{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2025-46417","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-04-24T14:51:19.232Z","dateReserved":"2025-04-24T00:00:00.000Z","datePublished":"2025-04-24T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Picklescan","vendor":"Picklescan","versions":[{"lessThan":"0.0.25","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_server_certificate can exfiltrate data via DNS after deserialization."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-184","description":"CWE-184 Incomplete List of Disallowed Inputs","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2025-04-24T00:27:33.032Z"},"references":[{"url":"https://github.com/advisories/GHSA-93mv-x874-956g"},{"url":"https://github.com/mmaitre314/picklescan/pull/40"}],"x_generator":{"engine":"enrichogram 0.0.1"},"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"}}]},"adp":[{"references":[{"url":"https://github.com/advisories/GHSA-93mv-x874-956g","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-24T14:50:58.816506Z","id":"CVE-2025-46417","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-24T14:51:19.232Z"}}]},"dataVersion":"5.1"}