{"uuid": "603240e8-00d6-45af-a6c8-bdf85b4d20d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-30065", "type": "seen", "source": "https://t.me/cvedetector/21737", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30065 - Apache Parquet Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30065 \nPublished : April 1, 2025, 8:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code  \n  \n  \nUsers are recommended to upgrade to version 1.15.1, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T11:57:24.000000Z"}