{"uuid": "67e38505-aa33-4f7e-a5b2-dd329bee14f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24788", "type": "seen", "source": "https://t.me/cvedetector/16703", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24788 - Snowflake Connector for .NET File Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24788 \nPublished : Jan. 29, 2025, 9:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : snowflake-connector-net is the Snowflake Connector for .NET. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for .NET in which files downloaded from stages are temporarily placed in a world-readable local directory, making them accessible to unauthorized users on the same machine. This vulnerability affects versions 2.0.12 through 4.2.0 on Linux and macOS. Snowflake fixed the issue in version 4.3.0. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T00:02:54.000000Z"}