VYPR

Maven package

org.apache.spark/spark-core_2.10

pkg:maven/org.apache.spark/spark-core_2.10

Vulnerabilities (9)

  • CVE-2025-54920Mar 14, 2026
    affected <= 2.2.3

    This issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue. Summary Apache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to ov

  • CVE-2022-31777Nov 1, 2022
    affected >= 0

    A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI.

  • CVE-2018-17190Nov 19, 2018
    affected >= 0

    In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the mas

  • CVE-2018-11804Oct 24, 2018
    affected >= 1.3.0, <= 2.1.3

    Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept connections from external hosts by

  • CVE-2018-11770Aug 13, 2018
    affected >= 1.0.0, <= 2.2.2

    From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests

  • CVE-2018-8024Jul 12, 2018
    affected >= 2.1.0, < 2.1.3fixed 2.1.3

    In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose inf

  • CVE-2018-1334Jul 12, 2018
    affected >= 1.0.0, < 2.1.3fixed 2.1.3

    In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.

  • CVE-2017-12612HigSep 13, 2017
    affected < 2.1.2fixed 2.1.2

    In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user a

  • CVE-2017-7678MedJul 12, 2017
    affected < 2.2.0fixed 2.2.0

    In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could