{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T03:52:35.140","vulnerabilities":[{"cve":{"id":"CVE-2025-59465","sourceIdentifier":"support@hackerone.com","published":"2026-01-20T21:16:04.010","lastModified":"2026-01-30T20:25:39.890","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:\n```\nserver.on('secureConnection', socket => {\n  socket.on('error', err => {\n    console.log(err)\n  })\n})\n```"},{"lang":"es","value":"Una trama `HTTP/2 HEADERS` malformada con datos `HPACK` sobredimensionados e inválidos puede provocar que Node.js falle al desencadenar un error `ECONNRESET` de `TLSSocket` no manejado. En lugar de cerrar la conexión de forma segura, el proceso falla, lo que permite una denegación de servicio remota. Esto afecta principalmente a las aplicaciones que no adjuntan manejadores de errores explícitos a los sockets seguros, por ejemplo:\n```\nserver.on('secureConnection', socket =&gt; {\n  socket.on('error', err =&gt; {\n    console.log(err)\n  })\n})\n```"}],"metrics":{"cvssMetricV30":[{"source":"support@hackerone.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"20.0.0","versionEndExcluding":"20.20.0","matchCriteriaId":"A78B4AE9-C1B4-4DD0-9EDF-A3A60431B6DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"22.0.0","versionEndExcluding":"22.22.0","matchCriteriaId":"132A7510-B3E9-4F85-9B61-A834B12DD7D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"24.0.0","versionEndExcluding":"24.13.0","matchCriteriaId":"A83233BD-D901-4A1A-A3AF-0DC3E76CD2C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","versionStartIncluding":"25.0.0","versionEndExcluding":"25.3.0","matchCriteriaId":"970EF154-D905-4FDA-85CB-C3AB08BEFAEC"}]}]}],"references":[{"url":"https://nodejs.org/en/blog/vulnerability/december-2025-security-releases","source":"support@hackerone.com","tags":["Release Notes","Vendor Advisory"]}]}}]}