Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.rti.com/vulnerabilities/#cve-2024-52064 |
![]() ![]() |
Thu, 02 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Mon, 16 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Dec 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.0.0 before 7.3.0.2, from 6.1.0 before 6.1.2.21, from 6.0.0 before 6.0.1.40, from 5.0.0 before 5.3.1.45. | |
Title | Potential stack buffer write overflow in Connext applications while parsing malicious license file | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: RTI
Published:
Updated: 2025-02-07T21:49:10.582Z
Reserved: 2024-11-05T19:04:16.676Z
Link: CVE-2024-52064

Updated: 2024-12-16T16:52:44.853Z

Status : Analyzed
Published: 2024-12-13T11:15:08.963
Modified: 2025-10-02T13:52:34.303
Link: CVE-2024-52064

No data.

Updated: 2025-07-13T21:06:50Z