{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "postgresql-42.7.5.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/opt/postgresql-42.7.5.jar",
      "fingerprint" : "FALLBACK-d5f4f223",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-49146: LanguageSpecificPackageVulnerability\u000a\u000apgjdbc: pgjdbc insecure authentication in channel binding\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49146**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.postgresql:postgresql|42.7.7|[CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)|\u000a\u000apgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7.\u000a\u000aPackage: org.postgresql:postgresql\u000aInstalled Version: 42.7.5\u000aVulnerability CVE-2025-49146\u000aSeverity: HIGH\u000aFixed Version: 42.7.7\u000aLink: [CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1251",
      "severity" : "HIGH",
      "toString" : "postgresql-42.7.5.jar(1,0): CVE-2025-49146: : CVE-2025-49146: LanguageSpecificPackageVulnerability\u000a\u000apgjdbc: pgjdbc insecure authentication in channel binding\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49146**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.postgresql:postgresql|42.7.7|[CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)|\u000a\u000apgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7.\u000a\u000aPackage: org.postgresql:postgresql\u000aInstalled Version: 42.7.5\u000aVulnerability CVE-2025-49146\u000aSeverity: HIGH\u000aFixed Version: 42.7.7\u000aLink: [CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)",
      "type" : "CVE-2025-49146"
    }
  ],
  "size" : 1,
  "toString" : "1 warning (high: 1)"
}