{
    "bomFormat": "CycloneDX",
    "specVersion": "1.5",
    "serialNumber": "urn:uuid:493e5f23-5c3b-45ba-a931-cda115442d70",
    "version": 1,
    "metadata": {
        "timestamp": "2025-01-16T00:00:00Z",
        "authors": [
            {
                "name": "Connext Security Team",
                "email": "security@rti.com"
            }
        ],
        "component": {
            "type": "framework",
            "bom-ref": "Connext Pro",
            "supplier": {
                "name": "Real-Time Innovations, Inc. (RTI)",
                "url": [
                    "https://www.rti.com"
                ]
            },
            "name": "Connext Professional",
            "version": "7.3.1.0"
        },
        "properties": [
            {
                "name": "last_updated",
                "value": "2025-10-16T09:58:08Z"
            }
        ]
    },
    "vulnerabilities": [
        {
            "bom-ref": "CVE-2022-33099",
            "id": "CVE-2022-33099",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33099"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-33099&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-33099&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                787
            ],
            "description": "An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.",
            "published": "2022-07-01T12:15:08Z",
            "updated": "2024-11-21T07:07:32Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2022-10-05T13:24:28.660000Z",
                "lastUpdated": "2022-10-19T11:20:02.434000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-32"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-230272"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-28805",
            "id": "CVE-2022-28805",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28805"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-28805&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H&version=3.1"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-28805&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:P)&version=2"
                    },
                    "score": 6.4,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:P"
                }
            ],
            "cwes": [
                125
            ],
            "description": "singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.",
            "published": "2022-04-08T06:15:07Z",
            "updated": "2024-11-21T06:57:57Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The code path that leads to the vulnerability is not reachable in our usage of Lua.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-203400"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-44647",
            "id": "CVE-2021-44647",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44647"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44647&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44647&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                843
            ],
            "description": "Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.",
            "published": "2022-01-11T13:15:07Z",
            "updated": "2024-11-21T06:31:18Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-194232"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-43519",
            "id": "CVE-2021-43519",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43519&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43519&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                674
            ],
            "description": "Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.",
            "published": "2021-11-09T13:15:08Z",
            "updated": "2024-11-21T06:29:20Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The impacted code is not reachable in the product",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-189532"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-3520",
            "id": "CVE-2021-3520",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-3520&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-3520&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                190,
                787
            ],
            "description": "There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.",
            "published": "2021-06-02T13:15:13Z",
            "updated": "2024-11-21T06:21:44Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "response": [
                    "update"
                ],
                "detail": "We never pass an outputSize < 0 (see fix under https://github.com/lz4/lz4/pull/972/commits/8301a21773ef61656225e264f4f06ae14462bca7) . We always sanitize the passed outputSize parameter in all current usages.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-177195"
                }
            ]
        },
        {
            "bom-ref": "CVE-2012-2657",
            "id": "CVE-2012-2657",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2657"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2012-2657&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "Buffer overflow in the SQLDriverConnect function in unixODBC 2.0.10, 2.3.1, and earlier allows local users to cause a denial of service (crash) via a long string in the FILEDSN option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.",
            "published": "2012-08-31T18:55:00Z",
            "updated": "2024-11-21T01:39:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-169235"
                }
            ]
        },
        {
            "bom-ref": "CVE-2018-7409",
            "id": "CVE-2018-7409",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7409"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-7409&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv3",
                    "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-7409&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.",
            "published": "2018-02-22T18:29:00Z",
            "updated": "2024-11-21T04:12:05Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-148319"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24370",
            "id": "CVE-2020-24370",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24370"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24370&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24370&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                191
            ],
            "description": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).",
            "published": "2020-08-17T17:15:13Z",
            "updated": "2024-11-21T05:14:41Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-146889"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24371",
            "id": "CVE-2020-24371",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24371"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24371&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24371&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                763
            ],
            "description": "lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.",
            "published": "2020-08-17T17:15:13Z",
            "updated": "2024-11-21T05:14:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-142250"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-37434",
            "id": "CVE-2022-37434",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-37434&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
            "published": "2022-08-05T07:15:07Z",
            "updated": "2024-11-21T07:14:59Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since we are not using inflateGetHeader function from the zlib library.",
                "firstIssued": "2023-04-26T13:47:24.750000Z",
                "lastUpdated": "2023-06-26T14:05:02.317000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-81"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-248499"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-45985",
            "id": "CVE-2021-45985",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45985"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-45985&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.",
            "published": "2023-04-10T09:15:07Z",
            "updated": "2024-11-21T06:33:25Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-04-20T20:18:32.307000Z",
                "lastUpdated": "2023-07-17T10:50:34.215000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-95"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-513829"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-21618",
            "id": "CVE-2022-21618",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21618"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
            "published": "2022-10-18T21:15:12Z",
            "updated": "2024-11-21T06:45:05Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-06-07T20:09:43.509000Z",
                "lastUpdated": "2023-07-17T10:50:17.286000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-102"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-21624",
            "id": "CVE-2022-21624",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21624"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
            "published": "2022-10-18T21:15:13Z",
            "updated": "2024-11-21T06:45:05Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-06-07T20:09:43.509000Z",
                "lastUpdated": "2023-07-17T10:50:17.286000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-102"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-21626",
            "id": "CVE-2022-21626",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21626"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "published": "2022-10-18T21:15:13Z",
            "updated": "2024-11-21T06:45:06Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-06-07T20:09:43.509000Z",
                "lastUpdated": "2023-07-17T10:50:17.286000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-102"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-35116",
            "id": "CVE-2023-35116",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-35116&vector=AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 4.7,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                770
            ],
            "description": "jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.",
            "published": "2023-06-14T14:15:10Z",
            "updated": "2024-11-21T08:07:58Z",
            "rejected": "2024-11-21T08:07:58Z",
            "analysis": {
                "state": "false_positive",
                "firstIssued": "2024-03-07T18:02:19.418000Z",
                "lastUpdated": "2024-03-07T18:02:19.438000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-117"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-522015"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-45322",
            "id": "CVE-2023-45322",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45322"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-45322&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 6.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                416
            ],
            "description": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is \"I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail.\"",
            "published": "2023-10-06T22:15:11Z",
            "updated": "2024-11-21T08:26:44Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use xmllint.",
                "firstIssued": "2024-01-16T11:11:02.831000Z",
                "lastUpdated": "2024-02-26T11:29:59.604000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-156"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-533094"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-6378",
            "id": "CVE-2023-6378",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6378"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-6378&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 7.1,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                502
            ],
            "description": "A serialization vulnerability in logback receiver component part of \nlogback version 1.4.11 allows an attacker to mount a Denial-Of-Service \nattack by sending poisoned data.\n\n",
            "published": "2023-11-29T12:15:07Z",
            "updated": "2024-11-29T12:15:06Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted logback functionality.",
                "firstIssued": "2024-02-16T11:07:50.937000Z",
                "lastUpdated": "2024-02-20T14:48:09.733000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-172"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-539985"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-25062",
            "id": "CVE-2024-25062",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2024-25062&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                416
            ],
            "description": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
            "published": "2024-02-04T16:15:45Z",
            "updated": "2024-11-21T09:00:10Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the XML Reader interface with DTD validation.",
                "firstIssued": "2024-03-07T17:45:22.428000Z",
                "lastUpdated": "2024-05-30T13:45:36.582000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-185"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-590010"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-23088",
            "id": "CVE-2023-23088",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23088"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-23088&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function.",
            "published": "2023-02-03T18:15:17Z",
            "updated": "2024-11-21T07:45:51Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "We don't use Barenboim json-parser in our code base. The code impacted code is not present in our codebase.",
                "firstIssued": "2024-05-03T14:43:35.976000Z",
                "lastUpdated": "2024-07-31T21:16:11.149000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-200"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-593528"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-45853",
            "id": "CVE-2023-45853",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45853"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-45853&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2023/45xxx/CVE-2023-45853.json"
                    },
                    "score": 8.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                190
            ],
            "description": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.",
            "published": "2023-10-14T02:15:09Z",
            "updated": "2024-12-20T17:41:31Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "No. The affected code is https://github.com/madler/zlib/blob/develop/contrib/minizip/zip.c#L1016C20-L1016C43 . We do not use MiniZip in our code. There is no `contrib` or `minizip` folder in our codebase.",
                "firstIssued": "2024-03-05T13:34:45.109000Z",
                "lastUpdated": "2024-07-31T08:52:59.634000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-202"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-533513"
                }
            ]
        },
        {
            "bom-ref": "CVE-2011-1145",
            "id": "CVE-2011-1145",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1145"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2011-1145&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 7.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2011-1145&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 4.6,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                120
            ],
            "description": "The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.",
            "published": "2019-11-14T02:15:10Z",
            "updated": "2024-11-21T01:25:39Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not call the impacted APIs",
                "firstIssued": "2024-06-12T13:10:44.519000Z",
                "lastUpdated": "2024-08-05T11:53:38.915000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-203"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-593529"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-29857",
            "id": "CVE-2024-29857",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/29xxx/CVE-2024-29857.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                125
            ],
            "description": "An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.",
            "published": "2024-05-14T15:17:02Z",
            "updated": "2024-12-06T14:15:20Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601221"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-30171",
            "id": "CVE-2024-30171",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30171.json"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                203
            ],
            "description": "An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.",
            "published": "2024-05-14T15:21:52Z",
            "updated": "2024-11-21T09:11:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601225"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-30172",
            "id": "CVE-2024-30172",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30172.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "description": "An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.",
            "published": "2024-05-14T15:21:53Z",
            "updated": "2024-11-21T09:11:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601227"
                }
            ]
        },
        {
            "bom-ref": "GHSA-952p-6rrq-rcjv",
            "id": "GHSA-952p-6rrq-rcjv",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-952p-6rrq-rcjv"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-952p-6rrq-rcjv"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Regular Expression Denial of Service (ReDoS) in micromatch",
            "published": "2024-05-14T18:30:54Z",
            "updated": "2024-08-28T13:12:27Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected. micromatch is only a transitive dependency used by jest to run System Designer's tests.",
                "firstIssued": "2024-08-22T14:10:41.664000Z",
                "lastUpdated": "2024-11-20T10:36:35.304000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-251"
                }
            ]
        },
        {
            "bom-ref": "GHSA-9wv6-86v2-598j",
            "id": "GHSA-9wv6-86v2-598j",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-9wv6-86v2-598j"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-9wv6-86v2-598j"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "path-to-regexp outputs backtracking regular expressions",
            "published": "2024-09-09T20:19:15Z",
            "updated": "2025-01-24T21:32:30Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_perimeter",
                "detail": "This vulnerability only impacts performance (server would run slower) when using unsafe regexes. Moreover, users would need to attack their own system designer server from localhost.",
                "firstIssued": "2024-09-10T11:08:20.860000Z",
                "lastUpdated": "2024-11-29T13:02:33.533000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-261"
                }
            ]
        },
        {
            "bom-ref": "GHSA-qw6h-vgh9-j6wx",
            "id": "GHSA-qw6h-vgh9-j6wx",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-qw6h-vgh9-j6wx"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-qw6h-vgh9-j6wx"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "express vulnerable to XSS via response.redirect()",
            "published": "2024-09-10T19:41:04Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because we don't call redirect, which is the problematic function, anywhere in System Designer code.",
                "firstIssued": "2024-09-25T23:42:59.291000Z",
                "lastUpdated": "2024-11-20T14:42:48.179000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-263"
                }
            ]
        },
        {
            "bom-ref": "GHSA-m6fv-jmcg-4jfg",
            "id": "GHSA-m6fv-jmcg-4jfg",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "send vulnerable to template injection that can lead to XSS",
            "published": "2024-09-10T19:42:41Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-09-25T23:44:20.931000Z",
                "lastUpdated": "2024-11-20T14:42:47.452000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-264"
                }
            ]
        },
        {
            "bom-ref": "GHSA-cm22-4g7w-348p",
            "id": "GHSA-cm22-4g7w-348p",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-cm22-4g7w-348p"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-cm22-4g7w-348p"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "serve-static vulnerable to template injection that can lead to XSS",
            "published": "2024-09-10T19:42:33Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-09-25T23:45:21.640000Z",
                "lastUpdated": "2024-11-20T14:42:47.798000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-265"
                }
            ]
        },
        {
            "bom-ref": "GHSA-pxg6-pf52-xh8x",
            "id": "GHSA-pxg6-pf52-xh8x",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x"
                    },
                    "severity": "low"
                }
            ],
            "cwes": [
                74
            ],
            "description": "cookie accepts cookie name, path, and domain with out of bounds characters",
            "published": "2024-10-04T20:31:00Z",
            "updated": "2024-10-04T20:31:01Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-10-07T14:46:49.363000Z",
                "lastUpdated": "2024-10-29T13:42:12.608000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-267"
                }
            ]
        },
        {
            "bom-ref": "GHSA-fc9h-whq2-v747",
            "id": "GHSA-fc9h-whq2-v747",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-fc9h-whq2-v747"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-fc9h-whq2-v747"
                    },
                    "score": 4.8,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                }
            ],
            "cwes": [
                347
            ],
            "description": "Valid ECDSA signatures erroneously rejected in Elliptic",
            "published": "2024-10-15T15:30:56Z",
            "updated": "2024-12-20T15:30:48Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-10-22T09:33:44.739000Z",
                "lastUpdated": "2024-10-29T13:42:14.246000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-272"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-47554",
            "id": "CVE-2024-47554",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/47xxx/CVE-2024-47554.json"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                400
            ],
            "description": "Uncontrolled Resource Consumption vulnerability in Apache Commons IO.\n\nThe org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.\n\n\nThis issue affects Apache Commons IO: from 2.0 before 2.14.0.\n\nUsers are recommended to upgrade to version 2.14.0 or later, which fixes the issue.",
            "published": "2024-10-03T12:15:02Z",
            "updated": "2024-12-04T15:15:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-11-25T12:06:41.884000Z",
                "lastUpdated": "2024-11-27T15:37:49.870000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-277"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-645644"
                }
            ]
        },
        {
            "bom-ref": "GHSA-rhx6-c78j-4q9w",
            "id": "GHSA-rhx6-c78j-4q9w",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-rhx6-c78j-4q9w"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-rhx6-c78j-4q9w"
                    },
                    "severity": "high"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Unpatched `path-to-regexp` ReDoS in 0.1.x",
            "published": "2024-12-05T22:40:47Z",
            "updated": "2025-01-24T21:41:09Z",
            "analysis": {
                "state": "not_affected",
                "detail": "Not affected since we don't use regex to match routes. Below are all the routes that we serve. In this web is shown an example of a problematic route ReDoS the web which we don't use at all in System Designer.",
                "firstIssued": "2024-12-19T10:22:00.760000Z",
                "lastUpdated": "2025-01-13T09:28:41.410000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-286"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-52426",
            "id": "CVE-2023-52426",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52426"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-52426&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                776
            ],
            "description": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.",
            "published": "2024-02-04T20:15:46Z",
            "updated": "2024-11-21T08:39:43Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_by_compiler",
                "detail": "We are not affected by this because we have been defining XML_DTD since Oct 2, 2017, before the release of expat 2.4.0 on May 23 2021, where this issue was remediated as CVE-2013-0340. We upgraded from expat 2.2.5 to expat 2.4.3 on Jan 28, 2022. This fix is only required for those who do not define XML_DTD.",
                "firstIssued": "2024-03-05T16:45:27.489000Z",
                "lastUpdated": "2024-07-31T18:43:11.860000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-201"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21217",
            "id": "CVE-2024-21217",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21217"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "published": "2024-10-15T20:15:11Z",
            "updated": "2024-10-18T18:29:36Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since we don't use Java Web Start or Applets in any of our products.",
                "firstIssued": "2025-02-05T17:13:28Z",
                "lastUpdated": "2025-02-05T17:13:28Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-303"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-646816"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21235",
            "id": "CVE-2024-21235",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21235"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 4.8,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23;   Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23;   Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
            "published": "2024-10-15T20:15:12Z",
            "updated": "2024-10-18T18:30:26Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since we don't use Java Web Start or Applets in any of our products.",
                "firstIssued": "2025-02-05T17:15:45Z",
                "lastUpdated": "2025-02-05T17:15:45Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-303"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-646818"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-27113",
            "id": "CVE-2025-27113",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27113"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2025-27113&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 2.9,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                476
            ],
            "description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.",
            "published": "2025-02-18T23:15:10Z",
            "updated": "2025-03-07T01:15:12Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Reviewed the fix implemented in the upstream repository. The developer indicates the affected codepath is only triggered by the Perl module, TclXML's retainpath option, and xmllint with certain parameters, so it does not affect our use of libxml2. Run tests for the xmlutils module, Routing Service, and Recording Service to validate we are indeed not reaching the affected code.",
                "firstIssued": "2025-03-07T09:33:18Z",
                "lastUpdated": "2025-03-12T16:36:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-313"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-673317"
                }
            ]
        },
        {
            "bom-ref": "GHSA-jr5f-v2jv-69x6",
            "id": "GHSA-jr5f-v2jv-69x6",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-jr5f-v2jv-69x6"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-jr5f-v2jv-69x6"
                    },
                    "severity": "high"
                }
            ],
            "cwes": [
                918
            ],
            "description": "axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL",
            "published": "2025-03-07T15:16:00Z",
            "updated": "2025-03-07T19:16:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because we don't use relative URLs. We always call axios with full URL and baseURL is never used in our code.",
                "firstIssued": "2025-03-14T13:09:55Z",
                "lastUpdated": "2025-03-14T13:09:55Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-319"
                }
            ]
        },
        {
            "bom-ref": "GHSA-968p-4wvh-cqc8",
            "id": "GHSA-968p-4wvh-cqc8",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-968p-4wvh-cqc8"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-968p-4wvh-cqc8"
                    },
                    "score": 6.2,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Babel has inefficient RexExp complexity in generated code with .replace when transpiling named capturing groups",
            "published": "2025-03-11T20:30:18Z",
            "updated": "2025-03-12T14:48:10Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Babel is a transitive dependency used by System Designer through Express. We don't use regex in the affected functionality. Furthermore, we are only serving a small amount of request coming from local host.",
                "firstIssued": "2025-04-14T11:26:18Z",
                "lastUpdated": "2025-04-14T11:26:18Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-320"
                }
            ]
        },
        {
            "bom-ref": "GHSA-pq67-2wwv-3xjx",
            "id": "GHSA-pq67-2wwv-3xjx",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                }
            ],
            "cwes": [
                22
            ],
            "description": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File",
            "published": "2025-03-27T18:31:28Z",
            "updated": "2025-03-28T22:11:43Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since we don't allow the upload of tar files in any way to the server. Apart from that tar-fs is only used by geckodriver, which is only used by the tests.",
                "firstIssued": "2025-04-24T14:09:56Z",
                "lastUpdated": "2025-04-24T14:09:56Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-333"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-56171",
            "id": "CVE-2024-56171",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56171"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 7.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                }
            ],
            "cwes": [
                416
            ],
            "description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.",
            "published": "2025-02-18T22:15:12Z",
            "updated": "2025-03-28T15:15:46Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "We do not validate XML documents against crafted untrusted XML Schemas (.xsd) and we do not make use of xsd:keyref. We have verified that we are not using the affected code paths running unit tests for xmlutils.1.0, router.1.0, and recorder.4.0.",
                "firstIssued": "2025-06-02T21:23:31Z",
                "lastUpdated": "2025-06-02T21:23:31Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-329"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-695895"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-32415",
            "id": "CVE-2025-32415",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32415"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2025-32415&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 2.9,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                125,
                1284
            ],
            "description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.",
            "published": "2025-04-17T17:15:33Z",
            "updated": "2025-04-23T18:17:52Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the functionality that triggers this vulnerability, namely the use of schemas that use xsd:keyref. Indeed, we have verified that we do not make use of xmlSchemaIDCFillNodeTablesrunning running the tests for xmlutils.1.0, router.1.0, and recorder.4.0.",
                "firstIssued": "2025-06-02T21:27:06Z",
                "lastUpdated": "2025-06-02T21:27:06Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-329"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-693996"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-32414",
            "id": "CVE-2025-32414",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2025-32414&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 5.6,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                252,
                393
            ],
            "description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.",
            "published": "2025-04-08T03:15:15Z",
            "updated": "2025-04-23T19:09:35Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Connext does not use the libxml2 Python API. Therefore, our wrappers do not call the affected functions: xmlPythonFileRead nor xmlPythonFileReadRaw.",
                "firstIssued": "2025-06-02T21:28:24Z",
                "lastUpdated": "2025-06-02T21:28:24Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-329"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-693987"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-24928",
            "id": "CVE-2025-24928",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24928"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 7.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"
                }
            ],
            "cwes": [
                121
            ],
            "description": "libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.",
            "published": "2025-02-18T23:15:10Z",
            "updated": "2025-03-21T18:15:34Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "We do not use DTD validation with libxml2. We have validated that the unit tests of xmlutils.1.0, router.1.0, and recorder.4.0 do not result in calls to xmlSnprintfElements, which is the affected function.",
                "firstIssued": "2025-06-02T21:30:36Z",
                "lastUpdated": "2025-06-02T21:30:36Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-329"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-692677"
                }
            ]
        },
        {
            "bom-ref": "GHSA-8cj5-5rvv-wf4v",
            "id": "GHSA-8cj5-5rvv-wf4v",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.7,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                22
            ],
            "description": "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore option to ignore non files/directories.",
            "published": "2025-06-02T20:15:22Z",
            "updated": "2025-06-04T14:54:33Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since tar-fs is only used by geckodriver, which is only used by the tests.",
                "firstIssued": "2025-06-05T14:23:17Z",
                "lastUpdated": "2025-06-05T14:23:17Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-360"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-48387"
                }
            ]
        },
        {
            "bom-ref": "CVE-2014-5461",
            "id": "CVE-2014-5461",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5461"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-5461&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.",
            "published": "2014-09-04T17:55:07Z",
            "updated": "2025-04-12T10:46:40Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "RTI Connector for Javascript, which is the only RTI product that uses Lua, does not call the vulnerable functionality",
                "firstIssued": "2025-06-09T10:38:00Z",
                "lastUpdated": "2025-06-09T10:38:00Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-330"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-32921",
            "id": "CVE-2021-32921",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32921"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-32921&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-32921&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)&version=2"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N"
                }
            ],
            "cwes": [
                362
            ],
            "description": "An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.",
            "published": "2021-05-13T16:15:08Z",
            "updated": "2024-11-21T06:07:55Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Prosody is a 3rd party Lua library that we're not using",
                "firstIssued": "2025-06-09T10:39:20Z",
                "lastUpdated": "2025-06-09T10:39:20Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-330"
                }
            ]
        },
        {
            "bom-ref": "GHSA-776f-qx25-q3cc",
            "id": "GHSA-776f-qx25-q3cc",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-776f-qx25-q3cc"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-776f-qx25-q3cc"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                1321
            ],
            "description": "xml2js is vulnerable to prototype pollution",
            "published": "2023-04-05T21:30:24Z",
            "updated": "2024-03-14T21:47:27Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "We use xml2js internally to compare whether the content of two XML files are equivalent or not. Attack does not apply.",
                "firstIssued": "2025-01-28T14:35:26Z",
                "lastUpdated": "2025-01-28T14:35:26Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-90"
                }
            ]
        },
        {
            "bom-ref": "GHSA-67hx-6x53-jw92",
            "id": "GHSA-67hx-6x53-jw92",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-67hx-6x53-jw92"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-67hx-6x53-jw92"
                    },
                    "score": 9.4,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                184,
                697
            ],
            "description": "Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code",
            "published": "2023-10-16T13:55:36Z",
            "updated": "2024-04-04T14:26:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Dependency only used in internal RTI tests.",
                "firstIssued": "2025-01-28T14:40:03Z",
                "lastUpdated": "2025-01-28T14:40:03Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-157"
                }
            ]
        },
        {
            "bom-ref": "GHSA-vjh7-7g9h-fjfh",
            "id": "GHSA-vjh7-7g9h-fjfh",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-vjh7-7g9h-fjfh"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-vjh7-7g9h-fjfh"
                    },
                    "severity": "critical"
                }
            ],
            "cwes": [
                200
            ],
            "description": "Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string)",
            "published": "2025-02-12T19:47:52Z",
            "updated": "2025-02-12T19:47:53Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since System Designer don\u2019t make any use of security (https) as of now. All traffic is unencrypted since the server only accepts requests for localhost.",
                "firstIssued": "2025-02-19T11:04:38Z",
                "lastUpdated": "2025-02-19T11:04:38Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-309"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21208",
            "id": "CVE-2024-21208",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21208"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                203
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "published": "2024-10-15T20:15:09Z",
            "updated": "2025-06-18T20:27:14Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Not affected since we don\u2019t use Java WebStart or Java Applets.",
                "firstIssued": "2025-06-27T20:18:12Z",
                "lastUpdated": "2025-06-27T20:18:12Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-362"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-705430"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21210",
            "id": "CVE-2024-21210",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21210"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                203
            ],
            "description": "Vulnerability in Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and  23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
            "published": "2024-10-15T20:15:09Z",
            "updated": "2025-06-18T20:27:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Not affected since we don\u2019t use Java WebStart or Java Applets.",
                "firstIssued": "2025-06-27T20:19:39Z",
                "lastUpdated": "2025-06-27T20:19:39Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-362"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-705431"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-31631",
            "id": "CVE-2022-31631",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31631"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security@php.net"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                }
            ],
            "cwes": [
                74
            ],
            "description": "In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.",
            "published": "2025-02-12T22:15:29Z",
            "updated": "2025-07-02T21:35:56Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "This issue affects the SQLite Driver used by PHP. The vulnerability does not originate from the SQLite3 library itself, but from the way it is being used. The sqlite3_snprintf() function from the SQLite3 library expects an int parameter to specify the buffer size. However, the PHP SQLite driver passes a size_t value, which on a 64-bit system can be larger than the maximum value of an int, leading to a potential overflow. Connext Pro does not directly call sqlite3_snprintf(). This function is only invoked via the SQLite3 library, which correctly manages its buffer sizes to prevent the integer overflow described, ensuring that this vulnerability is not applicable.",
                "firstIssued": "2025-07-10T13:37:13Z",
                "lastUpdated": "2025-07-10T13:37:13Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-375"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-707596"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-6545",
            "id": "CVE-2025-6545",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6545"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.\n\nThis issue affects pbkdf2: from 3.0.10 through 3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-07-21T09:54:50Z",
                "lastUpdated": "2025-07-21T09:54:50Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-370"
                },
                {
                    "name": "ghsa_id",
                    "value": "GHSA-h7cp-r72f-jxh6"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-6547",
            "id": "CVE-2025-6547",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6547"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation.This issue affects pbkdf2: <=3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-07-21T09:55:16Z",
                "lastUpdated": "2025-07-21T09:55:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-370"
                },
                {
                    "name": "ghsa_id",
                    "value": "GHSA-v62p-rq8g-8h59"
                }
            ]
        },
        {
            "bom-ref": "GHSA-fjxv-7rqg-78g4",
            "id": "GHSA-fjxv-7rqg-78g4",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4"
                    },
                    "severity": "critical"
                }
            ],
            "cwes": [
                330
            ],
            "description": "form-data uses unsafe random function in form-data for choosing boundary",
            "published": "2025-07-21T19:04:54Z",
            "updated": "2025-07-21T19:04:58Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since form-data is only used by axios, which we only use to communicate with the Connext AI Platform.",
                "firstIssued": "2025-07-31T11:15:08Z",
                "lastUpdated": "2025-07-31T11:15:08Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-384"
                }
            ]
        },
        {
            "bom-ref": "GHSA-76c9-3jph-rj3q",
            "id": "GHSA-76c9-3jph-rj3q",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-76c9-3jph-rj3q"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-76c9-3jph-rj3q"
                    },
                    "score": 3.4,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
                }
            ],
            "cwes": [
                241
            ],
            "description": "on-headers is vulnerable to http response header manipulation",
            "published": "2025-07-17T21:17:19Z",
            "updated": "2025-07-30T21:06:13Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since on-headers is only used by express-session, which is only used to manage sessions in DEMO mode, which should not be used by the users.",
                "firstIssued": "2025-08-05T09:39:13Z",
                "lastUpdated": "2025-08-05T09:39:13Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-385"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-48924",
            "id": "CVE-2025-48924",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48924"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/48xxx/CVE-2025-48924.json"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                674
            ],
            "description": "Uncontrolled Recursion vulnerability in Apache Commons Lang.\n\nThis issue affects Apache Commons Lang: Starting with\u00a0commons-lang:commons-lang\u00a02.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before\u00a03.18.0.\n\nThe methods ClassUtils.getClass(...) can throw\u00a0StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a \nStackOverflowError could\u00a0cause an application to stop.\n\nUsers are recommended to upgrade to version 3.18.0, which fixes the issue.",
            "published": "2025-07-11T15:15:24Z",
            "updated": "2025-07-28T13:45:38Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "No RTI Connext products invoke the impacted function ClassUtils.getClass, either within the RTI tools' direct source code or in any plugin dependencies.",
                "firstIssued": "2025-08-07T10:51:16Z",
                "lastUpdated": "2025-08-07T10:51:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-378"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-710140"
                }
            ]
        },
        {
            "bom-ref": "GHSA-52f5-9888-hmc6",
            "id": "GHSA-52f5-9888-hmc6",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-52f5-9888-hmc6"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-52f5-9888-hmc6"
                    },
                    "score": 2.5,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                59
            ],
            "description": "tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter",
            "published": "2025-08-06T17:06:04Z",
            "updated": "2025-08-07T15:11:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Not affected, tmp is only a dependency of selenium-webdriver, which is only used for testing in module system_designer_utils.",
                "firstIssued": "2025-08-14T14:37:06Z",
                "lastUpdated": "2025-08-14T14:37:06Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-395"
                }
            ]
        },
        {
            "bom-ref": "GHSA-95m3-7q98-8xr5",
            "id": "GHSA-95m3-7q98-8xr5",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9288"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in sha.js allows Input Data Manipulation.This issue affects sha.js: through 2.4.11.",
            "published": "2025-08-20T22:15:30Z",
            "updated": "2025-08-22T18:09:17Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "sha.js is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-08-26T07:58:42Z",
                "lastUpdated": "2025-08-26T07:58:42Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-405"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-9288"
                }
            ]
        },
        {
            "bom-ref": "GHSA-cpq7-6gpm-g9rc",
            "id": "GHSA-cpq7-6gpm-g9rc",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9287"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in cipher-base allows Input Data Manipulation.This issue affects cipher-base: through 1.0.4.",
            "published": "2025-08-20T22:15:30Z",
            "updated": "2025-08-22T18:09:17Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "cipher-base is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-08-26T07:52:50Z",
                "lastUpdated": "2025-08-26T07:52:50Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-404"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-9287"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-12798",
            "id": "CVE-2024-12798",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12798"
            },
            "ratings": [
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Clear"
                }
            ],
            "cwes": [
                917
            ],
            "description": "ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\n      upto including version 0.1 to 1.3.14 and\u00a01.4.0 to 1.5.12 in Java applications allows\n      attacker to execute arbitrary code by compromising an existing\n      logback configuration file or by injecting an environment variable\n      before program execution.\n\n\n\n\n\nMalicious logback configuration files can allow the attacker to execute \narbitrary code using the JaninoEventEvaluator extension.\n\n\n\nA successful attack requires the user to have write access to a \nconfiguration file. Alternatively, the attacker could inject a malicious \nenvironment variable pointing to a malicious configuration file. In both \ncases, the attack requires existing privilege.",
            "published": "2024-12-19T16:15:07Z",
            "updated": "2025-01-03T14:15:24Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "firstIssued": "2025-09-01T15:08:40Z",
                "lastUpdated": "2025-09-01T15:08:40Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-288"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-661746"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "ADMINCONSOLE-1432"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-12801",
            "id": "CVE-2024-12801",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12801"
            },
            "ratings": [
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 2.4,
                    "severity": "low",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:D/RE:X/U:Clear"
                }
            ],
            "cwes": [
                918
            ],
            "description": "Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12\u00a0 on the Java platform, allows an attacker to \nforge requests by compromising logback configuration files in XML.\n\n\n\nThe attacks involves the modification of DOCTYPE declaration in\u00a0 XML configuration files.",
            "published": "2024-12-19T17:15:08Z",
            "updated": "2025-01-03T14:15:24Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "firstIssued": "2025-09-01T15:09:16Z",
                "lastUpdated": "2025-09-01T15:09:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-288"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-661748"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "ADMINCONSOLE-1432"
                }
            ]
        },
        {
            "bom-ref": "GHSA-v6h2-p8h4-qcjw",
            "id": "GHSA-v6h2-p8h4-qcjw",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5889"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 2.3,
                    "severity": "low",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 3.1,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:H/Au:S/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                400,
                1333
            ],
            "description": "A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.",
            "published": "2025-06-09T19:15:25Z",
            "updated": "2025-06-12T16:06:47Z",
            "recommendation": "Enforce least-privilege principles on systems running Connext, protecting Connext applications from unauthorized modification or access.",
            "analysis": {
                "state": "exploitable",
                "firstIssued": "2025-09-03T15:45:43Z",
                "lastUpdated": "2025-09-03T15:45:43Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-389"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-5889"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "SYSD-1413"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-8885",
            "id": "CVE-2025-8885",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8885"
            },
            "ratings": [
                {
                    "source": {
                        "name": "91579145-5d7b-4cc5-b925-a0262ff19630"
                    },
                    "score": 6.3,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:X/R:U/V:X/RE:M/U:Amber"
                }
            ],
            "cwes": [
                770
            ],
            "description": "Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcprov, bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java.\n\nThis issue affects Bouncy Castle for Java: from BC 1.0 through 1.77, from BC-FJA 1.0.0 through 1.0.2.5, from BC-FJA 2.0.0 through 2.0.0.",
            "published": "2025-08-12T10:15:26Z",
            "updated": "2025-08-16T10:15:26Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Admin Console doesn't use the Bouncy Castle security provider on its code base. Bouncy Castle is a dependency of Eclipse third-party components, and Admin Console doesn't exercise the code that calls Bouncy Castle from any of its components.",
                "firstIssued": "2025-08-18T09:59:11Z",
                "lastUpdated": "2025-08-18T09:59:11Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-403"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-714207"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-58249",
            "id": "CVE-2024-58249",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-58249"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                826
            ],
            "description": "In wxWidgets before 3.2.7, a crash can be triggered in wxWidgets apps when connections are refused in wxWebRequestCURL.",
            "published": "2025-04-16T16:15:29Z",
            "updated": "2025-04-17T20:22:16Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The vulnerable code is not present in the wxWidget version that we are using. It affects versions of wxWidgets between 3.1.5 and 3.2.7. The version of wxWidgets that Shapes Demo uses is not in the aforementioned range.",
                "firstIssued": "2025-08-26T09:27:07Z",
                "lastUpdated": "2025-08-26T09:27:07Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-388"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-704057"
                }
            ]
        },
        {
            "bom-ref": "GHSA-v62p-rq8g-8h59:0",
            "id": "GHSA-v62p-rq8g-8h59:0",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6547"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation.This issue affects pbkdf2: <=3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-09-09T15:22:54Z",
                "lastUpdated": "2025-09-09T15:22:54Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-413"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-6547"
                }
            ]
        },
        {
            "bom-ref": "GHSA-h7cp-r72f-jxh6:0",
            "id": "GHSA-h7cp-r72f-jxh6:0",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6545"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.\n\nThis issue affects pbkdf2: from 3.0.10 through 3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-09-09T15:24:37Z",
                "lastUpdated": "2025-09-09T15:24:37Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-413"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-6545"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-2004",
            "id": "CVE-2024-2004",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2004"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/2xxx/CVE-2024-2004.json"
                    },
                    "score": 3.5,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                }
            ],
            "cwes": [
                436
            ],
            "description": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.",
            "published": "2024-03-27T08:15:41Z",
            "updated": "2025-07-30T19:42:14Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Open Telemetry never disables all protocols, it always enables support for several of them. As a consequence, Collector Service is not affected by this vulnerability.",
                "firstIssued": "2025-08-28T15:54:33Z",
                "lastUpdated": "2025-08-28T15:54:33Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-338"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-9232",
            "id": "CVE-2025-9232",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9232"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/9xxx/CVE-2025-9232.json"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                125
            ],
            "description": "Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na 'no_proxy' environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary.",
            "published": "2025-09-30T14:15:41Z",
            "updated": "2025-09-30T20:15:41Z",
            "recommendation": "Enforce least-privilege principles on systems running Connext, protecting Connext applications from unauthorized modification or access. Ensure that you don't have a 'no_proxy' environment variable set.",
            "analysis": {
                "state": "exploitable",
                "firstIssued": "2025-10-02T17:48:55Z",
                "lastUpdated": "2025-10-02T17:48:55Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-430"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-725604"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "SEC-2823"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-9230",
            "id": "CVE-2025-9230",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9230"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/9xxx/CVE-2025-9230.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                125,
                787
            ],
            "description": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\n\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\n\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.",
            "published": "2025-09-30T14:15:41Z",
            "updated": "2025-09-30T20:15:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not decrypt CMS messages.",
                "firstIssued": "2025-10-01T21:27:46Z",
                "lastUpdated": "2025-10-01T21:27:46Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-427"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-725602"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-9231",
            "id": "CVE-2025-9231",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9231"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/9xxx/CVE-2025-9231.json"
                    },
                    "score": 6.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                }
            ],
            "cwes": [
                385
            ],
            "description": "Issue summary: A timing side-channel which could potentially allow remote\nrecovery of the private key exists in the SM2 algorithm implementation on 64 bit\nARM platforms.\n\nImpact summary: A timing side-channel in SM2 signature computations on 64 bit\nARM platforms could allow recovering the private key by an attacker..\n\nWhile remote key recovery over a network was not attempted by the reporter,\ntiming measurements revealed a timing signal which may allow such an attack.\n\nOpenSSL does not directly support certificates with SM2 keys in TLS, and so\nthis CVE is not relevant in most TLS contexts.  However, given that it is\npossible to add support for such certificates via a custom provider, coupled\nwith the fact that in such a custom provider context the private key may be\nrecoverable via remote timing measurements, we consider this to be a Moderate\nseverity issue.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as SM2 is not an approved algorithm.",
            "published": "2025-09-30T14:15:41Z",
            "updated": "2025-09-30T20:15:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not support SM2.",
                "firstIssued": "2025-10-01T21:33:15Z",
                "lastUpdated": "2025-10-01T21:33:15Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-427"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-725603"
                }
            ]
        },
        {
            "bom-ref": "GHSA-vj76-c3g6-qr5v",
            "id": "GHSA-vj76-c3g6-qr5v",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59343"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.7,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                22,
                61
            ],
            "description": "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A workaround involves using the ignore option on non files/directories.",
            "published": "2025-09-24T18:15:42Z",
            "updated": "2025-09-26T14:32:53Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because tar-fs is only a dependency of geckodriver which is only used for testing.",
                "firstIssued": "2025-10-14T09:37:10Z",
                "lastUpdated": "2025-10-14T09:37:10Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-432"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-59343"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-34459",
            "id": "CVE-2024-34459",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34459"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/34xxx/CVE-2024-34459.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                122
            ],
            "description": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.",
            "published": "2024-05-14T15:39:11Z",
            "updated": "2025-10-10T18:00:14Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The affected function, xmlHTMLPrintFileContext, is part of xmlllint, which we do not use in our products. We have validated that our code does not exercise that code-path running the tests of xmlutils, recorder, and router.",
                "firstIssued": "2025-10-16T09:58:08Z",
                "lastUpdated": "2025-10-16T09:58:08Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-434"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-728442"
                }
            ]
        }
    ]
}