{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:09:02.168","vulnerabilities":[{"cve":{"id":"CVE-2025-23085","sourceIdentifier":"support@hackerone.com","published":"2025-02-07T07:15:15.810","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\r\n\r\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x."},{"lang":"es","value":"Se podría producir una pérdida de memoria cuando un par remoto cierra abruptamente el socket sin enviar una notificación GOAWAY. Además, si nghttp2 detectaba un encabezado no válido, lo que hacía que el par terminara la conexión, se activaba la misma pérdida. Esta falla podría provocar un mayor consumo de memoria y una posible denegación de servicio en determinadas condiciones. Esta vulnerabilidad afecta a los usuarios del servidor HTTP/2 en Node.js v18.x, v20.x, v22.x y v23.x."}],"metrics":{"cvssMetricV30":[{"source":"support@hackerone.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-401"}]}],"references":[{"url":"https://nodejs.org/en/blog/vulnerability/january-2025-security-releases","source":"support@hackerone.com"},{"url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00031.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20250321-0003/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}