{"uuid": "c2b010e8-0dd3-46b2-ba70-540e3d0399ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24794", "type": "seen", "source": "https://t.me/cvedetector/16706", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24794 - Snowflake Connector for Python Pickle Deserialization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24794 \nPublished : Jan. 29, 2025, 9:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. The OCSP response cache uses pickle as the serialization format, potentially leading to local privilege escalation. This vulnerability affects versions 2.7.12 through 3.13.0. Snowflake fixed the issue in version 3.13.1. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T00:02:56.000000Z"}