{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-a37b8319",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-4575: OsPackageVulnerability\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 applicat ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-4575**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|libssl3|3.5.1-r0|[CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)|\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 application adds\u000aa trusted use instead of a rejected use for a certificate.\u000a\u000aImpact summary: If a user intends to make a trusted certificate rejected for\u000aa particular use it will be instead marked as trusted for that use.\u000a\u000aA copy & paste error during minor refactoring of the code introduced this\u000aissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate\u000ashould be trusted only for the purpose of authenticating TLS servers but not\u000afor CMS signature verification and the CMS signature verification is intended\u000ato be marked as rejected with the -addreject option, the resulting CA\u000acertificate will be trusted for CMS signature verification purpose instead.\u000a\u000aOnly users which use the trusted certificate format who use the openssl x509\u000acommand line application to add rejected uses are affected by this issue.\u000aThe issues affecting only the command line application are considered to\u000abe Low severity.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue.\u000a\u000aOpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this\u000aissue.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.0-r0\u000aVulnerability CVE-2025-4575\u000aSeverity: UNKNOWN\u000aFixed Version: 3.5.1-r0\u000aLink: [CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1258",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2025-4575: : CVE-2025-4575: OsPackageVulnerability\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 applicat ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-4575**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|libssl3|3.5.1-r0|[CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)|\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 application adds\u000aa trusted use instead of a rejected use for a certificate.\u000a\u000aImpact summary: If a user intends to make a trusted certificate rejected for\u000aa particular use it will be instead marked as trusted for that use.\u000a\u000aA copy & paste error during minor refactoring of the code introduced this\u000aissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate\u000ashould be trusted only for the purpose of authenticating TLS servers but not\u000afor CMS signature verification and the CMS signature verification is intended\u000ato be marked as rejected with the -addreject option, the resulting CA\u000acertificate will be trusted for CMS signature verification purpose instead.\u000a\u000aOnly users which use the trusted certificate format who use the openssl x509\u000acommand line application to add rejected uses are affected by this issue.\u000aThe issues affecting only the command line application are considered to\u000abe Low severity.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue.\u000a\u000aOpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this\u000aissue.\u000a\u000aPackage: libcrypto3\u000aInstalled Version: 3.5.0-r0\u000aVulnerability CVE-2025-4575\u000aSeverity: UNKNOWN\u000aFixed Version: 3.5.1-r0\u000aLink: [CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)",
      "type" : "CVE-2025-4575"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-a37b8319",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-4575: OsPackageVulnerability\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 applicat ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-4575**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|libssl3|3.5.1-r0|[CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)|\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 application adds\u000aa trusted use instead of a rejected use for a certificate.\u000a\u000aImpact summary: If a user intends to make a trusted certificate rejected for\u000aa particular use it will be instead marked as trusted for that use.\u000a\u000aA copy & paste error during minor refactoring of the code introduced this\u000aissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate\u000ashould be trusted only for the purpose of authenticating TLS servers but not\u000afor CMS signature verification and the CMS signature verification is intended\u000ato be marked as rejected with the -addreject option, the resulting CA\u000acertificate will be trusted for CMS signature verification purpose instead.\u000a\u000aOnly users which use the trusted certificate format who use the openssl x509\u000acommand line application to add rejected uses are affected by this issue.\u000aThe issues affecting only the command line application are considered to\u000abe Low severity.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue.\u000a\u000aOpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this\u000aissue.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.0-r0\u000aVulnerability CVE-2025-4575\u000aSeverity: UNKNOWN\u000aFixed Version: 3.5.1-r0\u000aLink: [CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1258",
      "severity" : "LOW",
      "toString" : "govway(1,0): CVE-2025-4575: : CVE-2025-4575: OsPackageVulnerability\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 applicat ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-4575**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|UNKNOWN|libssl3|3.5.1-r0|[CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)|\u000a\u000aIssue summary: Use of -addreject option with the openssl x509 application adds\u000aa trusted use instead of a rejected use for a certificate.\u000a\u000aImpact summary: If a user intends to make a trusted certificate rejected for\u000aa particular use it will be instead marked as trusted for that use.\u000a\u000aA copy & paste error during minor refactoring of the code introduced this\u000aissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate\u000ashould be trusted only for the purpose of authenticating TLS servers but not\u000afor CMS signature verification and the CMS signature verification is intended\u000ato be marked as rejected with the -addreject option, the resulting CA\u000acertificate will be trusted for CMS signature verification purpose instead.\u000a\u000aOnly users which use the trusted certificate format who use the openssl x509\u000acommand line application to add rejected uses are affected by this issue.\u000aThe issues affecting only the command line application are considered to\u000abe Low severity.\u000a\u000aThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\u000aissue.\u000a\u000aOpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this\u000aissue.\u000a\u000aPackage: libssl3\u000aInstalled Version: 3.5.0-r0\u000aVulnerability CVE-2025-4575\u000aSeverity: UNKNOWN\u000aFixed Version: 3.5.1-r0\u000aLink: [CVE-2025-4575](https://avd.aquasec.com/nvd/cve-2025-4575)",
      "type" : "CVE-2025-4575"
    }
  ],
  "size" : 2,
  "toString" : "2 warnings (low: 2)"
}