Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3w8q-xq97-5j7x | Rhino has high CPU usage and potential DoS when passing specific numbers to `toFixed()` function |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mozilla
Mozilla rhino |
|
| Vendors & Products |
Mozilla
Mozilla rhino |
Wed, 03 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1. | |
| Title | Rhino vulnerable high CPU usage and potential DoS when passing specific numbers to toFixed() function | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-03T19:43:58.830Z
Reserved: 2025-12-01T18:44:35.639Z
Link: CVE-2025-66453
Updated: 2025-12-03T19:43:52.077Z
Status : Awaiting Analysis
Published: 2025-12-03T20:16:26.897
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-66453
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:43:59Z
Github GHSA