{
    "bomFormat": "CycloneDX",
    "specVersion": "1.5",
    "serialNumber": "urn:uuid:493e5f23-5c3b-45ba-a931-cda115442d70",
    "version": 1,
    "metadata": {
        "timestamp": "2025-01-16T00:00:00Z",
        "authors": [
            {
                "name": "Connext Security Team",
                "email": "security@rti.com"
            }
        ],
        "component": {
            "type": "framework",
            "bom-ref": "Connext Pro",
            "supplier": {
                "name": "Real-Time Innovations, Inc. (RTI)",
                "url": [
                    "https://www.rti.com"
                ]
            },
            "name": "Connext Professional",
            "version": "7.3.1.2"
        },
        "properties": [
            {
                "name": "last_updated",
                "value": "2026-03-10T14:42:57Z"
            }
        ]
    },
    "vulnerabilities": [
        {
            "bom-ref": "CVE-2011-1145",
            "id": "CVE-2011-1145",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1145"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2011-1145&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 7.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2011-1145&vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 4.6,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                120
            ],
            "description": "The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.",
            "published": "2019-11-14T02:15:10Z",
            "updated": "2024-11-21T01:25:39Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not call the impacted APIs",
                "firstIssued": "2024-06-12T13:10:44.519000Z",
                "lastUpdated": "2024-08-05T11:53:38.915000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-203"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-593529"
                }
            ]
        },
        {
            "bom-ref": "CVE-2012-2657",
            "id": "CVE-2012-2657",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2657"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2012-2657&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "Buffer overflow in the SQLDriverConnect function in unixODBC 2.0.10, 2.3.1, and earlier allows local users to cause a denial of service (crash) via a long string in the FILEDSN option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.",
            "published": "2012-08-31T18:55:00Z",
            "updated": "2024-11-21T01:39:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-169235"
                }
            ]
        },
        {
            "bom-ref": "CVE-2014-5461",
            "id": "CVE-2014-5461",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5461"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-5461&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.",
            "published": "2014-09-04T17:55:07Z",
            "updated": "2025-04-12T10:46:40Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "RTI Connector for Javascript, which is the only RTI product that uses Lua, does not call the vulnerable functionality",
                "firstIssued": "2025-06-09T10:38:00Z",
                "lastUpdated": "2025-06-09T10:38:00Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-330"
                }
            ]
        },
        {
            "bom-ref": "CVE-2018-7409",
            "id": "CVE-2018-7409",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7409"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-7409&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv3",
                    "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-7409&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                119
            ],
            "description": "In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.",
            "published": "2018-02-22T18:29:00Z",
            "updated": "2024-11-21T04:12:05Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-148319"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24370",
            "id": "CVE-2020-24370",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24370"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24370&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24370&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                191
            ],
            "description": "ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).",
            "published": "2020-08-17T17:15:13Z",
            "updated": "2024-11-21T05:14:41Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-146889"
                }
            ]
        },
        {
            "bom-ref": "CVE-2020-24371",
            "id": "CVE-2020-24371",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24371"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-24371&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-24371&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                763
            ],
            "description": "lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.",
            "published": "2020-08-17T17:15:13Z",
            "updated": "2024-11-21T05:14:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-142250"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-32921",
            "id": "CVE-2021-32921",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32921"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-32921&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-32921&vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)&version=2"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:P/I:N/A:N"
                }
            ],
            "cwes": [
                362
            ],
            "description": "An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.",
            "published": "2021-05-13T16:15:08Z",
            "updated": "2024-11-21T06:07:55Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Prosody is a 3rd party Lua library that we're not using",
                "firstIssued": "2025-06-09T10:39:20Z",
                "lastUpdated": "2025-06-09T10:39:20Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-330"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-3520",
            "id": "CVE-2021-3520",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-3520&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-3520&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P"
                }
            ],
            "cwes": [
                190,
                787
            ],
            "description": "There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.",
            "published": "2021-06-02T13:15:13Z",
            "updated": "2024-11-21T06:21:44Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "response": [
                    "update"
                ],
                "detail": "We never pass an outputSize < 0 (see fix under https://github.com/lz4/lz4/pull/972/commits/8301a21773ef61656225e264f4f06ae14462bca7) . We always sanitize the passed outputSize parameter in all current usages.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-177195"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-43519",
            "id": "CVE-2021-43519",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43519&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43519&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                674
            ],
            "description": "Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.",
            "published": "2021-11-09T13:15:08Z",
            "updated": "2024-11-21T06:29:20Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The impacted code is not reachable in the product",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-189532"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-44647",
            "id": "CVE-2021-44647",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44647"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44647&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44647&vector=(AV:L/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:L/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                843
            ],
            "description": "Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.",
            "published": "2022-01-11T13:15:07Z",
            "updated": "2024-11-21T06:31:18Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-194232"
                }
            ]
        },
        {
            "bom-ref": "CVE-2021-45985",
            "id": "CVE-2021-45985",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45985"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-45985&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.",
            "published": "2023-04-10T09:15:07Z",
            "updated": "2024-11-21T06:33:25Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2023-04-20T20:18:32.307000Z",
                "lastUpdated": "2023-07-17T10:50:34.215000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-95"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-513829"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-21618",
            "id": "CVE-2022-21618",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21618"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
            "published": "2022-10-18T21:15:12Z",
            "updated": "2024-11-21T06:45:05Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-06-07T20:09:43.509000Z",
                "lastUpdated": "2023-07-17T10:50:17.286000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-102"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-21624",
            "id": "CVE-2022-21624",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21624"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
            "published": "2022-10-18T21:15:13Z",
            "updated": "2024-11-21T06:45:05Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-06-07T20:09:43.509000Z",
                "lastUpdated": "2023-07-17T10:50:17.286000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-102"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-21626",
            "id": "CVE-2022-21626",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21626"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "published": "2022-10-18T21:15:13Z",
            "updated": "2024-11-21T06:45:06Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2023-06-07T20:09:43.509000Z",
                "lastUpdated": "2023-07-17T10:50:17.286000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-102"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-28805",
            "id": "CVE-2022-28805",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28805"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-28805&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H&version=3.1"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-28805&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:P)&version=2"
                    },
                    "score": 6.4,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:P"
                }
            ],
            "cwes": [
                125
            ],
            "description": "singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.",
            "published": "2022-04-08T06:15:07Z",
            "updated": "2024-11-21T06:57:57Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The code path that leads to the vulnerability is not reachable in our usage of Lua.",
                "firstIssued": "2023-01-16T12:06:31.575000Z",
                "lastUpdated": "2023-01-24T12:13:58.073000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-50"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-203400"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-31631",
            "id": "CVE-2022-31631",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31631"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security@php.net"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                }
            ],
            "cwes": [
                74
            ],
            "description": "In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.",
            "published": "2025-02-12T22:15:29Z",
            "updated": "2025-07-02T21:35:56Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "This issue affects the SQLite Driver used by PHP. The vulnerability does not originate from the SQLite3 library itself, but from the way it is being used. The sqlite3_snprintf() function from the SQLite3 library expects an int parameter to specify the buffer size. However, the PHP SQLite driver passes a size_t value, which on a 64-bit system can be larger than the maximum value of an int, leading to a potential overflow. Connext Pro does not directly call sqlite3_snprintf(). This function is only invoked via the SQLite3 library, which correctly manages its buffer sizes to prevent the integer overflow described, ensuring that this vulnerability is not applicable.",
                "firstIssued": "2025-07-10T13:37:13Z",
                "lastUpdated": "2025-07-10T13:37:13Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-375"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-707596"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-33099",
            "id": "CVE-2022-33099",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33099"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-33099&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-33099&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                787
            ],
            "description": "An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.",
            "published": "2022-07-01T12:15:08Z",
            "updated": "2024-11-21T07:07:32Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The code that triggers the vulnerability is not present in Connext.",
                "firstIssued": "2022-10-05T13:24:28.660000Z",
                "lastUpdated": "2022-10-19T11:20:02.434000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-32"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-230272"
                }
            ]
        },
        {
            "bom-ref": "CVE-2022-37434",
            "id": "CVE-2022-37434",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-37434&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
            "published": "2022-08-05T07:15:07Z",
            "updated": "2024-11-21T07:14:59Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext is not affected since we are not using inflateGetHeader function from the zlib library.",
                "firstIssued": "2023-04-26T13:47:24.750000Z",
                "lastUpdated": "2023-06-26T14:05:02.317000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-81"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-248499"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-23088",
            "id": "CVE-2023-23088",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23088"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-23088&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function.",
            "published": "2023-02-03T18:15:17Z",
            "updated": "2024-11-21T07:45:51Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "We don't use Barenboim json-parser in our code base. The code impacted code is not present in our codebase.",
                "firstIssued": "2024-05-03T14:43:35.976000Z",
                "lastUpdated": "2024-07-31T21:16:11.149000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-200"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-593528"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-35116",
            "id": "CVE-2023-35116",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35116"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-35116&vector=AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 4.7,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                770
            ],
            "description": "jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.",
            "published": "2023-06-14T14:15:10Z",
            "updated": "2024-11-21T08:07:58Z",
            "rejected": "2024-11-21T08:07:58Z",
            "analysis": {
                "state": "false_positive",
                "firstIssued": "2024-03-07T18:02:19.418000Z",
                "lastUpdated": "2024-03-07T18:02:19.438000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-117"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-522015"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-45853",
            "id": "CVE-2023-45853",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45853"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-45853&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2023/45xxx/CVE-2023-45853.json"
                    },
                    "score": 8.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                190
            ],
            "description": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.",
            "published": "2023-10-14T02:15:09Z",
            "updated": "2024-12-20T17:41:31Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "No. The affected code is https://github.com/madler/zlib/blob/develop/contrib/minizip/zip.c#L1016C20-L1016C43 . We do not use MiniZip in our code. There is no `contrib` or `minizip` folder in our codebase.",
                "firstIssued": "2024-03-05T13:34:45.109000Z",
                "lastUpdated": "2024-07-31T08:52:59.634000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-202"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-533513"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-52426",
            "id": "CVE-2023-52426",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52426"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-52426&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                776
            ],
            "description": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.",
            "published": "2024-02-04T20:15:46Z",
            "updated": "2024-11-21T08:39:43Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_by_compiler",
                "detail": "We are not affected by this because we have been defining XML_DTD since Oct 2, 2017, before the release of expat 2.4.0 on May 23 2021, where this issue was remediated as CVE-2013-0340. We upgraded from expat 2.2.5 to expat 2.4.3 on Jan 28, 2022. This fix is only required for those who do not define XML_DTD.",
                "firstIssued": "2024-03-05T16:45:27.489000Z",
                "lastUpdated": "2024-07-31T18:43:11.860000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-201"
                }
            ]
        },
        {
            "bom-ref": "CVE-2023-6378",
            "id": "CVE-2023-6378",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6378"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2023-6378&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 7.1,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                502
            ],
            "description": "A serialization vulnerability in logback receiver component part of \nlogback version 1.4.11 allows an attacker to mount a Denial-Of-Service \nattack by sending poisoned data.\n\n",
            "published": "2023-11-29T12:15:07Z",
            "updated": "2024-11-29T12:15:06Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted logback functionality.",
                "firstIssued": "2024-02-16T11:07:50.937000Z",
                "lastUpdated": "2024-02-20T14:48:09.733000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-172"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-539985"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-12798",
            "id": "CVE-2024-12798",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12798"
            },
            "ratings": [
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Clear"
                }
            ],
            "cwes": [
                917
            ],
            "description": "ACE vulnerability in JaninoEventEvaluator  by QOS.CH logback-core\n      upto including version 0.1 to 1.3.14 and\u00a01.4.0 to 1.5.12 in Java applications allows\n      attacker to execute arbitrary code by compromising an existing\n      logback configuration file or by injecting an environment variable\n      before program execution.\n\n\n\n\n\nMalicious logback configuration files can allow the attacker to execute \narbitrary code using the JaninoEventEvaluator extension.\n\n\n\nA successful attack requires the user to have write access to a \nconfiguration file. Alternatively, the attacker could inject a malicious \nenvironment variable pointing to a malicious configuration file. In both \ncases, the attack requires existing privilege.",
            "published": "2024-12-19T16:15:07Z",
            "updated": "2025-01-03T14:15:24Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI Admin Console is affected by product issue ADMINCONSOLE-1432, which has a maximum CVSS 3.1 score of 6.1.",
                "firstIssued": "2025-09-01T15:08:40Z",
                "lastUpdated": "2025-10-28T17:11:34Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-288"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-661746"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "ADMINCONSOLE-1432"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-12801",
            "id": "CVE-2024-12801",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12801"
            },
            "ratings": [
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 2.4,
                    "severity": "low",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:D/RE:X/U:Clear"
                }
            ],
            "cwes": [
                918
            ],
            "description": "Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 0.1 to 1.3.14 and 1.4.0 to 1.5.12\u00a0 on the Java platform, allows an attacker to \nforge requests by compromising logback configuration files in XML.\n\n\n\nThe attacks involves the modification of DOCTYPE declaration in\u00a0 XML configuration files.",
            "published": "2024-12-19T17:15:08Z",
            "updated": "2025-01-03T14:15:24Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI Admin Console is affected by product issue ADMINCONSOLE-1432, which has a maximum CVSS 3.1 score of 6.1.",
                "firstIssued": "2025-09-01T15:09:16Z",
                "lastUpdated": "2025-10-28T17:14:32Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-288"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-661748"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "ADMINCONSOLE-1432"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-2004",
            "id": "CVE-2024-2004",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2004"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/2xxx/CVE-2024-2004.json"
                    },
                    "score": 3.5,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                }
            ],
            "cwes": [
                436
            ],
            "description": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.",
            "published": "2024-03-27T08:15:41Z",
            "updated": "2025-07-30T19:42:14Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Open Telemetry never disables all protocols, it always enables support for several of them. As a consequence, Collector Service is not affected by this vulnerability.",
                "firstIssued": "2025-08-28T15:54:33Z",
                "lastUpdated": "2025-08-28T15:54:33Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-338"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21208",
            "id": "CVE-2024-21208",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21208"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                203
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "published": "2024-10-15T20:15:09Z",
            "updated": "2025-06-18T20:27:14Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Not affected since we don\u2019t use Java WebStart or Java Applets.",
                "firstIssued": "2025-06-27T20:18:12Z",
                "lastUpdated": "2025-06-27T20:18:12Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-362"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-705430"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21210",
            "id": "CVE-2024-21210",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21210"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                203
            ],
            "description": "Vulnerability in Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and  23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
            "published": "2024-10-15T20:15:09Z",
            "updated": "2025-06-18T20:27:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Not affected since we don\u2019t use Java WebStart or Java Applets.",
                "firstIssued": "2025-06-27T20:19:39Z",
                "lastUpdated": "2025-06-27T20:19:39Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-362"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-705431"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21217",
            "id": "CVE-2024-21217",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21217"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "published": "2024-10-15T20:15:11Z",
            "updated": "2024-10-18T18:29:36Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since we don't use Java Web Start or Applets in any of our products.",
                "firstIssued": "2025-02-05T17:13:28Z",
                "lastUpdated": "2025-02-05T17:13:28Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-303"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-646816"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-21235",
            "id": "CVE-2024-21235",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21235"
            },
            "ratings": [
                {
                    "source": {
                        "name": "secalert_us@oracle.com"
                    },
                    "score": 4.8,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                }
            ],
            "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23;   Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23;   Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
            "published": "2024-10-15T20:15:12Z",
            "updated": "2024-10-18T18:30:26Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since we don't use Java Web Start or Applets in any of our products.",
                "firstIssued": "2025-02-05T17:15:45Z",
                "lastUpdated": "2025-02-05T17:15:45Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-303"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-646818"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-29857",
            "id": "CVE-2024-29857",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29857"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/29xxx/CVE-2024-29857.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                125
            ],
            "description": "An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.",
            "published": "2024-05-14T15:17:02Z",
            "updated": "2024-12-06T14:15:20Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601221"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-30171",
            "id": "CVE-2024-30171",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30171"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30171.json"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                203
            ],
            "description": "An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.",
            "published": "2024-05-14T15:21:52Z",
            "updated": "2024-11-21T09:11:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601225"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-30172",
            "id": "CVE-2024-30172",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30172"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/30xxx/CVE-2024-30172.json"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "description": "An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.",
            "published": "2024-05-14T15:21:53Z",
            "updated": "2024-11-21T09:11:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-07-01T15:45:42.097000Z",
                "lastUpdated": "2024-07-31T08:52:58.554000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-224"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-601227"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-47554",
            "id": "CVE-2024-47554",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2024/47xxx/CVE-2024-47554.json"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                400
            ],
            "description": "Uncontrolled Resource Consumption vulnerability in Apache Commons IO.\n\nThe org.apache.commons.io.input.XmlStreamReader class may excessively consume CPU resources when processing maliciously crafted input.\n\n\nThis issue affects Apache Commons IO: from 2.0 before 2.14.0.\n\nUsers are recommended to upgrade to version 2.14.0 or later, which fixes the issue.",
            "published": "2024-10-03T12:15:02Z",
            "updated": "2024-12-04T15:15:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use the impacted component.",
                "firstIssued": "2024-11-25T12:06:41.884000Z",
                "lastUpdated": "2024-11-27T15:37:49.870000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-277"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-645644"
                }
            ]
        },
        {
            "bom-ref": "CVE-2024-58249",
            "id": "CVE-2024-58249",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-58249"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                826
            ],
            "description": "In wxWidgets before 3.2.7, a crash can be triggered in wxWidgets apps when connections are refused in wxWebRequestCURL.",
            "published": "2025-04-16T16:15:29Z",
            "updated": "2025-04-17T20:22:16Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The vulnerable code is not present in the wxWidget version that we are using. It affects versions of wxWidgets between 3.1.5 and 3.2.7. The version of wxWidgets that Shapes Demo uses is not in the aforementioned range.",
                "firstIssued": "2025-08-26T09:27:07Z",
                "lastUpdated": "2025-08-26T09:27:07Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-388"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-704057"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-10966",
            "id": "CVE-2025-10966",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10966"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/10xxx/CVE-2025-10966.json"
                    },
                    "score": 4.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                }
            ],
            "description": "curl's code for managing SSH connections when SFTP was done using the wolfSSH\npowered backend was flawed and missed host verification mechanisms.\n\nThis prevents curl from detecting MITM attackers and more.",
            "published": "2025-11-07T08:15:39Z",
            "updated": "2025-11-12T16:20:22Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "We are not affected because this CVE only affects curl when built with the wolfSSL backend. The curl built for use with Collector Service is only built with OpenSSL.",
                "firstIssued": "2025-12-18T14:52:02Z",
                "lastUpdated": "2025-12-18T14:52:02Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-452"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-740917"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-11226",
            "id": "CVE-2025-11226",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11226"
            },
            "ratings": [
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:M/U:Green"
                }
            ],
            "cwes": [
                20
            ],
            "description": "ACE vulnerability in conditional configuration file processing  by QOS.CH logback-core up to and including version 1.5.18 in Java applications, allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.\n\n\n\nA successful attack requires the presence of Janino library and Spring Framework to be present on the user's class path. In addition, the attacker must\u00a0 have write access to a \nconfiguration file. Alternatively, the attacker could inject a malicious \nenvironment variable pointing to a malicious configuration file. In both \ncases, the attack requires existing privilege.",
            "published": "2025-10-01T08:15:31Z",
            "updated": "2025-10-31T15:15:41Z",
            "recommendation": "Enforce least-privilege principles on systems running Connext, protecting Connext applications from unauthorized modification or access.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI Admin Console is affected by product issue ADMINCONSOLE-1499, which has a maximum CVSS 3.1 score of 5.3.",
                "firstIssued": "2025-11-17T09:29:26Z",
                "lastUpdated": "2025-11-17T09:29:26Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-440"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-736604"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "ADMINCONSOLE-1499"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-11563",
            "id": "CVE-2025-11563",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11563"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/11xxx/CVE-2025-11563.json"
                    },
                    "score": 4.6,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                }
            ],
            "cwes": [
                22
            ],
            "description": "URLs containing percent-encoded slashes (`/` or `\\`) can trick wcurl into\nsaving the output file outside of the current directory without the user\nexplicitly asking for it.\n\nThis flaw only affects the wcurl command line tool.",
            "published": "2026-02-25T08:16:18Z",
            "updated": "2026-02-26T20:06:37Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "We are not affected by this vulnerability as it only affects the wcurl command line tool which we do not use.",
                "firstIssued": "2026-03-04T15:10:43Z",
                "lastUpdated": "2026-03-04T15:10:43Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-538"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-946392"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-13034",
            "id": "CVE-2025-13034",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13034"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/13xxx/CVE-2025-13034.json"
                    },
                    "score": 5.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                }
            ],
            "cwes": [
                295
            ],
            "description": "When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`\nwith the curl tool,curl should check the public key of the server certificate\nto verify the peer.\n\nThis check was skipped in a certain condition that would then make curl allow\nthe connection without performing the proper check, thus not noticing a\npossible impostor. To skip this check, the connection had to be done with QUIC\nwith ngtcp2 built to use GnuTLS and the user had to explicitly disable the\nstandard certificate verification.",
            "published": "2026-01-08T10:15:45Z",
            "updated": "2026-01-20T14:54:02Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The Collector Service is not built with the GnuTLS backend.",
                "firstIssued": "2026-02-11T19:19:20Z",
                "lastUpdated": "2026-02-11T19:19:20Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-488"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-930567"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-14017",
            "id": "CVE-2025-14017",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14017"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/14xxx/CVE-2025-14017.json"
                    },
                    "score": 6.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                }
            ],
            "description": "When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,\nchanging TLS options in one thread would inadvertently change them globally\nand therefore possibly also affect other concurrently setup transfers.\n\nDisabling certificate verification for a specific transfer could\nunintentionally disable the feature for other threads as well.",
            "published": "2026-01-08T10:15:45Z",
            "updated": "2026-01-27T21:29:39Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The Collector Service does not use LDAP.",
                "firstIssued": "2026-02-11T19:12:21Z",
                "lastUpdated": "2026-02-11T19:12:21Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-488"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-930568"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-14524",
            "id": "CVE-2025-14524",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14524"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/14xxx/CVE-2025-14524.json"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                601
            ],
            "description": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer\nperforms a cross-protocol redirect to a second URL that uses an IMAP, LDAP,\nPOP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new\ntarget host.",
            "published": "2026-01-08T10:15:46Z",
            "updated": "2026-01-20T14:53:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The Collector Service only uses basic authentication.",
                "firstIssued": "2026-02-11T19:04:50Z",
                "lastUpdated": "2026-02-11T19:04:50Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-488"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-930569"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-14819",
            "id": "CVE-2025-14819",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14819"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/14xxx/CVE-2025-14819.json"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                295
            ],
            "description": "When doing TLS related transfers with reused easy or multi handles and\naltering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user's wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
            "published": "2026-01-08T10:15:46Z",
            "updated": "2026-01-20T14:51:26Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The Collector Service does not use the CURLSSLOPT_NO_PARTIALCHAIN option.",
                "firstIssued": "2026-02-11T19:03:13Z",
                "lastUpdated": "2026-02-11T19:03:13Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-488"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-930570"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-15079",
            "id": "CVE-2025-15079",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15079"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/15xxx/CVE-2025-15079.json"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                }
            ],
            "cwes": [
                297
            ],
            "description": "When doing SSH-based transfers using either SCP or SFTP, and setting the\nknown_hosts file, libcurl could still mistakenly accept connecting to hosts\n*not present* in the specified file if they were added as recognized in the\nlibssh *global* known_hosts file.",
            "published": "2026-01-08T10:15:47Z",
            "updated": "2026-01-20T14:50:24Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The Collector Service does not use SFTP or SCP.",
                "firstIssued": "2026-02-11T19:13:32Z",
                "lastUpdated": "2026-02-11T19:13:32Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-488"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-930571"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-15224",
            "id": "CVE-2025-15224",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15224"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/15xxx/CVE-2025-15224.json"
                    },
                    "score": 3.1,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                287
            ],
            "description": "When doing SSH-based transfers using either SCP or SFTP, and asked to do\npublic key authentication, curl would wrongly still ask and authenticate using\na locally running SSH agent.",
            "published": "2026-01-08T10:15:47Z",
            "updated": "2026-01-20T14:47:52Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The Collector Service does not use SFTP or SCP.",
                "firstIssued": "2026-02-11T19:20:21Z",
                "lastUpdated": "2026-02-11T19:20:21Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-488"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-930572"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-48924",
            "id": "CVE-2025-48924",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48924"
            },
            "ratings": [
                {
                    "source": {
                        "name": "CISA-ADP",
                        "url": "https://github.com/cisagov/vulnrichment/blob/develop/2025/48xxx/CVE-2025-48924.json"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                674
            ],
            "description": "Uncontrolled Recursion vulnerability in Apache Commons Lang.\n\nThis issue affects Apache Commons Lang: Starting with\u00a0commons-lang:commons-lang\u00a02.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before\u00a03.18.0.\n\nThe methods ClassUtils.getClass(...) can throw\u00a0StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a \nStackOverflowError could\u00a0cause an application to stop.\n\nUsers are recommended to upgrade to version 3.18.0, which fixes the issue.",
            "published": "2025-07-11T15:15:24Z",
            "updated": "2025-07-28T13:45:38Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "No RTI Connext products invoke the impacted function ClassUtils.getClass, either within the RTI tools' direct source code or in any plugin dependencies.",
                "firstIssued": "2025-08-07T10:51:16Z",
                "lastUpdated": "2025-08-07T10:51:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-378"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-710140"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-64118",
            "id": "CVE-2025-64118",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64118"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 6.1,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                362,
                367
            ],
            "description": "node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.",
            "published": "2025-10-30T18:15:33Z",
            "updated": "2025-11-04T15:41:56Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2025-12-16T11:35:34Z",
                "lastUpdated": "2025-12-16T11:35:34Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-455"
                },
                {
                    "name": "ghsa_id",
                    "value": "GHSA-29xp-372q-xqph"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-6545",
            "id": "CVE-2025-6545",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6545"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.\n\nThis issue affects pbkdf2: from 3.0.10 through 3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-07-21T09:54:50Z",
                "lastUpdated": "2025-07-21T09:54:50Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-370"
                },
                {
                    "name": "ghsa_id",
                    "value": "GHSA-h7cp-r72f-jxh6"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-6547",
            "id": "CVE-2025-6547",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6547"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation.This issue affects pbkdf2: <=3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-07-21T09:55:16Z",
                "lastUpdated": "2025-07-21T09:55:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-370"
                },
                {
                    "name": "ghsa_id",
                    "value": "GHSA-v62p-rq8g-8h59"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-66382",
            "id": "CVE-2025-66382",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66382"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2025-66382&vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 2.9,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                407
            ],
            "description": "In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.",
            "published": "2025-11-28T07:15:57Z",
            "updated": "2025-12-19T16:05:03Z",
            "recommendation": "Enforce least-privilege principles on systems running Connext, protecting Connext applications from unauthorized modification or access.",
            "analysis": {
                "state": "exploitable",
                "detail": "The Core Libraries are affected by product issue CORE-16393, which has a maximum CVSS 3.1 score of 5.5.",
                "firstIssued": "2026-01-21T19:13:48Z",
                "lastUpdated": "2026-01-21T19:13:48Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-477"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-905397"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "CORE-16393"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-68161",
            "id": "CVE-2025-68161",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68161"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security@apache.org"
                    },
                    "score": 6.3,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2025-68161&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N&version=3.1"
                    },
                    "score": 4.8,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                }
            ],
            "cwes": [
                295,
                297
            ],
            "description": "The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the  verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName  configuration attribute or the  log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName  system property is set to true.\n\nThis issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions:\n\n  *  The attacker is able to intercept or redirect network traffic between the client and the log receiver.\n  *  The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender\u2019s configured trust store (or by the default Java trust store if no custom trust store is configured).\n\n\nUsers are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue.\n\nAs an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.",
            "published": "2025-12-18T21:15:57Z",
            "updated": "2026-01-12T15:26:10Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI Admin Console and RTI Monitoring are affected by product issues ADMINCONSOLE-1509, MONITOR-745, which have a maximum CVSS 3.1 score of 4.8.",
                "firstIssued": "2026-01-14T14:38:12Z",
                "lastUpdated": "2026-01-14T14:38:12Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-478"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-905476"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "ADMINCONSOLE-1509"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "MONITOR-745"
                }
            ]
        },
        {
            "bom-ref": "CVE-2025-8885",
            "id": "CVE-2025-8885",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8885"
            },
            "ratings": [
                {
                    "source": {
                        "name": "91579145-5d7b-4cc5-b925-a0262ff19630"
                    },
                    "score": 6.3,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:X/R:U/V:X/RE:M/U:Amber"
                }
            ],
            "cwes": [
                770
            ],
            "description": "Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcprov, bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java.\n\nThis issue affects Bouncy Castle for Java: from BC 1.0 through 1.77, from BC-FJA 1.0.0 through 1.0.2.5, from BC-FJA 2.0.0 through 2.0.0.",
            "published": "2025-08-12T10:15:26Z",
            "updated": "2025-08-16T10:15:26Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Admin Console doesn't use the Bouncy Castle security provider on its code base. Bouncy Castle is a dependency of Eclipse third-party components, and Admin Console doesn't exercise the code that calls Bouncy Castle from any of its components.",
                "firstIssued": "2025-08-18T09:59:11Z",
                "lastUpdated": "2025-08-18T09:59:11Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-403"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-714207"
                }
            ]
        },
        {
            "bom-ref": "CVE-2026-1225",
            "id": "CVE-2026-1225",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1225"
            },
            "ratings": [
                {
                    "source": {
                        "name": "vulnerability@ncsc.ch"
                    },
                    "score": 1.8,
                    "severity": "low",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:X/V:X/RE:M/U:Green"
                }
            ],
            "cwes": [
                20
            ],
            "description": "ACE vulnerability in configuration file processing  by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file.\n\n\n\n\nThe instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must  have write access to a \nconfiguration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.",
            "published": "2026-01-22T10:16:07Z",
            "updated": "2026-01-26T15:04:59Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "The affected third-party library code is never loaded by Admin Console during use so the vulnerability cannot be exploited.",
                "firstIssued": "2026-02-18T20:46:30Z",
                "lastUpdated": "2026-02-18T20:46:30Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-502"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-935054"
                }
            ]
        },
        {
            "bom-ref": "CVE-2026-22184",
            "id": "CVE-2026-22184",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22184"
            },
            "ratings": [
                {
                    "source": {
                        "name": "disclosure@vulncheck.com"
                    },
                    "score": 4.6,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2026-22184&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1"
                    },
                    "score": 9.8,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                787
            ],
            "description": "zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.",
            "published": "2026-01-07T21:16:01Z",
            "updated": "2026-01-15T14:16:27Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The untgz code is not present in the Core Libraries.",
                "firstIssued": "2026-01-22T15:19:51Z",
                "lastUpdated": "2026-01-22T15:19:51Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-493"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-932447"
                }
            ]
        },
        {
            "bom-ref": "CVE-2026-24515",
            "id": "CVE-2026-24515",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24515"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 2.9,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2026-24515&vector=AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L&version=3.1"
                    },
                    "score": 2.5,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                476
            ],
            "description": "In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.",
            "published": "2026-01-23T08:16:01Z",
            "updated": "2026-02-05T17:27:53Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "XML_ExternalEntityParserCreate is called in RTIXMLDtdParser_parse, but we don't call XML_SetUnknownEncodingHandler anywhere, and both must be called to be affected.",
                "firstIssued": "2026-02-24T15:43:49Z",
                "lastUpdated": "2026-02-24T15:43:49Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-523"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-937930"
                }
            ]
        },
        {
            "bom-ref": "CVE-2026-25210",
            "id": "CVE-2026-25210",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25210"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 6.9,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"
                }
            ],
            "cwes": [
                190
            ],
            "description": "In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.",
            "published": "2026-01-30T07:16:15Z",
            "updated": "2026-02-04T16:34:21Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "detail": "The Core Libraries are affected by product issue CORE-16539, which has a maximum CVSS 3.1 score of 9.8.",
                "firstIssued": "2026-02-23T23:25:28Z",
                "lastUpdated": "2026-02-23T23:25:28Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-523"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "CORE-16539"
                }
            ]
        },
        {
            "bom-ref": "CVE-2026-27171",
            "id": "CVE-2026-27171",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27171"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2026-27171&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "cve@mitre.org"
                    },
                    "score": 2.9,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                1284
            ],
            "description": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.",
            "published": "2026-02-18T04:16:01Z",
            "updated": "2026-02-20T16:45:28Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Connext does not use crc32_combine64 or crc32_combine_gen64 from the zlib library.",
                "firstIssued": "2026-02-23T19:37:36Z",
                "lastUpdated": "2026-02-23T19:37:36Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-536"
                },
                {
                    "name": "xray_id",
                    "value": "XRAY-945094"
                }
            ]
        },
        {
            "bom-ref": "GHSA-34x7-hfp2-rc4v",
            "id": "GHSA-34x7-hfp2-rc4v",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24842"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.2,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N"
                }
            ],
            "cwes": [
                22,
                59
            ],
            "description": "node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.",
            "published": "2026-01-28T01:16:14Z",
            "updated": "2026-02-02T14:30:10Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2026-02-09T10:33:55Z",
                "lastUpdated": "2026-02-09T10:33:55Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-497"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-24842"
                }
            ]
        },
        {
            "bom-ref": "GHSA-378v-28hj-76wf",
            "id": "GHSA-378v-28hj-76wf",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2739"
            },
            "ratings": [
                {
                    "source": {
                        "name": "report@snyk.io"
                    },
                    "score": 5.5,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "report@snyk.io"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                835
            ],
            "description": "This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.",
            "published": "2026-02-20T05:17:53Z",
            "updated": "2026-02-20T13:49:47Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "Non-applicable: The bn.js dependency is only reachable via session-file-store in 'DEMO mode.' This mode is disabled by default and requires an undocumented environment variable to initialize. As this configuration is neither supported nor active in production, the vulnerability cannot be triggered.",
                "firstIssued": "2026-03-10T14:42:57Z",
                "lastUpdated": "2026-03-10T14:42:57Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-537"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-2739"
                }
            ]
        },
        {
            "bom-ref": "GHSA-3ppc-4f35-3m26",
            "id": "GHSA-3ppc-4f35-3m26",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26996"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.7,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2026-26996&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.",
            "published": "2026-02-20T03:16:01Z",
            "updated": "2026-03-06T21:32:10Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2026-03-10T14:36:39Z",
                "lastUpdated": "2026-03-10T14:36:39Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-534"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-26996"
                }
            ]
        },
        {
            "bom-ref": "GHSA-43fc-jf86-j433",
            "id": "GHSA-43fc-jf86-j433",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                754
            ],
            "description": "Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.",
            "published": "2026-02-09T21:15:49Z",
            "updated": "2026-02-18T18:24:34Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "The arguments passed to axios are constructed using internally defined literals, ensuring no full object exposure. User input is isolated to the metadata and payload properties, preventing any __proto__ or arbitrary config injection.",
                "firstIssued": "2026-03-10T14:29:38Z",
                "lastUpdated": "2026-03-10T14:29:38Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-526"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-25639"
                }
            ]
        },
        {
            "bom-ref": "GHSA-4hjh-wcwx-xvwj",
            "id": "GHSA-4hjh-wcwx-xvwj",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                770
            ],
            "description": "Axios is a promise based HTTP client for the browser and Node.js. When Axios prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.",
            "published": "2025-09-12T02:15:46Z",
            "updated": "2025-10-24T20:56:49Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "System Designer enforces an http/https scheme via trusted configuration: the URL scheme is hardcoded using `BOT_API_URL` and cannot be changed by an attacker without access to the filesystem. Because the vulnerability requires a `data:` scheme URL, the vulnerable code path is unreachable regardless of user input.",
                "firstIssued": "2025-12-16T11:15:16Z",
                "lastUpdated": "2025-12-16T11:15:16Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-419"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-58754"
                }
            ]
        },
        {
            "bom-ref": "GHSA-52f5-9888-hmc6",
            "id": "GHSA-52f5-9888-hmc6",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-52f5-9888-hmc6"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-52f5-9888-hmc6"
                    },
                    "score": 2.5,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                59
            ],
            "description": "tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter",
            "published": "2025-08-06T17:06:04Z",
            "updated": "2025-08-07T15:11:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "Not affected, tmp is only a dependency of selenium-webdriver, which is only used for testing in module system_designer_utils.",
                "firstIssued": "2025-08-14T14:37:06Z",
                "lastUpdated": "2025-08-14T14:37:06Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-395"
                }
            ]
        },
        {
            "bom-ref": "GHSA-5j98-mcp5-4vw2",
            "id": "GHSA-5j98-mcp5-4vw2",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                78
            ],
            "description": "Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.",
            "published": "2025-11-17T18:15:58Z",
            "updated": "2025-12-02T19:34:43Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "System Designer is not impacted. The product does not provide CLI access and does not invoke glob through shell execution (e.g., with shell: true).",
                "firstIssued": "2025-12-16T11:37:17Z",
                "lastUpdated": "2025-12-16T11:37:17Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-456"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-64756"
                }
            ]
        },
        {
            "bom-ref": "GHSA-67hx-6x53-jw92",
            "id": "GHSA-67hx-6x53-jw92",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-67hx-6x53-jw92"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-67hx-6x53-jw92"
                    },
                    "score": 9.4,
                    "severity": "critical",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                }
            ],
            "cwes": [
                184,
                697
            ],
            "description": "Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code",
            "published": "2023-10-16T13:55:36Z",
            "updated": "2024-04-04T14:26:11Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Dependency only used in internal RTI tests.",
                "firstIssued": "2025-01-28T14:40:03Z",
                "lastUpdated": "2025-01-28T14:40:03Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-157"
                }
            ]
        },
        {
            "bom-ref": "GHSA-6rw7-vpxm-498p",
            "id": "GHSA-6rw7-vpxm-498p",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 8.7,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1.\n\n\nSummaryThe arrayLimit\u00a0option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause denial-of-service via memory exhaustion. Applications using arrayLimit\u00a0for DoS protection are vulnerable.\n\nDetailsThe arrayLimit\u00a0option only checks limits for indexed notation (a[0]=1&a[1]=2) but completely bypasses it for bracket notation (a[]=1&a[]=2).\n\nVulnerable code\u00a0(lib/parse.js:159-162):\n\nif (root === '[]' && options.parseArrays) {\n    obj = utils.combine([], leaf);  // No arrayLimit check\n}\n\n\n\n\n\nWorking code\u00a0(lib/parse.js:175):\n\nelse if (index <= options.arrayLimit) {  // Limit checked here\n    obj = [];\n    obj[index] = leaf;\n}\n\n\n\n\n\nThe bracket notation handler at line 159 uses utils.combine([], leaf)\u00a0without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit\u00a0before creating arrays.\n\nPoCTest 1 - Basic bypass:\n\nnpm install qs\n\n\n\n\n\nconst qs = require('qs');\nconst result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 });\nconsole.log(result.a.length);  // Output: 6 (should be max 5)\n\n\n\n\n\nTest 2 - DoS demonstration:\n\nconst qs = require('qs');\nconst attack = 'a[]=' + Array(10000).fill('x').join('&a[]=');\nconst result = qs.parse(attack, { arrayLimit: 100 });\nconsole.log(result.a.length);  // Output: 10000 (should be max 100)\n\n\n\n\n\nConfiguration:\n\n  *  arrayLimit: 5\u00a0(test 1) or arrayLimit: 100\u00a0(test 2)\n  *  Use bracket notation: a[]=value\u00a0(not indexed a[0]=value)\n\n\nImpactDenial of Service via memory exhaustion. Affects applications using qs.parse()\u00a0with user-controlled input and arrayLimit\u00a0for protection.\n\nAttack scenario:\n\n  *  Attacker sends HTTP request: GET /api/search?filters[]=x&filters[]=x&...&filters[]=x\u00a0(100,000+ times)\n  *  Application parses with qs.parse(query, { arrayLimit: 100 })\n  *  qs ignores limit, parses all 100,000 elements into array\n  *  Server memory exhausted \u2192 application crashes or becomes unresponsive\n  *  Service unavailable for all users\nReal-world impact:\n\n  *  Single malicious request can crash server\n  *  No authentication required\n  *  Easy to automate and scale\n  *  Affects any endpoint parsing query strings with bracket notation",
            "published": "2025-12-29T23:15:42Z",
            "updated": "2025-12-31T20:43:25Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI System Designer is affected by product issue SYSD-1422, which has a maximum CVSS 3.1 score of 7.5.",
                "firstIssued": "2026-01-21T11:57:11Z",
                "lastUpdated": "2026-01-21T11:57:11Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-482"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-15284"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "SYSD-1422"
                }
            ]
        },
        {
            "bom-ref": "GHSA-76c9-3jph-rj3q",
            "id": "GHSA-76c9-3jph-rj3q",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-76c9-3jph-rj3q"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-76c9-3jph-rj3q"
                    },
                    "score": 3.4,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
                }
            ],
            "cwes": [
                241
            ],
            "description": "on-headers is vulnerable to http response header manipulation",
            "published": "2025-07-17T21:17:19Z",
            "updated": "2025-07-30T21:06:13Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since on-headers is only used by express-session, which is only used to manage sessions in DEMO mode, which should not be used by the users.",
                "firstIssued": "2025-08-05T09:39:13Z",
                "lastUpdated": "2025-08-05T09:39:13Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-385"
                }
            ]
        },
        {
            "bom-ref": "GHSA-776f-qx25-q3cc",
            "id": "GHSA-776f-qx25-q3cc",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-776f-qx25-q3cc"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-776f-qx25-q3cc"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                1321
            ],
            "description": "xml2js is vulnerable to prototype pollution",
            "published": "2023-04-05T21:30:24Z",
            "updated": "2024-03-14T21:47:27Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "We use xml2js internally to compare whether the content of two XML files are equivalent or not. Attack does not apply.",
                "firstIssued": "2025-01-28T14:35:26Z",
                "lastUpdated": "2025-01-28T14:35:26Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-90"
                }
            ]
        },
        {
            "bom-ref": "GHSA-848j-6mx2-7j84",
            "id": "GHSA-848j-6mx2-7j84",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14505"
            },
            "ratings": [
                {
                    "source": {
                        "name": "36c7be3b-2937-45df-85ea-ca7133ea542c"
                    },
                    "score": 5.6,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                1240
            ],
            "description": "The ECDSA implementation of the Elliptic package generates incorrect signatures if an interim value of 'k' (as computed based on step 3.2 of  RFC 6979 https://datatracker.ietf.org/doc/html/rfc6979 ) has leading zeros and is susceptible to cryptanalysis, which can lead to secret key exposure. This happens, because the byte-length of 'k' is incorrectly computed, resulting in its getting truncated during the computation. Legitimate transactions or communications will be broken as a result.\u00a0Furthermore, due to the nature of the fault, attackers could\u2013under certain conditions\u2013derive the secret key, if they could get their hands on both a faulty signature generated by a vulnerable version of Elliptic and a correct signature for the same inputs.\n\nThis issue affects all known versions of Elliptic (at the time of writing, versions less than or equal to 6.6.1).",
            "published": "2026-01-08T21:15:42Z",
            "updated": "2026-01-13T14:03:46Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2026-01-21T11:59:42Z",
                "lastUpdated": "2026-01-21T11:59:42Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-489"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-14505"
                }
            ]
        },
        {
            "bom-ref": "GHSA-8cj5-5rvv-wf4v",
            "id": "GHSA-8cj5-5rvv-wf4v",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.7,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                22
            ],
            "description": "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore option to ignore non files/directories.",
            "published": "2025-06-02T20:15:22Z",
            "updated": "2025-06-04T14:54:33Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since tar-fs is only used by geckodriver, which is only used by the tests.",
                "firstIssued": "2025-06-05T14:23:17Z",
                "lastUpdated": "2025-06-05T14:23:17Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-360"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-48387"
                }
            ]
        },
        {
            "bom-ref": "GHSA-8qq5-rm4j-mr97",
            "id": "GHSA-8qq5-rm4j-mr97",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23745"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.2,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                22
            ],
            "description": "node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.",
            "published": "2026-01-16T22:16:26Z",
            "updated": "2026-01-16T22:16:26Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2026-01-21T12:34:19Z",
                "lastUpdated": "2026-01-21T12:34:19Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-494"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-23745"
                }
            ]
        },
        {
            "bom-ref": "GHSA-952p-6rrq-rcjv",
            "id": "GHSA-952p-6rrq-rcjv",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-952p-6rrq-rcjv"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-952p-6rrq-rcjv"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Regular Expression Denial of Service (ReDoS) in micromatch",
            "published": "2024-05-14T18:30:54Z",
            "updated": "2024-08-28T13:12:27Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected. micromatch is only a transitive dependency used by jest to run System Designer's tests.",
                "firstIssued": "2024-08-22T14:10:41.664000Z",
                "lastUpdated": "2024-11-20T10:36:35.304000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-251"
                }
            ]
        },
        {
            "bom-ref": "GHSA-95m3-7q98-8xr5",
            "id": "GHSA-95m3-7q98-8xr5",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9288"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in sha.js allows Input Data Manipulation.This issue affects sha.js: through 2.4.11.",
            "published": "2025-08-20T22:15:30Z",
            "updated": "2025-08-22T18:09:17Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "sha.js is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-08-26T07:58:42Z",
                "lastUpdated": "2025-08-26T07:58:42Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-405"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-9288"
                }
            ]
        },
        {
            "bom-ref": "GHSA-968p-4wvh-cqc8",
            "id": "GHSA-968p-4wvh-cqc8",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-968p-4wvh-cqc8"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-968p-4wvh-cqc8"
                    },
                    "score": 6.2,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Babel has inefficient RexExp complexity in generated code with .replace when transpiling named capturing groups",
            "published": "2025-03-11T20:30:18Z",
            "updated": "2025-03-12T14:48:10Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Babel is a transitive dependency used by System Designer through Express. We don't use regex in the affected functionality. Furthermore, we are only serving a small amount of request coming from local host.",
                "firstIssued": "2025-04-14T11:26:18Z",
                "lastUpdated": "2025-04-14T11:26:18Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-320"
                }
            ]
        },
        {
            "bom-ref": "GHSA-9wv6-86v2-598j",
            "id": "GHSA-9wv6-86v2-598j",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-9wv6-86v2-598j"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-9wv6-86v2-598j"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "path-to-regexp outputs backtracking regular expressions",
            "published": "2024-09-09T20:19:15Z",
            "updated": "2025-01-24T21:32:30Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_perimeter",
                "detail": "This vulnerability only impacts performance (server would run slower) when using unsafe regexes. Moreover, users would need to attack their own system designer server from localhost.",
                "firstIssued": "2024-09-10T11:08:20.860000Z",
                "lastUpdated": "2024-11-29T13:02:33.533000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-261"
                }
            ]
        },
        {
            "bom-ref": "GHSA-cm22-4g7w-348p",
            "id": "GHSA-cm22-4g7w-348p",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-cm22-4g7w-348p"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-cm22-4g7w-348p"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "serve-static vulnerable to template injection that can lead to XSS",
            "published": "2024-09-10T19:42:33Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-09-25T23:45:21.640000Z",
                "lastUpdated": "2024-11-20T14:42:47.798000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-265"
                }
            ]
        },
        {
            "bom-ref": "GHSA-cpq7-6gpm-g9rc",
            "id": "GHSA-cpq7-6gpm-g9rc",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9287"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in cipher-base allows Input Data Manipulation.This issue affects cipher-base: through 1.0.4.",
            "published": "2025-08-20T22:15:30Z",
            "updated": "2025-08-22T18:09:17Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "cipher-base is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-08-26T07:52:50Z",
                "lastUpdated": "2025-08-26T07:52:50Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-404"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-9287"
                }
            ]
        },
        {
            "bom-ref": "GHSA-fc9h-whq2-v747",
            "id": "GHSA-fc9h-whq2-v747",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-fc9h-whq2-v747"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-fc9h-whq2-v747"
                    },
                    "score": 4.8,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                }
            ],
            "cwes": [
                347
            ],
            "description": "Valid ECDSA signatures erroneously rejected in Elliptic",
            "published": "2024-10-15T15:30:56Z",
            "updated": "2024-12-20T15:30:48Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-10-22T09:33:44.739000Z",
                "lastUpdated": "2024-10-29T13:42:14.246000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-272"
                }
            ]
        },
        {
            "bom-ref": "GHSA-fjxv-7rqg-78g4",
            "id": "GHSA-fjxv-7rqg-78g4",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4"
                    },
                    "severity": "critical"
                }
            ],
            "cwes": [
                330
            ],
            "description": "form-data uses unsafe random function in form-data for choosing boundary",
            "published": "2025-07-21T19:04:54Z",
            "updated": "2025-07-21T19:04:58Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since form-data is only used by axios, which we only use to communicate with the Connext AI Platform.",
                "firstIssued": "2025-07-31T11:15:08Z",
                "lastUpdated": "2025-07-31T11:15:08Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-384"
                }
            ]
        },
        {
            "bom-ref": "GHSA-h7cp-r72f-jxh6:0",
            "id": "GHSA-h7cp-r72f-jxh6:0",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6545"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.\n\nThis issue affects pbkdf2: from 3.0.10 through 3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-09-09T15:24:37Z",
                "lastUpdated": "2025-09-09T15:24:37Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-413"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-6545"
                }
            ]
        },
        {
            "bom-ref": "GHSA-j965-2qgj-vjmq",
            "id": "GHSA-j965-2qgj-vjmq",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-j965-2qgj-vjmq"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-j965-2qgj-vjmq"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                }
            ],
            "cwes": [
                20
            ],
            "description": "JavaScript SDK v2 users should add validation to the region parameter value in or migrate to v3",
            "published": "2026-01-08T22:04:26Z",
            "updated": "2026-01-08T22:04:28Z",
            "analysis": {
                "state": "not_affected",
                "justification": "protected_at_runtime",
                "detail": "The affected dependency is rticonnextdds-typerepoutils, which is an internal component not intended for direct user consumption. The functionality it provides is neither publicly documented nor officially supported.",
                "firstIssued": "2026-01-21T12:32:52Z",
                "lastUpdated": "2026-01-21T12:32:52Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-490"
                }
            ]
        },
        {
            "bom-ref": "GHSA-jr5f-v2jv-69x6",
            "id": "GHSA-jr5f-v2jv-69x6",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-jr5f-v2jv-69x6"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-jr5f-v2jv-69x6"
                    },
                    "severity": "high"
                }
            ],
            "cwes": [
                918
            ],
            "description": "axios Requests Vulnerable To Possible SSRF and Credential Leakage via Absolute URL",
            "published": "2025-03-07T15:16:00Z",
            "updated": "2025-03-07T19:16:41Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because we don't use relative URLs. We always call axios with full URL and baseURL is never used in our code.",
                "firstIssued": "2025-03-14T13:09:55Z",
                "lastUpdated": "2025-03-14T13:09:55Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-319"
                }
            ]
        },
        {
            "bom-ref": "GHSA-m6fv-jmcg-4jfg",
            "id": "GHSA-m6fv-jmcg-4jfg",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "send vulnerable to template injection that can lead to XSS",
            "published": "2024-09-10T19:42:41Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-09-25T23:44:20.931000Z",
                "lastUpdated": "2024-11-20T14:42:47.452000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-264"
                }
            ]
        },
        {
            "bom-ref": "GHSA-mh29-5h37-fv8m",
            "id": "GHSA-mh29-5h37-fv8m",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-mh29-5h37-fv8m"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-mh29-5h37-fv8m"
                    },
                    "score": 5.3,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                }
            ],
            "cwes": [
                1321
            ],
            "description": "js-yaml has prototype pollution in merge (<<)",
            "published": "2025-11-14T14:29:48Z",
            "updated": "2025-11-17T15:20:44Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code",
                "firstIssued": "2025-11-17T17:32:01Z",
                "lastUpdated": "2025-11-17T17:32:01Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-454"
                }
            ]
        },
        {
            "bom-ref": "GHSA-pq67-2wwv-3xjx",
            "id": "GHSA-pq67-2wwv-3xjx",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                }
            ],
            "cwes": [
                22
            ],
            "description": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File",
            "published": "2025-03-27T18:31:28Z",
            "updated": "2025-03-28T22:11:43Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since we don't allow the upload of tar files in any way to the server. Apart from that tar-fs is only used by geckodriver, which is only used by the tests.",
                "firstIssued": "2025-04-24T14:09:56Z",
                "lastUpdated": "2025-04-24T14:09:56Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-333"
                }
            ]
        },
        {
            "bom-ref": "GHSA-pxg6-pf52-xh8x",
            "id": "GHSA-pxg6-pf52-xh8x",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x"
                    },
                    "severity": "low"
                }
            ],
            "cwes": [
                74
            ],
            "description": "cookie accepts cookie name, path, and domain with out of bounds characters",
            "published": "2024-10-04T20:31:00Z",
            "updated": "2024-10-04T20:31:01Z",
            "analysis": {
                "state": "not_affected",
                "firstIssued": "2024-10-07T14:46:49.363000Z",
                "lastUpdated": "2024-10-29T13:42:12.608000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-267"
                }
            ]
        },
        {
            "bom-ref": "GHSA-qw6h-vgh9-j6wx",
            "id": "GHSA-qw6h-vgh9-j6wx",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-qw6h-vgh9-j6wx"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-qw6h-vgh9-j6wx"
                    },
                    "score": 5.0,
                    "severity": "medium",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                }
            ],
            "cwes": [
                79
            ],
            "description": "express vulnerable to XSS via response.redirect()",
            "published": "2024-09-10T19:41:04Z",
            "updated": "2024-11-18T16:27:12Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because we don't call redirect, which is the problematic function, anywhere in System Designer code.",
                "firstIssued": "2024-09-25T23:42:59.291000Z",
                "lastUpdated": "2024-11-20T14:42:48.179000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-263"
                }
            ]
        },
        {
            "bom-ref": "GHSA-qwcr-r2fm-qrc7",
            "id": "GHSA-qwcr-r2fm-qrc7",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45590"
            },
            "ratings": [
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2024-45590&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                }
            ],
            "cwes": [
                405
            ],
            "description": "body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.",
            "published": "2024-09-10T16:15:21Z",
            "updated": "2024-09-20T16:26:44Z",
            "recommendation": "Update to a Connext Professional release that does not include the vulnerable version of this third-party software.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI System Designer is affected by product issue SYSD-1420, which has a maximum CVSS 3.1 score of 7.5.",
                "firstIssued": "2025-12-02T10:37:30Z",
                "lastUpdated": "2025-12-02T10:37:30Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-400"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2024-45590"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "SYSD-1420"
                }
            ]
        },
        {
            "bom-ref": "GHSA-r6q2-hw4h-h46w",
            "id": "GHSA-r6q2-hw4h-h46w",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23950"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.8,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L"
                }
            ],
            "cwes": [
                176,
                352,
                367
            ],
            "description": "node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `\u00df` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `\u00df` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `\u00df` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.",
            "published": "2026-01-20T01:15:57Z",
            "updated": "2026-01-26T15:05:23Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2026-02-09T10:33:14Z",
                "lastUpdated": "2026-02-09T10:33:14Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-497"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-23950"
                }
            ]
        },
        {
            "bom-ref": "GHSA-rhx6-c78j-4q9w",
            "id": "GHSA-rhx6-c78j-4q9w",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-rhx6-c78j-4q9w"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-rhx6-c78j-4q9w"
                    },
                    "severity": "high"
                }
            ],
            "cwes": [
                1333
            ],
            "description": "Unpatched `path-to-regexp` ReDoS in 0.1.x",
            "published": "2024-12-05T22:40:47Z",
            "updated": "2025-01-24T21:41:09Z",
            "analysis": {
                "state": "not_affected",
                "detail": "Not affected since we don't use regex to match routes. Below are all the routes that we serve. In this web is shown an example of a problematic route ReDoS the web which we don't use at all in System Designer.",
                "firstIssued": "2024-12-19T10:22:00.760000Z",
                "lastUpdated": "2025-01-13T09:28:41.410000Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-286"
                }
            ]
        },
        {
            "bom-ref": "GHSA-v62p-rq8g-8h59:0",
            "id": "GHSA-v62p-rq8g-8h59:0",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6547"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 9.1,
                    "severity": "critical",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                20
            ],
            "description": "Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation.This issue affects pbkdf2: <=3.1.2.",
            "published": "2025-06-23T19:15:25Z",
            "updated": "2025-06-23T20:16:21Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "pbkdf2 is a transitive dependency used by browserify which is only used during build time to bundle DDS QoS Properties JSON file into the installation for UI usage.",
                "firstIssued": "2025-09-09T15:22:54Z",
                "lastUpdated": "2025-09-09T15:22:54Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-413"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-6547"
                }
            ]
        },
        {
            "bom-ref": "GHSA-v6h2-p8h4-qcjw",
            "id": "GHSA-v6h2-p8h4-qcjw",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5889"
            },
            "ratings": [
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 2.3,
                    "severity": "low",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 3.1,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                },
                {
                    "source": {
                        "name": "cna@vuldb.com"
                    },
                    "score": 2.1,
                    "severity": "low",
                    "method": "CVSSv2",
                    "vector": "CVSS:2.0/AV:N/AC:H/Au:S/C:N/I:N/A:P"
                }
            ],
            "cwes": [
                400,
                1333
            ],
            "description": "A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to upgrade the affected component.",
            "published": "2025-06-09T19:15:25Z",
            "updated": "2025-06-12T16:06:47Z",
            "recommendation": "Enforce least-privilege principles on systems running Connext, protecting Connext applications from unauthorized modification or access.",
            "analysis": {
                "state": "exploitable",
                "detail": "RTI System Designer is affected by product issue SYSD-1413, which has a maximum CVSS 3.1 score of 3.1.",
                "firstIssued": "2025-09-03T15:45:43Z",
                "lastUpdated": "2025-10-28T17:15:19Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-389"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-5889"
                },
                {
                    "name": "rti_vulnerability_id",
                    "value": "SYSD-1413"
                }
            ]
        },
        {
            "bom-ref": "GHSA-vj76-c3g6-qr5v",
            "id": "GHSA-vj76-c3g6-qr5v",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59343"
            },
            "ratings": [
                {
                    "source": {
                        "name": "security-advisories@github.com"
                    },
                    "score": 8.7,
                    "severity": "high",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                22,
                61
            ],
            "description": "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A workaround involves using the ignore option on non files/directories.",
            "published": "2025-09-24T18:15:42Z",
            "updated": "2025-09-26T14:32:53Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected because tar-fs is only a dependency of geckodriver which is only used for testing.",
                "firstIssued": "2025-10-14T09:37:10Z",
                "lastUpdated": "2025-10-14T09:37:10Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-432"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-59343"
                }
            ]
        },
        {
            "bom-ref": "GHSA-vjh7-7g9h-fjfh",
            "id": "GHSA-vjh7-7g9h-fjfh",
            "source": {
                "name": "GHSA",
                "url": "https://github.com/advisories/GHSA-vjh7-7g9h-fjfh"
            },
            "ratings": [
                {
                    "source": {
                        "name": "GHSA",
                        "url": "https://github.com/advisories/GHSA-vjh7-7g9h-fjfh"
                    },
                    "severity": "critical"
                }
            ],
            "cwes": [
                200
            ],
            "description": "Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string)",
            "published": "2025-02-12T19:47:52Z",
            "updated": "2025-02-12T19:47:53Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Not affected since System Designer don\u2019t make any use of security (https) as of now. All traffic is unencrypted since the server only accepts requests for localhost.",
                "firstIssued": "2025-02-19T11:04:38Z",
                "lastUpdated": "2025-02-19T11:04:38Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-309"
                }
            ]
        },
        {
            "bom-ref": "GHSA-w7fw-mjwx-w883",
            "id": "GHSA-w7fw-mjwx-w883",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2391"
            },
            "ratings": [
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 6.3,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                },
                {
                    "source": {
                        "name": "NVD",
                        "url": "https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2026-2391&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1"
                    },
                    "score": 7.5,
                    "severity": "high",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "source": {
                        "name": "7ffcee3d-2c14-4c3e-b844-86c6a321a158"
                    },
                    "score": 3.7,
                    "severity": "low",
                    "method": "CVSSv31",
                    "vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "cwes": [
                20
            ],
            "description": "### Summary\nThe `arrayLimit` option in qs does not enforce limits for comma-separated values when `comma: true` is enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass addressed in GHSA-6rw7-vpxm-498p (CVE-2025-15284).\n\n### Details\nWhen the `comma` option is set to `true` (not the default, but configurable in applications), qs allows parsing comma-separated strings as arrays (e.g., `?param=a,b,c` becomes `['a', 'b', 'c']`). However, the limit check for `arrayLimit` (default: 20) and the optional throwOnLimitExceeded occur after the comma-handling logic in `parseArrayValue`, enabling a bypass. This permits creation of arbitrarily large arrays from a single parameter, leading to excessive memory allocation.\n\n**Vulnerable code** (lib/parse.js: lines ~40-50):\n```js\nif (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) {\n\u00a0 \u00a0 return val.split(',');\n}\n\nif (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) {\n\u00a0 \u00a0 throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.');\n}\n\nreturn val;\n```\nThe `split(',')` returns the array immediately, skipping the subsequent limit check. Downstream merging via `utils.combine` does not prevent allocation, even if it marks overflows for sparse arrays.This discrepancy allows attackers to send a single parameter with millions of commas (e.g., `?param=,,,,,,,,...`), allocating massive arrays in memory without triggering limits. It bypasses the intent of `arrayLimit`, which is enforced correctly for indexed (`a[0]=`) and bracket (`a[]=`) notations (the latter fixed in v6.14.1 per GHSA-6rw7-vpxm-498p).\n\n### PoC\n**Test 1 - Basic bypass:**\n```\nnpm install qs\n```\n\n```js\nconst qs = require('qs');\n\nconst payload = 'a=' + ','.repeat(25);  // 26 elements after split (bypasses arrayLimit: 5)\nconst options = { comma: true, arrayLimit: 5, throwOnLimitExceeded: true };\n\ntry {\n\u00a0 const result = qs.parse(payload, options);\n\u00a0 console.log(result.a.length);  // Outputs: 26 (bypass successful)\n} catch (e) {\n\u00a0 console.log('Limit enforced:', e.message);  // Not thrown\n}\n```\n**Configuration:**\n- `comma: true`\n- `arrayLimit: 5`\n- `throwOnLimitExceeded: true`\n\nExpected: Throws \"Array limit exceeded\" error.\nActual: Parses successfully, creating an array of length 26.\n\n\n### Impact\nDenial of Service (DoS) via memory exhaustion.",
            "published": "2026-02-12T05:17:11Z",
            "updated": "2026-02-24T20:13:51Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_reachable",
                "detail": "Both body-parser and express are unaffected by this qs vulnerability. A code audit confirms that qs.parse is called only once in each codebase, and in both instances, the comma option is omitted. Without comma: true, the logic responsible for the vulnerability is never executed.",
                "firstIssued": "2026-03-10T14:34:35Z",
                "lastUpdated": "2026-03-10T14:34:35Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-530"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2026-2391"
                }
            ]
        },
        {
            "bom-ref": "GHSA-xxjr-mmjv-4gpg",
            "id": "GHSA-xxjr-mmjv-4gpg",
            "source": {
                "name": "NVD",
                "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
            },
            "ratings": [
                {
                    "source": {
                        "name": "ce714d77-add3-4f53-aff5-83d477b104bb"
                    },
                    "score": 6.9,
                    "severity": "medium",
                    "method": "CVSSv4",
                    "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
                }
            ],
            "cwes": [
                1321
            ],
            "description": "Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset\u00a0and _.omit\u00a0functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.\n\nThe issue permits deletion of properties but does not allow overwriting their original behavior.\n\nThis issue is patched on 4.17.23",
            "published": "2026-01-21T20:16:05Z",
            "updated": "2026-01-26T15:04:59Z",
            "analysis": {
                "state": "not_affected",
                "justification": "code_not_present",
                "detail": "The dependency is a transitive development dependency, not used in production code.",
                "firstIssued": "2026-02-09T10:35:30Z",
                "lastUpdated": "2026-02-09T10:35:30Z"
            },
            "affects": [
                {
                    "ref": "Connext Pro"
                }
            ],
            "properties": [
                {
                    "name": "rti_id",
                    "value": "THIRDPARTY-498"
                },
                {
                    "name": "cve_id",
                    "value": "CVE-2025-13465"
                }
            ]
        }
    ]
}