{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "postgresql-42.7.5.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/opt/postgresql-42.7.5.jar",
      "fingerprint" : "FALLBACK-d5f4f223",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-49146: LanguageSpecificPackageVulnerability\u000a\u000apgjdbc: pgjdbc insecure authentication in channel binding\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49146**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.postgresql:postgresql|42.7.7|[CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)|\u000a\u000apgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7.\u000a\u000aPackage: org.postgresql:postgresql\u000aInstalled Version: 42.7.5\u000aVulnerability CVE-2025-49146\u000aSeverity: HIGH\u000aFixed Version: 42.7.7\u000aLink: [CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1252",
      "severity" : "HIGH",
      "toString" : "postgresql-42.7.5.jar(1,0): CVE-2025-49146: : CVE-2025-49146: LanguageSpecificPackageVulnerability\u000a\u000apgjdbc: pgjdbc insecure authentication in channel binding\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49146**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.postgresql:postgresql|42.7.7|[CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)|\u000a\u000apgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were protected by channel binding requirements. This vulnerability is fixed in 42.7.7.\u000a\u000aPackage: org.postgresql:postgresql\u000aInstalled Version: 42.7.5\u000aVulnerability CVE-2025-49146\u000aSeverity: HIGH\u000aFixed Version: 42.7.7\u000aLink: [CVE-2025-49146](https://avd.aquasec.com/nvd/cve-2025-49146)",
      "type" : "CVE-2025-49146"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "catalina.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/lib/catalina.jar",
      "fingerprint" : "FALLBACK-d5dc90be",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-48988: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat DoS in multipart upload\u000a\u000aFor additional help see: **Vulnerability CVE-2025-48988**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)|\u000a\u000aAllocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-48988\u000aSeverity: HIGH\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1252",
      "severity" : "HIGH",
      "toString" : "catalina.jar(1,0): CVE-2025-48988: : CVE-2025-48988: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat DoS in multipart upload\u000a\u000aFor additional help see: **Vulnerability CVE-2025-48988**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)|\u000a\u000aAllocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-48988\u000aSeverity: HIGH\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)",
      "type" : "CVE-2025-48988"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "catalina.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/lib/catalina.jar",
      "fingerprint" : "FALLBACK-87cc2ab5",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-49125: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat: Security constraint bypass for pre/post-resources\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49125**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)|\u000a\u000aAuthentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-49125\u000aSeverity: MEDIUM\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1252",
      "severity" : "NORMAL",
      "toString" : "catalina.jar(1,0): CVE-2025-49125: : CVE-2025-49125: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat: Security constraint bypass for pre/post-resources\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49125**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)|\u000a\u000aAuthentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-49125\u000aSeverity: MEDIUM\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)",
      "type" : "CVE-2025-49125"
    }
  ],
  "size" : 3,
  "toString" : "3 warnings (high: 2, normal: 1)"
}