{"uuid": "03d58c97-dd70-40b5-b649-6304b1ce7b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23085\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\n\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.\n\ud83d\udccf Published: 2025-02-07T07:09:25.804Z\n\ud83d\udccf Modified: 2025-02-25T13:07:47.090Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-02-25T13:23:45.000000Z"}