{"vulnerability": "CVE-2025-2308", "sightings": [{"uuid": "64ca3eb3-c24f-49e5-99bf-880a6046543a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113835657220622445", "content": "", "creation_timestamp": "2025-01-16T02:24:42.226517Z"}, {"uuid": "a0eed449-670a-4033-a0b4-d11429a95287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23081", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113827786899972974", "content": "", "creation_timestamp": "2025-01-14T17:03:10.405757Z"}, {"uuid": "fc9bc9a4-2575-4d5c-99c9-5e741bf5868c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lftcbdci432z", "content": "", "creation_timestamp": "2025-01-16T03:04:49.551376Z"}, {"uuid": "a40d7996-cbaf-4021-84ec-38ab4f4f5673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23080", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpqvoyw4n2r", "content": "", "creation_timestamp": "2025-01-14T17:16:05.736575Z"}, {"uuid": "85843da1-b5fa-4599-a648-d405caa82dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23081", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpqvragqy2n", "content": "", "creation_timestamp": "2025-01-14T17:16:08.483729Z"}, {"uuid": "113174cd-434c-4c15-8361-0de556d79be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfoqc26lck2l", "content": "", "creation_timestamp": "2025-01-14T07:32:33.606204Z"}, {"uuid": "12a22a7e-72ce-4914-97c6-4873ae3d65ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfo6lvsqhq2n", "content": "", "creation_timestamp": "2025-01-14T02:15:50.347719Z"}, {"uuid": "5aa7726f-add1-4b06-90bf-2a14e98ec69f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfukmrcnkg22", "content": "", "creation_timestamp": "2025-01-16T15:07:02.868133Z"}, {"uuid": "55bb44aa-1ce7-41b0-9e61-47b38a8be019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lftmltpdm224", "content": "", "creation_timestamp": "2025-01-16T06:09:41.249204Z"}, {"uuid": "4f4df0cc-8b5f-4b36-9d72-5e7645e8c2d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfohebdc7s2h", "content": "", "creation_timestamp": "2025-01-14T04:52:38.181863Z"}, {"uuid": "21e382c2-e06b-4a07-bc09-e8522b7aac64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lga3vmk7l62j", "content": "", "creation_timestamp": "2025-01-21T05:15:30.192761Z"}, {"uuid": "e338acca-568f-42bc-a94c-e189e6cddc33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lga62naxes2h", "content": "", "creation_timestamp": "2025-01-21T05:54:06.284715Z"}, {"uuid": "4e9fb98b-6767-4f43-be10-5095979a358c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgbppky7xy2t", "content": "", "creation_timestamp": "2025-01-21T20:42:41.690399Z"}, {"uuid": "5c2c1fc5-7179-4021-a94e-d56e0450cffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgbppky7xy2t", "content": "", "creation_timestamp": "2025-01-21T20:42:41.736926Z"}, {"uuid": "3483c3e0-4c58-4b80-bb74-a90325bf7853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgbppky7xy2t", "content": "", "creation_timestamp": "2025-01-21T20:42:41.775185Z"}, {"uuid": "cab7661c-79bc-422e-9a3a-d75b4015fccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113904123327966262", "content": "", "creation_timestamp": "2025-01-28T04:36:31.711394Z"}, {"uuid": "0e4d3c11-c901-4833-a797-05352f20158e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113961362857658078", "content": "", "creation_timestamp": "2025-02-07T07:13:17.685511Z"}, {"uuid": "941ee5bb-f0cd-494d-ba6c-00c53bdeb32f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgccgg4ffb2t", "content": "", "creation_timestamp": "2025-01-22T02:17:35.732156Z"}, {"uuid": "0cddfeb0-a067-4db0-86f6-d5384d67e82d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgccgjo4we2b", "content": "", "creation_timestamp": "2025-01-22T02:17:39.426097Z"}, {"uuid": "89daf016-2d7e-484f-b445-03192f764288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgccgmiffs2c", "content": "", "creation_timestamp": "2025-01-22T02:17:42.355378Z"}, {"uuid": "fc82d679-8ec1-4b13-a09f-a12b051cba74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgccgpm7zk2r", "content": "", "creation_timestamp": "2025-01-22T02:17:45.642296Z"}, {"uuid": "a433f7b2-a625-4272-a630-84730f9ef8e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113869725376156486", "content": "", "creation_timestamp": "2025-01-22T02:48:42.324041Z"}, {"uuid": "a224b0b4-0779-4c2e-975e-0cc138c15985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113869725432111859", "content": "", "creation_timestamp": "2025-01-22T02:48:42.439618Z"}, {"uuid": "f5bc3ce5-417a-46ab-820c-5561a5ed8584", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113869725479422310", "content": "", "creation_timestamp": "2025-01-22T02:48:42.634227Z"}, {"uuid": "943047c3-cd3a-414e-a2bb-4c310937cfbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceanggtz2g", "content": "", "creation_timestamp": "2025-01-22T02:50:09.477090Z"}, {"uuid": "d8c7c85b-815c-4f8b-b24f-acd26efa6a82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceanpy4k2y", "content": "", "creation_timestamp": "2025-01-22T02:50:10.215467Z"}, {"uuid": "1c5856aa-76d3-4efb-bea2-fbdd14aa6bd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceanwgkz2g", "content": "", "creation_timestamp": "2025-01-22T02:50:11.254808Z"}, {"uuid": "c9ba1884-8ba3-47ce-ac44-70d46d63b7f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceao23hn2q", "content": "", "creation_timestamp": "2025-01-22T02:50:11.835901Z"}, {"uuid": "2f095dec-7905-4a16-aad4-9b749ca215b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceao5huq2g", "content": "", "creation_timestamp": "2025-01-22T02:50:12.430387Z"}, {"uuid": "660f6bcb-3df6-45e4-873b-a0451c65a71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceaoenlz2h", "content": "", "creation_timestamp": "2025-01-22T02:50:13.655349Z"}, {"uuid": "e14467ba-c00b-47eb-9e17-4a5de0159a38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgceaokmjv25", "content": "", "creation_timestamp": "2025-01-22T02:50:14.338123Z"}, {"uuid": "45d6740c-baa3-4bba-9e94-3e6d41c21c47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgcgp5zwtc2j", "content": "", "creation_timestamp": "2025-01-22T03:34:08.676086Z"}, {"uuid": "1ad7eacd-162c-4a55-9e7b-a2d499e0bc00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lgcvdq2ua52b", "content": "", "creation_timestamp": "2025-01-22T07:56:06.678823Z"}, {"uuid": "ca40d020-a1a8-44e3-8f9d-bc57f4d21704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhl2kv5nwm2s", "content": "", "creation_timestamp": "2025-02-07T07:16:05.172048Z"}, {"uuid": "7f6bc2c4-a989-40b1-ade1-85a3b25b5a12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrp6n5rib2r", "content": "", "creation_timestamp": "2025-01-28T05:15:49.436550Z"}, {"uuid": "b8100407-8bdc-4bd2-8fee-1272f096f256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-23089", "type": "seen", "source": "https://infosec.exchange/users/adulau/statuses/113871327919146565", "content": "", "creation_timestamp": "2025-01-22T09:36:14.396616Z"}, {"uuid": "fbe200a1-bb61-4cd2-b9db-b59f16688d17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "seen", "source": "https://bsky.app/profile/pithysecurity.bsky.social/post/3lgv7mplims2h", "content": "", "creation_timestamp": "2025-01-29T14:48:03.076405Z"}, {"uuid": "376c1f10-3401-401c-afdf-3b1cf8cb7076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgpexccxch2j", "content": "", "creation_timestamp": "2025-01-27T07:07:26.339121Z"}, {"uuid": "c315802d-2714-4045-891c-f8a47c5e5a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgpexccxch2j", "content": "", "creation_timestamp": "2025-01-27T07:07:26.387314Z"}, {"uuid": "fe3a346f-8c1b-4f23-ac72-5ab70231c06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgpexccxch2j", "content": "", "creation_timestamp": "2025-01-27T07:07:26.434690Z"}, {"uuid": "f54b5216-5c92-4e1c-8781-fc513986d7ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhl7zf6cuv27", "content": "", "creation_timestamp": "2025-02-07T08:53:42.288338Z"}, {"uuid": "b13422f3-35af-4957-ae95-7779c67acc40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgs7a5ujyy2z", "content": "", "creation_timestamp": "2025-01-28T10:03:00.763628Z"}, {"uuid": "7e1eda59-d7c5-466b-ab0b-86d79faba9cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgs7a5ujyy2z", "content": "", "creation_timestamp": "2025-01-28T10:03:00.809784Z"}, {"uuid": "e71a7cb2-6b94-420a-a1b4-db0c23cf1151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgs7a5ujyy2z", "content": "", "creation_timestamp": "2025-01-28T10:03:00.853330Z"}, {"uuid": "197d7a08-69f8-4790-9807-4e495eba6847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgsjg4hzwq2q", "content": "", "creation_timestamp": "2025-01-28T13:05:17.571715Z"}, {"uuid": "cee0cd3f-66b7-438f-a8c7-9c432f661e4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgr4bmbpbm2r", "content": "", "creation_timestamp": "2025-01-27T23:37:28.215104Z"}, {"uuid": "43acf28a-9730-42fb-8ec7-f98bb78da975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgsotjxpu62q", "content": "", "creation_timestamp": "2025-01-28T14:42:16.827004Z"}, {"uuid": "e159507a-b2ba-4447-a7e7-a4aca862b55c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgsotjxpu62q", "content": "", "creation_timestamp": "2025-01-28T14:42:16.877010Z"}, {"uuid": "10c73919-adf0-4c91-863d-247fca06ed01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgsotjxpu62q", "content": "", "creation_timestamp": "2025-01-28T14:42:16.920637Z"}, {"uuid": "0e277dd7-2063-4fd7-8e47-92b1560ad1d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgr4bmbpbm2r", "content": "", "creation_timestamp": "2025-01-27T23:37:28.317796Z"}, {"uuid": "cfb2214d-f225-46df-979d-64cd05f1c154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgr4bmbpbm2r", "content": "", "creation_timestamp": "2025-01-27T23:37:28.269461Z"}, {"uuid": "c33ae7f9-6296-4af8-83e5-354dc17b6670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-23087", "type": "seen", "source": "https://bsky.app/profile/MongoDB.activitypub.awakari.com.ap.brid.gy/post/3lgnyveeob632", "content": "", "creation_timestamp": "2025-01-26T17:59:05.337053Z"}, {"uuid": "fd967643-4247-4149-85d6-26828a59c3a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgqgfkcv3v2k", "content": "", "creation_timestamp": "2025-01-27T17:05:58.131804Z"}, {"uuid": "8c726e02-659f-42e9-b88c-a57fa4ab4037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "MISP/a3c5beab-b790-4171-8b4c-02c8a9678071", "content": "", "creation_timestamp": "2025-07-22T03:54:24.000000Z"}, {"uuid": "b897ce9d-2218-4bf8-bdef-eb0cc4ec6220", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "seen", "source": "https://bsky.app/profile/sonoclaudio.bsky.social/post/3lgdegrkkcc2p", "content": "", "creation_timestamp": "2025-01-22T12:26:15.664070Z"}, {"uuid": "a0354e8e-6aa7-440c-8123-7d5061b57e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgdjtu6byk24", "content": "", "creation_timestamp": "2025-01-22T14:03:03.572102Z"}, {"uuid": "fbcd4578-2c8f-4e31-aaa5-313852c556bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgdk44e4z62x", "content": "", "creation_timestamp": "2025-01-22T14:07:40.634827Z"}, {"uuid": "d2fb9cd3-412e-41f1-8cc4-9db8f504ea33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2308", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkevuhin7d2s", "content": "", "creation_timestamp": "2025-03-15T00:51:34.784160Z"}, {"uuid": "b6e4cfee-a660-4283-af00-fd5e191c8b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lu4bpfj2nk24", "content": "", "creation_timestamp": "2025-07-16T20:41:28.836928Z"}, {"uuid": "7bd4d842-9db9-4254-b546-bcd5bd4f8755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3luby4irpcr2w", "content": "", "creation_timestamp": "2025-07-19T03:05:48.572399Z"}, {"uuid": "fc7e28f1-138e-4baf-98e4-19ed9a0aa63b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "MISP/a3c5beab-b790-4171-8b4c-02c8a9678071", "content": "", "creation_timestamp": "2025-09-09T11:53:42.000000Z"}, {"uuid": "b3b5f624-a181-4a54-88ec-f0e07c67d8c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6029", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23088\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-22T01:11:30.829Z\n\ud83d\udccf Modified: 2025-03-01T01:57:38.952Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-01T02:27:14.000000Z"}, {"uuid": "286a59ce-c1a2-40c7-9bc7-7636c635e8c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://bsky.app/profile/msw.bsky.social/post/3m775b5dq2k24", "content": "", "creation_timestamp": "2025-12-04T23:37:06.890759Z"}, {"uuid": "2a1077cb-a20d-4521-8adc-7fc23413beaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://bsky.app/profile/msw.bsky.social/post/3m775b5dq2k24", "content": "", "creation_timestamp": "2025-12-04T23:37:06.987430Z"}, {"uuid": "aab4e7f1-6ece-413f-806f-a152738db593", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://bsky.app/profile/msw.bsky.social/post/3m775b5dq2k24", "content": "", "creation_timestamp": "2025-12-04T23:37:07.082019Z"}, {"uuid": "d5f32b8b-41b0-4af2-85b6-a2c4e2ccb518", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mcx3js57e62m", "content": "", "creation_timestamp": "2026-01-21T16:25:33.329094Z"}, {"uuid": "017a473d-ecd4-4c80-ab91-edfc9d820491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "68e8181a-4d7f-4c7b-ae07-96ff5613c32d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "c42579fd-39dc-4c7e-8b46-08c554fda417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "published-proof-of-concept", "source": "Telegram/z_ebYnNGYsAvqPSR_ksCHYf7iQyo3Kz8im6VaWbcmMpsW68", "content": "", "creation_timestamp": "2025-07-19T15:00:07.000000Z"}, {"uuid": "7d2a4363-7182-4014-89c9-8d37d09df7a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2509", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23089\n\ud83d\udd39 Description: This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\n\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support.\n\ud83d\udccf Published: 2025-01-22T01:11:30.822Z\n\ud83d\udccf Modified: 2025-01-22T01:11:30.822Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-01-22T02:00:51.000000Z"}, {"uuid": "09f00c21-7daa-4791-93c2-7e6f54e2c076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://t.me/cvedetector/17468", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23085 - Node.js - HTTP/2 Server - Socket Memory Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23085 \nPublished : Feb. 7, 2025, 7:15 a.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.  \n  \nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T10:28:19.000000Z"}, {"uuid": "5ed233fb-9ac7-4e74-b216-decd0c7e9bbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23081", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1522", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23081\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF), Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - DataTransfer Extension allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects Mediawiki - DataTransfer Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.\n\ud83d\udccf Published: 2025-01-14T16:56:42.009Z\n\ud83d\udccf Modified: 2025-01-14T16:56:42.009Z\n\ud83d\udd17 References:\n1. https://phabricator.wikimedia.org/T379749\n2. https://gerrit.wikimedia.org/r/q/I773c616db781d2f3f30893ad01ef503bf251a2b3\n3. https://gerrit.wikimedia.org/r/q/I7c9de4c8dcdb3276ba923c6bc7c8eef3531324c7\n4. https://gerrit.wikimedia.org/r/q/I9223c31f02f31f1e06e1a8cddf7d539cc8d3a3d9\n5. https://gerrit.wikimedia.org/r/q/I5e1538a3bf66378810f905834c05626e1d2c82f0\n6. https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DataTransfer/+/1093931\n7. https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DataTransfer/+/1080451", "creation_timestamp": "2025-01-14T17:20:36.000000Z"}, {"uuid": "7759c172-7287-4cfe-b790-e42f6c75c48f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1450", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23082\n\ud83d\udd39 Description: Veeam Backup for Microsoft Azure is vulnerable to Server-Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.\n\ud83d\udccf Published: 2025-01-14T01:46:14.729Z\n\ud83d\udccf Modified: 2025-01-14T01:46:14.729Z\n\ud83d\udd17 References:\n1. https://www.veeam.com/kb4709", "creation_timestamp": "2025-01-14T02:08:25.000000Z"}, {"uuid": "82260bd3-093b-436a-b547-ccedce029d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2508", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23088\n\ud83d\udd39 Description: This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\n\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support.\n\ud83d\udccf Published: 2025-01-22T01:11:30.829Z\n\ud83d\udccf Modified: 2025-01-22T01:11:30.829Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-01-22T02:00:51.000000Z"}, {"uuid": "14acc990-770d-4559-9696-8e1db8f02549", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3242", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23084\n\ud83d\udd25 CVSS Score: 5.6 (CVSS_V3)\n\ud83d\udd39 Description: A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.\n\nOn Windows, a path that does not start with the file separator is treated as relative to the current directory. \n\nThis vulnerability affects Windows users of `path.join` API.\n\ud83d\udccf Published: 2025-01-28T06:30:40Z\n\ud83d\udccf Modified: 2025-01-28T06:30:40Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23084\n2. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-01-28T07:08:52.000000Z"}, {"uuid": "89d31688-d369-49ac-8f16-702b37ffcdf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2375", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23086\n\ud83d\udd39 Description: On most desktop platforms, Brave Browser versions 1.70.x-1.73.x included a feature to show a site's origin on the OS-provided file selector dialog when a site prompts the user to upload or download a file. However the origin was not correctly inferred in some cases. When combined with an open redirector vulnerability on a trusted site, this could allow a malicious site to initiate a download whose origin in the file select dialog appears as the trusted site which initiated the redirect.\n\ud83d\udccf Published: 2025-01-21T04:26:10.943Z\n\ud83d\udccf Modified: 2025-01-21T04:26:10.943Z\n\ud83d\udd17 References:\n1. https://hackerone.com/reports/2888770", "creation_timestamp": "2025-01-21T05:01:19.000000Z"}, {"uuid": "d173cd52-ab03-45f7-83a5-d99c61157872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2512", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23083\n\ud83d\udd39 Description: With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \n\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.\n\ud83d\udccf Published: 2025-01-22T01:11:30.802Z\n\ud83d\udccf Modified: 2025-01-22T01:11:30.802Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-01-22T02:00:54.000000Z"}, {"uuid": "33091ccc-f0b4-4ce7-960a-b939e6ace81a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2510", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23087\n\ud83d\udd39 Description: This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\n\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support.\n\ud83d\udccf Published: 2025-01-22T01:11:30.821Z\n\ud83d\udccf Modified: 2025-01-22T01:11:30.821Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-01-22T02:00:52.000000Z"}, {"uuid": "bf607002-e19a-443e-ad04-2035c9376784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23083\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \n\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.\n\ud83d\udccf Published: 2025-01-22T01:11:30.802Z\n\ud83d\udccf Modified: 2025-02-28T13:07:33.161Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-02-28T13:26:54.000000Z"}, {"uuid": "82a0803c-97af-4228-9b3a-6a81dee3f320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3793", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23085\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\n\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.\n\ud83d\udccf Published: 2025-02-07T09:31:51Z\n\ud83d\udccf Modified: 2025-02-07T09:31:51Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-23085\n2. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-02-07T10:02:40.000000Z"}, {"uuid": "03d58c97-dd70-40b5-b649-6304b1ce7b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23085\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\n\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.\n\ud83d\udccf Published: 2025-02-07T07:09:25.804Z\n\ud83d\udccf Modified: 2025-02-25T13:07:47.090Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-02-25T13:23:45.000000Z"}, {"uuid": "f1cc490a-408c-4f43-85f8-f0770a58fe95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2308", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7640", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2308\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in HDF5 1.14.6. This affects the function H5Z__scaleoffset_decompress_one_byte of the component Scale-Offset Filter. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about a batch of vulnerabilities. His response was \"reject\" without further explanation. We have not received an elaboration even after asking politely for further details. Currently we assume that the vendor wants to \"dispute\" the entries which is why they are flagged as such until further details become available.\n\ud83d\udccf Published: 2025-03-14T20:31:04.336Z\n\ud83d\udccf Modified: 2025-03-14T20:31:04.336Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299721\n2. https://vuldb.com/?ctiid.299721\n3. https://vuldb.com/?submit.514531\n4. https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc2.md", "creation_timestamp": "2025-03-14T20:48:28.000000Z"}, {"uuid": "b23070df-4cdb-4115-92a7-2c76457f2f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6028", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23089\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-22T01:11:30.822Z\n\ud83d\udccf Modified: 2025-03-01T01:57:39.264Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-01T02:27:13.000000Z"}, {"uuid": "9b9c3fea-deac-4102-9320-2f6c3e4f6234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23087\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-22T01:11:30.821Z\n\ud83d\udccf Modified: 2025-03-01T01:57:38.637Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-03-01T02:27:14.000000Z"}, {"uuid": "b9102859-d16e-4813-a9f0-87d5172d00bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14195", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23083\n\ud83d\udd25 CVSS Score: 7.7 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \n\nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.\n\ud83d\udccf Published: 2025-01-22T01:11:30.802Z\n\ud83d\udccf Modified: 2025-04-30T22:25:22.434Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-04-30T23:14:36.000000Z"}, {"uuid": "ea32e3a9-010e-472b-8343-93d01196295a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14194", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23084\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_0, Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.\n\nOn Windows, a path that does not start with the file separator is treated as relative to the current directory. \n\nThis vulnerability affects Windows users of `path.join` API.\n\ud83d\udccf Published: 2025-01-28T04:35:15.236Z\n\ud83d\udccf Modified: 2025-04-30T22:25:23.315Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-04-30T23:14:36.000000Z"}, {"uuid": "b66a34b6-1ad0-4b73-bfb7-280f2d8c10fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23085", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14193", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23085\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.\n\nThis vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.\n\ud83d\udccf Published: 2025-02-07T07:09:25.804Z\n\ud83d\udccf Modified: 2025-04-30T22:25:24.192Z\n\ud83d\udd17 References:\n1. https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "creation_timestamp": "2025-04-30T23:14:32.000000Z"}, {"uuid": "bbe0e6e0-bed6-49e5-855c-1949b90f862e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "Telegram/Qdzz1AKJLgYA5qbpq7wsXtyO5OathArotee-YC8gAHuem3o", "content": "", "creation_timestamp": "2025-09-16T15:00:07.000000Z"}, {"uuid": "3f9f865c-2a05-4f77-b075-52d0e1e3ddc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2308", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15502", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2308\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in HDF5 1.14.6. This affects the function H5Z__scaleoffset_decompress_one_byte of the component Scale-Offset Filter. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor plans to fix this issue in an upcoming release.\n\ud83d\udccf Published: 2025-03-14T20:31:04.336Z\n\ud83d\udccf Modified: 2025-05-08T08:58:56.350Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.299721\n2. https://vuldb.com/?ctiid.299721\n3. https://vuldb.com/?submit.514531\n4. https://github.com/madao123123/crash_report/blob/main/hdf5_poc/hdf5_poc2.md", "creation_timestamp": "2025-05-08T09:23:43.000000Z"}, {"uuid": "a17818cd-df60-4154-bce2-5f04f5f9d124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23084", "type": "seen", "source": "https://t.me/cvedetector/16582", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23084 - Node.js Windows Drive Name Handling Path Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23084 \nPublished : Jan. 28, 2025, 5:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.  \n  \nOn Windows, a path that does not start with the file separator is treated as relative to the current directory.   \n  \nThis vulnerability affects Windows users of `path.join` API. \nSeverity: 5.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T08:45:35.000000Z"}, {"uuid": "e34ed42c-822b-410f-a83e-8826bd535acd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2308", "type": "seen", "source": "https://t.me/cvedetector/20342", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2308 - HDF5 Scale-Offset Filter Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2308 \nPublished : March 14, 2025, 9:15 p.m. | 23\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in HDF5 1.14.6. This affects the function H5Z__scaleoffset_decompress_one_byte of the component Scale-Offset Filter. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about a batch of vulnerabilities. His response was \"reject\" without further explanation. We have not received an elaboration even after asking politely for further details. Currently we assume that the vendor wants to \"dispute\" the entries which is why they are flagged as such until further details become available. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T23:24:23.000000Z"}, {"uuid": "ac79a680-9ce8-41f8-a241-bead9a347c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23081", "type": "seen", "source": "https://t.me/cvedetector/15301", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23081 - Wikimedia Foundation Mediawiki - DataTransfer Extension CSRF/XSS\", \n  \"Content\": \"CVE ID : CVE-2025-23081 \nPublished : Jan. 14, 2025, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF), Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - DataTransfer Extension allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects Mediawiki - DataTransfer Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T19:01:11.000000Z"}, {"uuid": "576ddc38-8852-4efa-9b24-799521c0b7e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23080", "type": "seen", "source": "https://t.me/cvedetector/15300", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23080 - Wikimedia Foundation Mediawiki - OpenBadges Extension Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-23080 \nPublished : Jan. 14, 2025, 5:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - OpenBadges Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - OpenBadges Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T19:01:10.000000Z"}, {"uuid": "dfe31927-2e5d-4d18-92cd-e5412a773fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23086", "type": "seen", "source": "https://t.me/cvedetector/15907", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23086 - Brave Browser Origin Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23086 \nPublished : Jan. 21, 2025, 5:15 a.m. | 34\u00a0minutes ago \nDescription : On most desktop platforms, Brave Browser versions 1.70.x-1.73.x included a feature to show a site's origin on the OS-provided file selector dialog when a site prompts the user to upload or download a file. However the origin was not correctly inferred in some cases. When combined with an open redirector vulnerability on a trusted site, this could allow a malicious site to initiate a download whose origin in the file select dialog appears as the trusted site which initiated the redirect. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T06:55:48.000000Z"}, {"uuid": "d3b6d760-57d4-4a6d-bb06-52fe6cf42e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://t.me/CyberBulletin/2126", "content": "\u26a1CVE-2025-23083: Node.js Vulnerability Exposes Sensitive Data and Resources.\n\n#CyberBulletin", "creation_timestamp": "2025-01-22T04:35:20.000000Z"}, {"uuid": "4e73a266-ae36-4ec6-8912-cf24d8bdf84a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23083", "type": "seen", "source": "https://t.me/cvedetector/16068", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23083 - Node.js permission model diagnostic channel worker thread creation arbitrary instance reuse vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23083 \nPublished : Jan. 22, 2025, 2:15 a.m. | 34\u00a0minutes ago \nDescription : With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage.   \n  \nThis vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T03:51:32.000000Z"}, {"uuid": "f650a21f-036b-49e6-95e2-89fef7565153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "https://t.me/cvedetector/16066", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23089 - Microsoft Node.js Unmaintained Component Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23089 \nPublished : Jan. 22, 2025, 2:15 a.m. | 34\u00a0minutes ago \nDescription : This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).  \n  \nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T03:51:31.000000Z"}, {"uuid": "d1d6ccbe-33b9-4c4b-8bc6-1ce417d7168a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "https://t.me/cvedetector/16065", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23088 - Node.js Unmaintained Third-Party Components Vulnerability (CWE-1104)\", \n  \"Content\": \"CVE ID : CVE-2025-23088 \nPublished : Jan. 22, 2025, 2:15 a.m. | 34\u00a0minutes ago \nDescription : This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).  \n  \nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T03:51:30.000000Z"}, {"uuid": "ec57d76b-25b1-45a6-b292-55ac0b0e585e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "https://t.me/cvedetector/16064", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23087 - Node.js End-of-Life Vulnerability: Unmaintained Version Use\", \n  \"Content\": \"CVE ID : CVE-2025-23087 \nPublished : Jan. 22, 2025, 2:15 a.m. | 34\u00a0minutes ago \nDescription : This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).  \n  \nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T03:51:30.000000Z"}, {"uuid": "1bff7a8b-fb6e-411e-9f20-fc45262e77b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://t.me/cvedetector/15227", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23082 - Veeam Backup for Microsoft Azure SSRF Vuln\", \n  \"Content\": \"CVE ID : CVE-2025-23082 \nPublished : Jan. 14, 2025, 2:15 a.m. | 36\u00a0minutes ago \nDescription : Veeam Backup for Microsoft Azure is vulnerable to Server-Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T03:57:35.000000Z"}, {"uuid": "22b29827-231c-4a08-af02-8494c1005d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23082", "type": "seen", "source": "https://t.me/TheDarkWebInformer/10322", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23082\n\ud83d\udd39 Description: Veeam Backup for Microsoft Azure is vulnerable to Server-Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.\n\ud83d\udccf Published: 2025-01-14T01:46:14.729Z\n\ud83d\udccf Modified: 2025-01-14T01:46:14.729Z\n\ud83d\udd17 References:\n1. https://www.veeam.com/kb4709", "creation_timestamp": "2025-01-14T20:58:04.000000Z"}, {"uuid": "1fe92e8f-2812-4bec-8021-265fa4fcd61a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23089", "type": "seen", "source": "Telegram/EcBid0wLbi4MB1GMPrlPJKR0b2AbeJPUFu5MoF-SjHRLY15g", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}, {"uuid": "04570684-18a7-4f6c-a6c2-b401de829b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23088", "type": "seen", "source": "Telegram/59131z4TaVa8EIRsSONBSe0DYZ3KHJTPP3e-_YLPlZ8tI9cR", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}, {"uuid": "4ea756e9-36b5-4d8d-9c5e-3065d5f2dd84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23087", "type": "seen", "source": "Telegram/p7CRRjhSUK6YGsZY2kP2M2Gw9gpaXuDs7yURFIJV4U8m8Riu", "content": "", "creation_timestamp": "2025-02-06T02:43:27.000000Z"}]}