{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "rhino-1.7.14.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/webapps/govwayConsole.war/WEB-INF/lib/rhino-1.7.14.jar",
      "fingerprint" : "FALLBACK-2c85e6c6",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-66453: LanguageSpecificPackageVulnerability\u000a\u000aRhino is an open-source implementation of JavaScript written entirely  ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-66453**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|org.mozilla:rhino|1.7.14.1, 1.7.15.1, 1.8.1|[CVE-2025-66453](https://avd.aquasec.com/nvd/cve-2025-66453)|\u000a\u000aRhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.\u000a\u000aPackage: org.mozilla:rhino\u000aInstalled Version: 1.7.14\u000aVulnerability CVE-2025-66453\u000aSeverity: LOW\u000aFixed Version: 1.7.14.1, 1.7.15.1, 1.8.1\u000aLink: [CVE-2025-66453](https://avd.aquasec.com/nvd/cve-2025-66453)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1334",
      "severity" : "LOW",
      "toString" : "rhino-1.7.14.jar(1,0): CVE-2025-66453: : CVE-2025-66453: LanguageSpecificPackageVulnerability\u000a\u000aRhino is an open-source implementation of JavaScript written entirely  ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-66453**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|LOW|org.mozilla:rhino|1.7.14.1, 1.7.15.1, 1.8.1|[CVE-2025-66453](https://avd.aquasec.com/nvd/cve-2025-66453)|\u000a\u000aRhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.\u000a\u000aPackage: org.mozilla:rhino\u000aInstalled Version: 1.7.14\u000aVulnerability CVE-2025-66453\u000aSeverity: LOW\u000aFixed Version: 1.7.14.1, 1.7.15.1, 1.8.1\u000aLink: [CVE-2025-66453](https://avd.aquasec.com/nvd/cve-2025-66453)",
      "type" : "CVE-2025-66453"
    }
  ],
  "size" : 1,
  "toString" : "1 warning (low: 1)"
}