Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-23088 (GCVE-0-2025-23088)
Vulnerability from cvelistv5 – Published: 2025-01-22 01:11 – Updated: 2025-03-01 01:57This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2025-03-01T01:57:38.952Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"rejectedReasons": [
{
"lang": "en",
"value": "This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2025-23088",
"datePublished": "2025-01-22T01:11:30.829Z",
"dateRejected": "2025-03-01T01:57:38.952Z",
"dateReserved": "2025-01-10T19:05:52.772Z",
"dateUpdated": "2025-03-01T01:57:38.952Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-23088\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2025-01-22T02:15:34.207\",\"lastModified\":\"2025-03-01T03:15:23.157\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities\"}],\"metrics\":{},\"references\":[]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"rejectedReasons\": [{\"value\": \"This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities\", \"lang\": \"en\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2025-03-01T01:57:38.952Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-23088\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"state\": \"REJECTED\", \"assignerShortName\": \"hackerone\", \"dateReserved\": \"2025-01-10T19:05:52.772Z\", \"datePublished\": \"2025-01-22T01:11:30.829Z\", \"dateUpdated\": \"2025-03-01T01:57:38.952Z\", \"dateRejected\": \"2025-03-01T01:57:38.952Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-2WF7-QF7V-598Q
Vulnerability from github – Published: 2025-01-22 03:30 – Updated: 2025-01-24 00:31This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).
Users are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support.
{
"affected": [],
"aliases": [
"CVE-2025-23088"
],
"database_specific": {
"cwe_ids": [
"CWE-1104"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-22T02:15:34Z",
"severity": "HIGH"
},
"details": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\n\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support.",
"id": "GHSA-2wf7-qf7v-598q",
"modified": "2025-01-24T00:31:46Z",
"published": "2025-01-22T03:30:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23088"
},
{
"type": "WEB",
"url": "https://endoflife.date/nodejs"
},
{
"type": "WEB",
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2025-AVI-0060
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Node.js. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Node.js versions v23.x ant\u00e9rieures \u00e0 v23.6.1",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions v20.x ant\u00e9rieures \u00e0 v20.18.2",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions v18.x ant\u00e9rieures \u00e0 v18.20.6",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions v22.x ant\u00e9rieures \u00e0 v22.13.1",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23088"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23087"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23089"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0060",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Node.js. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Node.js",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Node.js",
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases"
}
]
}
CERTFR-2025-AVI-0060
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Node.js. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Node.js versions v23.x ant\u00e9rieures \u00e0 v23.6.1",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions v20.x ant\u00e9rieures \u00e0 v20.18.2",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions v18.x ant\u00e9rieures \u00e0 v18.20.6",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
},
{
"description": "Node.js versions v22.x ant\u00e9rieures \u00e0 v22.13.1",
"product": {
"name": "Node.js",
"vendor": {
"name": "Node.js",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23088"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23087"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23089"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0060",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Node.js. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Node.js",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Node.js",
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases"
}
]
}
WID-SEC-W-2025-0156
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2025-06-12 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Node.js ist eine Plattform zur Entwicklung von Netzwerkanwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Node.js ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder nicht n\u00e4her spezifizierte Angriffe zu starten.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0156 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0156.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0156 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0156"
},
{
"category": "external",
"summary": "Node.js Security Releases vom 2025-01-21",
"url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-8E0ECB9BB6 vom 2025-01-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-8e0ecb9bb6"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-E330D34ECC vom 2025-01-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-e330d34ecc"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-87A8AF2834 vom 2025-01-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-87a8af2834"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-54958FF9E2 vom 2025-01-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-54958ff9e2"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-76FC32D433 vom 2025-01-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-76fc32d433"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-CC8F9D8943 vom 2025-01-24",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-cc8f9d8943"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0234-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020199.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0232-1 vom 2025-01-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EAA5VVUZ2Z26CMX7SWWG3KZWFXWZOLOI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0233-1 vom 2025-01-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5MXRI7LITQSHGS7TS5FVZS5J5SFQEZOC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0237-1 vom 2025-01-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4GHLFJIFCCY7T6727ECCVQVUTXPGIN56/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14706-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WLMBUS6KTOM5ZRBZUFNAWPANSHPLYG3W/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0284-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3E7XMAZSXTVJEOSNVU4GOEGWDOPIAF4W/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1351 vom 2025-02-12",
"url": "https://access.redhat.com/errata/RHSA-2025:1351"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1443 vom 2025-02-13",
"url": "https://errata.build.resf.org/RLSA-2025:1443"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1446 vom 2025-02-13",
"url": "https://access.redhat.com/errata/RHSA-2025:1446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1443 vom 2025-02-13",
"url": "https://access.redhat.com/errata/RHSA-2025:1443"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1351 vom 2025-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-1351.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1446 vom 2025-02-13",
"url": "https://errata.build.resf.org/RLSA-2025:1446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1454 vom 2025-02-13",
"url": "https://access.redhat.com/errata/RHSA-2025:1454"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1522 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1522"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1443 vom 2025-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-1443.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1446 vom 2025-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-1446.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1611 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1611"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1582 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1582"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1613 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1613"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1582 vom 2025-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-1582.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1611 vom 2025-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-1611.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1613 vom 2025-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-1613.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4067 vom 2025-02-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00031.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1613 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1613"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1582 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1582"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1611 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1611"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185575 vom 2025-03-12",
"url": "https://www.ibm.com/support/pages/node/7185575"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7229110 vom 2025-03-26",
"url": "https://www.ibm.com/support/pages/node/7229110"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7433 vom 2025-05-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-7433.html"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-8506 vom 2025-06-05",
"url": "https://linux.oracle.com/errata/ELSA-2025-8506.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202506-08 vom 2025-06-12",
"url": "https://security.gentoo.org/glsa/202506-08"
}
],
"source_lang": "en-US",
"title": "Node.js: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-12T22:00:00.000+00:00",
"generator": {
"date": "2025-06-13T07:00:07.710+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0156",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-26T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-02T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "18"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "V24.0.0-V24.0.1",
"product": {
"name": "IBM Business Automation Workflow V24.0.0-V24.0.1",
"product_id": "T041843",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:v24.0.0_-_v24.0.1"
}
}
}
],
"category": "product_name",
"name": "Business Automation Workflow"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cv18.20.6",
"product": {
"name": "Open Source Node.js \u003cv18.20.6",
"product_id": "T040518"
}
},
{
"category": "product_version",
"name": "v18.20.6",
"product": {
"name": "Open Source Node.js v18.20.6",
"product_id": "T040518-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v18.20.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003cv20.18.2",
"product": {
"name": "Open Source Node.js \u003cv20.18.2",
"product_id": "T040519"
}
},
{
"category": "product_version",
"name": "v20.18.2",
"product": {
"name": "Open Source Node.js v20.18.2",
"product_id": "T040519-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v20.18.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003cv22.13.1",
"product": {
"name": "Open Source Node.js \u003cv22.13.1",
"product_id": "T040520"
}
},
{
"category": "product_version",
"name": "v22.13.1",
"product": {
"name": "Open Source Node.js v22.13.1",
"product_id": "T040520-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v22.13.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003cv23.6.1",
"product": {
"name": "Open Source Node.js \u003cv23.6.1",
"product_id": "T040521"
}
},
{
"category": "product_version",
"name": "v23.6.1",
"product": {
"name": "Open Source Node.js v23.6.1",
"product_id": "T040521-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v23.6.1"
}
}
},
{
"category": "product_version",
"name": "v17.x",
"product": {
"name": "Open Source Node.js v17.x",
"product_id": "T040525",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v17.x"
}
}
},
{
"category": "product_version",
"name": "v19.x",
"product": {
"name": "Open Source Node.js v19.x",
"product_id": "T040526",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v19.x"
}
}
},
{
"category": "product_version",
"name": "v21.x",
"product": {
"name": "Open Source Node.js v21.x",
"product_id": "T040527",
"product_identification_helper": {
"cpe": "cpe:/a:nodejs:nodejs:v21.x"
}
}
}
],
"category": "product_name",
"name": "Node.js"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Developer Hub 1",
"product": {
"name": "Red Hat Enterprise Linux Developer Hub 1",
"product_id": "T041197",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:developer_hub_1"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22150",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-22150"
},
{
"cve": "CVE-2025-23083",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-23083"
},
{
"cve": "CVE-2025-23084",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-23084"
},
{
"cve": "CVE-2025-23085",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-23085"
},
{
"cve": "CVE-2025-23087",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-23087"
},
{
"cve": "CVE-2025-23088",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-23088"
},
{
"cve": "CVE-2025-23089",
"product_status": {
"known_affected": [
"T040519",
"T040518",
"67646",
"T040527",
"T040526",
"T040525",
"T002977",
"T012167",
"T004914",
"T032255",
"74185",
"T032495",
"T041197",
"2951",
"T002207",
"T027843",
"T041843",
"T040521",
"T040520"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2025-23089"
}
]
}
FKIE_CVE-2025-23088
Vulnerability from fkie_nvd - Published: 2025-01-22 02:15 - Updated: 2025-03-01 03:15| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities"
}
],
"id": "CVE-2025-23088",
"lastModified": "2025-03-01T03:15:23.157",
"metrics": {},
"published": "2025-01-22T02:15:34.207",
"references": [],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Rejected"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.