{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "spring-core-6.2.10.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/webapps/govwayAPIMonitor.war/WEB-INF/lib/spring-core-6.2.10.jar",
      "fingerprint" : "FALLBACK-9535f291",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-41249: LanguageSpecificPackageVulnerability\u000a\u000aThe Spring Framework annotation detection mechanism may not correctly  ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-41249**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.springframework:spring-core|6.2.11|[CVE-2025-41249](https://avd.aquasec.com/nvd/cve-2025-41249)|\u000a\u000aThe Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.\u000a\u000aYour application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.\u000a\u000aYou are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.\u000a\u000aThis CVE is published in conjunction with  CVE-2025-41248 https://spring.io/security/cve-2025-41248 .\u000a\u000aPackage: org.springframework:spring-core\u000aInstalled Version: 6.2.10\u000aVulnerability CVE-2025-41249\u000aSeverity: HIGH\u000aFixed Version: 6.2.11\u000aLink: [CVE-2025-41249](https://avd.aquasec.com/nvd/cve-2025-41249)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1323",
      "severity" : "HIGH",
      "toString" : "spring-core-6.2.10.jar(1,0): CVE-2025-41249: : CVE-2025-41249: LanguageSpecificPackageVulnerability\u000a\u000aThe Spring Framework annotation detection mechanism may not correctly  ...\u000a\u000aFor additional help see: **Vulnerability CVE-2025-41249**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.springframework:spring-core|6.2.11|[CVE-2025-41249](https://avd.aquasec.com/nvd/cve-2025-41249)|\u000a\u000aThe Spring Framework annotation detection mechanism may not correctly resolve annotations on methods within type hierarchies with a parameterized super type with unbounded generics. This can be an issue if such annotations are used for authorization decisions.\u000a\u000aYour application may be affected by this if you are using Spring Security's @EnableMethodSecurity feature.\u000a\u000aYou are not affected by this if you are not using @EnableMethodSecurity or if you do not use security annotations on methods in generic superclasses or generic interfaces.\u000a\u000aThis CVE is published in conjunction with  CVE-2025-41248 https://spring.io/security/cve-2025-41248 .\u000a\u000aPackage: org.springframework:spring-core\u000aInstalled Version: 6.2.10\u000aVulnerability CVE-2025-41249\u000aSeverity: HIGH\u000aFixed Version: 6.2.11\u000aLink: [CVE-2025-41249](https://avd.aquasec.com/nvd/cve-2025-41249)",
      "type" : "CVE-2025-41249"
    }
  ],
  "size" : 1,
  "toString" : "1 warning (high: 1)"
}