No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3w8q-xq97-5j7x | Rhino has high CPU usage and potential DoS when passing specific numbers to `toFixed()` function |
Tue, 14 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mozilla:rhino:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:rhino:1.7.15:*:*:*:*:*:*:* cpe:2.3:a:mozilla:rhino:1.8.0:*:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilla
Mozilla rhino |
|
| Vendors & Products |
Mozilla
Mozilla rhino |
Wed, 03 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1. | |
| Title | Rhino vulnerable high CPU usage and potential DoS when passing specific numbers to toFixed() function | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-03T19:43:58.830Z
Reserved: 2025-12-01T18:44:35.639Z
Link: CVE-2025-66453
Updated: 2025-12-03T19:43:52.077Z
Status : Analyzed
Published: 2025-12-03T20:16:26.897
Modified: 2026-04-14T15:39:20.143
Link: CVE-2025-66453
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:43:59Z
Github GHSA