                    "score": 7.3,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                },
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                },
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 5.2,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:A/AC:L/Au:S/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                119,
                122
            ],
            "description": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
            "published": "2023-12-29T10:15:13Z",
            "updated": "2024-11-21T08:45:17Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_by_compiler",
                "detail": "Connext build does not enable SQLITE_ENABLE_SESSION and SQLITE_ENABLE_PREUPDATE_HOOK compiler defines.",
                "firstIssued": "2024-01-19T17:17:19.584000Z",
                "lastUpdated": "2024-02-26T11:30:00.307000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-178"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-587972"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-6129",
            "id": "CVE-2023-6129",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6129"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-6129&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H&version=3.1"
                    },
                    "score": 6.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
                }
            ],
            "cwes": [
                440,
                787
            ],
            "description": "Issue summary: The POLY1305 MAC (message authentication code) implementation\ncontains a bug that might corrupt the internal state of applications running\non PowerPC CPU based platforms if the CPU provides vector instructions.\n\nImpact summary: If an attacker can influence whether the POLY1305 MAC\nalgorithm is used, the application state might be corrupted with various\napplication dependent consequences.\n\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL for\nPowerPC CPUs restores the contents of vector registers in a different order\nthan they are saved. Thus the contents of some of these vector registers\nare corrupted when returning to the caller. The vulnerable code is used only\non newer PowerPC processors supporting the PowerISA 2.07 instructions.\n\nThe consequences of this kind of internal application state corruption can\nbe various - from no consequences, if the calling application does not\ndepend on the contents of non-volatile XMM registers at all, to the worst\nconsequences, where the attacker could get complete control of the application\nprocess. However unless the compiler uses the vector registers for storing\npointers, the most likely consequence, if any, would be an incorrect result\nof some application dependent calculations or a crash leading to a denial of\nservice.\n\nThe POLY1305 MAC algorithm is most frequently used as part of the\nCHACHA20-POLY1305 AEAD (authenticated encryption with associated data)\nalgorithm. The most common usage of this AEAD cipher is with TLS protocol\nversions 1.2 and 1.3. If this cipher is enabled on the server a malicious\nclient can influence whether this AEAD cipher is used. This implies that\nTLS server applications using OpenSSL can be potentially impacted. However\nwe are currently not aware of any concrete application that would be affected\nby this issue therefore we consider this a Low severity security issue.",
            "published": "2024-01-09T17:15:12Z",
            "updated": "2024-11-21T08:43:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since Connext does not use POLY1305 MAC.",
                "firstIssued": "2024-01-16T16:49:22.681000Z",
                "lastUpdated": "2024-01-16T16:49:22.711000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-179"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-588277"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-0727",
            "id": "CVE-2024-0727",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0727"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2024-0727&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                476
            ],
            "description": "Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL\nto crash leading to a potential Denial of Service attack\n\nImpact summary: Applications loading files in the PKCS12 format from untrusted\nsources might terminate abruptly.\n\nA file in PKCS12 format can contain certificates and keys and may come from an\nuntrusted source. The PKCS12 specification allows certain fields to be NULL, but\nOpenSSL does not correctly check for this case. This can lead to a NULL pointer\ndereference that results in OpenSSL crashing. If an application processes PKCS12\nfiles from an untrusted source using the OpenSSL APIs then that application will\nbe vulnerable to this issue.\n\nOpenSSL APIs that are vulnerable to this are: PKCS12_parse(),\nPKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()\nand PKCS12_newpass().\n\nWe have also fixed a similar issue in SMIME_write_PKCS7(). However since this\nfunction is related to writing data we do not consider it security significant.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.",
            "published": "2024-01-26T09:15:07Z",
            "updated": "2024-11-21T08:47:13Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not call any of the impacted APIs.",
                "firstIssued": "2024-02-09T16:39:57.344000Z",
                "lastUpdated": "2024-02-26T11:30:00.092000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-182"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-589512"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-20918",
            "id": "CVE-2024-20918",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20918"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 7.4,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and  22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
            "published": "2024-01-16T22:15:39Z",
            "updated": "2024-11-21T08:53:25Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-03-07T17:47:32.489000Z",
                "lastUpdated": "2024-03-08T10:49:07.404000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-183"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-589164"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-25062",
            "id": "CVE-2024-25062",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2024-25062&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                416
            ],
            "description": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
            "published": "2024-02-04T16:15:45Z",
            "updated": "2024-11-21T09:00:10Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the XML Reader interface with DTD validation.",
                "firstIssued": "2024-03-07T17:45:22.428000Z",
                "lastUpdated": "2024-05-30T13:45:36.582000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-185"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-590010"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-45146",
            "id": "CVE-2022-45146",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45146"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-45146&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                416
            ],
            "description": "An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11.",
            "published": "2022-11-21T10:15:31Z",
            "updated": "2024-11-21T07:28:50Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-02-16T11:19:00.211000Z",
                "lastUpdated": "2024-02-16T13:43:30.704000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-194"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-590572"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-0853",
            "id": "CVE-2024-0853",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0853"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2024-0853&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                295
            ],
            "description": "curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to\nthe same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.",
            "published": "2024-02-03T14:15:50Z",
            "updated": "2024-11-21T08:47:30Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-03-07T17:43:59.298000Z",
                "lastUpdated": "2024-04-02T08:32:38.621000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-195"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-590697"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-23088",
            "id": "CVE-2023-23088",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23088"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-23088&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function.",
            "published": "2023-02-03T18:15:17Z",
            "updated": "2024-11-21T07:45:51Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "We don't use Barenboim json-parser in our code base. The code impacted code is not present in our codebase.",
                "firstIssued": "2024-05-03T14:43:35.976000Z",
                "lastUpdated": "2024-07-31T21:16:11.149000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-200"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-593528"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-45853",
            "id": "CVE-2023-45853",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45853"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-45853&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2023/45xxx/CVE-2023-45853.json"
                    },
                    "score": 8.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                190
            ],
            "description": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.",
            "published": "2023-10-14T02:15:09Z",
            "updated": "2024-12-20T17:41:31Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "No. The affected code is https://github.com/madler/zlib/blob/develop/contrib/minizip/zip.c#L1016C20-L1016C43 . We do not use MiniZip in our code. There is no `contrib` or `minizip` folder in our codebase.",
                "firstIssued": "2024-03-05T13:34:45.109000Z",
                "lastUpdated": "2024-07-31T08:52:59.634000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-202"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-533513"
                }
            ]
        },
        {
            "bom-ref": "CVE-2011-1145",
            "id": "CVE-2011-1145",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1145"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2011-1145&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 7.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2011-1145&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 4.6,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                120
            ],
            "description": "The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.",
            "published": "2019-11-14T02:15:10Z",
            "updated": "2024-11-21T01:25:39Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not call the impacted APIs",
                "firstIssued": "2024-06-12T13:10:44.519000Z",
                "lastUpdated": "2024-08-05T11:53:38.915000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-203"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-593529"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-29857",
            "id": "CVE-2024-29857",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/29xxx/CVE-2024-29857.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                125
            ],
            "description": "An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.",
            "published": "2024-05-14T15:17:02Z",
            "updated": "2024-12-06T14:15:20Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601221"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-30171",
            "id": "CVE-2024-30171",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30171.json"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                203
            ],
            "description": "An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.",
            "published": "2024-05-14T15:21:52Z",
            "updated": "2024-11-21T09:11:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601225"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-30172",
            "id": "CVE-2024-30172",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30172.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "description": "An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.",
            "published": "2024-05-14T15:21:53Z",
            "updated": "2024-11-21T09:11:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601227"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-4603",
            "id": "CVE-2024-4603",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4603"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/4xxx/CVE-2024-4603.json"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                606,
                834
            ],
            "description": "Issue summary: Checking excessively long DSA keys or parameters may be very\nslow.\n\nImpact summary: Applications that use the functions EVP_PKEY_param_check()\nor EVP_PKEY_public_check() to check a DSA public key or DSA parameters may\nexperience long delays. Where the key or parameters that are being checked\nhave been obtained from an untrusted source this may lead to a Denial of\nService.\n\nThe functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform\nvarious checks on DSA parameters. Some of those computations take a long time\nif the modulus (`p` parameter) is too large.\n\nTrying to use a very large modulus is slow and OpenSSL will not allow using\npublic keys with a modulus which is over 10,000 bits in length for signature\nverification. However the key and parameter check functions do not limit\nthe modulus size when performing the checks.\n\nAn application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()\nand supplies a key or parameters obtained from an untrusted source could be\nvulnerable to a Denial of Service attack.\n\nThese functions are not called by OpenSSL itself on untrusted DSA keys so\nonly applications that directly call these functions may be vulnerable.\n\nAlso vulnerable are the OpenSSL pkey and pkeyparam command line applications\nwhen using the `-check` option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
            "published": "2024-05-16T16:15:10Z",
            "updated": "2024-11-21T09:43:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not call any of the impacted APIs.",
                "firstIssued": "2024-05-24T12:56:35.178000Z",
                "lastUpdated": "2024-07-31T08:51:33.617000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-226"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-602111"
                }
            ]
        },
        {
            "bom-ref": "GHSA-qw6h-vgh9-j6wx",
            "id": "GHSA-qw6h-vgh9-j6wx",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-qw6h-vgh9-j6wx"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-qw6h-vgh9-j6wx"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "express vulnerable to XSS via response.redirect()",
            "published": "2024-09-10T19:41:04Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because we don't call redirect, which is the problematic function, anywhere in System Designer code.",
                "firstIssued": "2024-09-25T23:42:59.291000Z",
                "lastUpdated": "2024-11-20T14:42:48.179000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-263"
                }
            ]
        },
        {
            "bom-ref": "GHSA-pxg6-pf52-xh8x",
            "id": "GHSA-pxg6-pf52-xh8x",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x"
                    },
                    "severity": "low"
                }
            ],
            "cwes": [
                74
            ],
            "description": "cookie accepts cookie name, path, and domain with out of bounds characters",
            "published": "2024-10-04T20:31:00Z",
            "updated": "2024-10-04T20:31:01Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-10-07T14:46:49.363000Z",
                "lastUpdated": "2024-10-29T13:42:12.608000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-267"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-47554",
            "id": "CVE-2024-47554",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/47xxx/CVE-2024-47554.json"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                400
            ],
            "description": "Uncontrolled Resource Consumption vulnerability in Apache Commons IO.\n\nThe org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.\n\n\nThis issue affects Apache Commons IO: from 2.0 before 2.14.0.\n\nUsers are recommended to upgrade to version 2.14.0 or later, which fixes the issue.",
            "published": "2024-10-03T12:15:02Z",
            "updated": "2024-12-04T15:15:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-11-25T12:06:41.884000Z",
                "lastUpdated": "2024-11-27T15:37:49.870000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-277"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-645644"
                }
            ]
        },
        {
            "bom-ref": "GHSA-rhx6-c78j-4q9w",
            "id": "GHSA-rhx6-c78j-4q9w",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-rhx6-c78j-4q9w"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-rhx6-c78j-4q9w"
                    },
                    "severity": "high"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Unpatched `path-to-regexp` ReDoS in 0.1.x",
            "published": "2024-12-05T22:40:47Z",
            "updated": "2025-01-24T21:41:09Z",
            "analysis": {
                "state": "not_affected",
                "detail": "Not affected since we don't use regex to match routes. Below are all the routes that we serve. In this web is shown an example of a problematic route ReDoS the web which we don't use at all in System Designer.",
                "firstIssued": "2024-12-19T10:22:00.760000Z",
                "lastUpdated": "2025-01-13T09:28:41.410000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-286"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-5535",
            "id": "CVE-2024-5535",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/5xxx/CVE-2024-5535.json"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                }
            ],
            "cwes": [
                200
            ],
            "description": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
            "published": "2024-06-27T11:15:24Z",
            "updated": "2024-11-21T09:47:53Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since it does no calls to SSL_select_next_proto().",
                "firstIssued": "2025-01-16T00:58:00Z",
                "lastUpdated": "2025-01-21T00:37:00Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-292"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-666472"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-6119",
            "id": "CVE-2024-6119",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6119"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/6xxx/CVE-2024-6119.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                843
            ],
            "description": "Issue summary: Applications performing certificate name checks (e.g., TLS\nclients checking server certificates) may attempt to read an invalid memory\naddress resulting in abnormal termination of the application process.\n\nImpact summary: Abnormal termination of an application can a cause a denial of\nservice.\n\nApplications performing certificate name checks (e.g., TLS clients checking\nserver certificates) may attempt to read an invalid memory address when\ncomparing the expected name with an `otherName` subject alternative name of an\nX.509 certificate. This may result in an exception that terminates the\napplication program.\n\nNote that basic certificate chain validation (signatures, dates, ...) is not\naffected, the denial of service can occur only when the application also\nspecifies an expected DNS name, Email address or IP address.\n\nTLS servers rarely solicit client certificates, and even when they do, they\ngenerally don't perform a name check against a reference identifier (expected\nidentity), but rather extract the presented identity after checking the\ncertificate chain.  So TLS servers are generally not affected and the severity\nof the issue is Moderate.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
            "published": "2024-09-03T16:15:07Z",
            "updated": "2024-11-21T09:49:00Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since it does no calls to do_x509_check() and does not compare a subject name with an expected subject name.",
                "firstIssued": "2025-01-16T00:58:00Z",
                "lastUpdated": "2025-01-21T00:37:00Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-292"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-666473"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-9143",
            "id": "CVE-2024-9143",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9143"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/9xxx/CVE-2024-9143.json"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                787
            ],
            "description": "Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted\nexplicit values for the field polynomial can lead to out-of-bounds memory reads\nor writes.\n\nImpact summary: Out of bound memory writes can lead to an application crash or\neven a possibility of a remote code execution, however, in all the protocols\ninvolving Elliptic Curve Cryptography that we're aware of, either only \"named\ncurves\" are supported, or, if explicit curve parameters are supported, they\nspecify an X9.62 encoding of binary (GF(2^m)) curves that can't represent\nproblematic input values. Thus the likelihood of existence of a vulnerable\napplication is low.\n\nIn particular, the X9.62 encoding is used for ECC keys in X.509 certificates,\nso problematic inputs cannot occur in the context of processing X.509\ncertificates.  Any problematic use-cases would have to be using an \"exotic\"\ncurve encoding.\n\nThe affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),\nand various supporting BN_GF2m_*() functions.\n\nApplications working with \"exotic\" explicit binary (GF(2^m)) curve parameters,\nthat make it possible to represent invalid field polynomials with a zero\nconstant term, via the above or similar APIs, may terminate abruptly as a\nresult of reading or writing outside of array bounds.  Remote code execution\ncannot easily be ruled out.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
            "published": "2024-10-16T17:15:18Z",
            "updated": "2024-11-21T09:54:04Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since it does no calls to any of the affected APIs.",
                "firstIssued": "2025-01-16T00:58:00Z",
                "lastUpdated": "2025-01-21T00:37:00Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-292"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-666479"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-9681",
            "id": "CVE-2024-9681",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9681"
            },
            "ratings": [
                {
                    "source": {
                        "name": "nvd.nist.gov",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2024-9681&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L&version=3.1"
                    },
                    "score": 6.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L"
                },
                {
                    "source": {
                        "name": "cisa.gov",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/9xxx/CVE-2024-9681.json"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                }
            ],
            "cwes": [
                697
            ],
            "description": "When curl is asked to use HSTS, the expiry time for a subdomain might\noverwrite a parent domain's cache entry, making it end sooner or later than\notherwise intended.\n\nThis affects curl using applications that enable HSTS and use URLs with the\ninsecure `HTTP://` scheme and perform transfers with hosts like\n`x.example.com` as well as `example.com` where the first host is a subdomain\nof the second host.\n\n(The HSTS cache either needs to have been populated manually or there needs to\nhave been previous HTTPS accesses done as the cache needs to have entries for\nthe domains involved to trigger this problem.)\n\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\nbug can make the subdomain's expiry timeout *bleed over* and get set for the\nparent domain `example.com` in curl's HSTS cache.\n\nThe result of a triggered bug is that HTTP accesses to `example.com` get\nconverted to HTTPS for a different period of time than what was asked for by\nthe origin server. If `example.com` for example stops supporting HTTPS at its\nexpiry time, curl might then fail to access `http://example.com` until the\n(wrongly set) timeout expires. This bug can also expire the parent's entry\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\nthan otherwise intended.",
            "published": "2024-11-06T08:15:03Z",
            "updated": "2024-12-13T14:15:22Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "RTI Observability Collector Service depends on Curl through OpenTelemetry, and OpenTelemetry has no option for configuring HSTS",
                "firstIssued": "2025-01-24T12:56:08Z",
                "lastUpdated": "2025-01-24T12:56:08Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-283"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-655351"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-15888",
            "id": "CVE-2020-15888",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15888"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-15888&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 8.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-15888&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 6.8,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                125,
                416,
                787
            ],
            "description": "Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.",
            "published": "2020-07-21T22:15:12Z",
            "updated": "2024-11-21T05:06:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-146893"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-15889",
            "id": "CVE-2020-15889",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15889"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-15889&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-15889&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                125
            ],
            "description": "Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.",
            "published": "2020-07-21T22:15:12Z",
            "updated": "2024-11-21T05:06:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-149253"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24342",
            "id": "CVE-2020-24342",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24342"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24342&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 7.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24342&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 6.8,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.",
            "published": "2020-08-13T19:15:13Z",
            "updated": "2024-11-21T05:14:37Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-157766"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24369",
            "id": "CVE-2020-24369",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24369"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24369&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24369&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                476
            ],
            "description": "ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.",
            "published": "2020-08-17T17:15:13Z",
            "updated": "2024-11-21T05:14:40Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-146890"
                }
            ]
        }
    ]
}