Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 07 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neo4j
Neo4j neo4j |
|
| Vendors & Products |
Neo4j
Neo4j neo4j |
Fri, 31 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses. | |
| Title | Untargeted information leak in Bolt protocol handshake | |
| Weaknesses | CWE-226 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Neo4j
Published:
Updated: 2025-10-31T11:37:44.777Z
Reserved: 2025-10-10T12:54:22.071Z
Link: CVE-2025-11602
Updated: 2025-10-31T11:36:18.345Z
Status : Awaiting Analysis
Published: 2025-10-31T11:15:33.513
Modified: 2025-11-04T15:41:31.450
Link: CVE-2025-11602
OpenCVE Enrichment
Updated: 2025-11-03T10:45:08Z