Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.rti.com/vulnerabilities/#cve-2024-52061 |
![]() ![]() |
Thu, 02 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries, Queuing Service, Recording Service, Routing Service) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.5, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45. | |
Title | Potential stack buffer overflow when parsing an XML type | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-02-07T21:48:42.491Z
Reserved: 2024-11-05T19:04:16.675Z
Link: CVE-2024-52061

Updated: 2024-12-23T20:02:40.565Z

Status : Analyzed
Published: 2024-12-13T11:15:08.457
Modified: 2025-10-02T13:38:37.063
Link: CVE-2024-52061

No data.

Updated: 2025-07-13T11:21:48Z