Lookup for vulnerable packages by Package URL.

GET /api/packages/180643?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/180643?format=api",
    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.2.1",
    "type": "maven",
    "namespace": "org.apache.spark",
    "name": "spark-core_2.11",
    "version": "2.2.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/22590?format=api",
            "vulnerability_id": "VCID-1gtx-thb1-9ud6",
            "summary": "Apache Spark: Spark History Server Code Execution Vulnerability\nThis issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue.\n\n## Summary\n\nApache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an attacker with access to the Spark event logs directory to inject malicious JSON payloads that trigger deserialization of arbitrary classes, enabling command execution on the host running the Spark History Server.\n\n## Details\n\nThe vulnerability arises because the Spark History Server uses Jackson polymorphic deserialization with @JsonTypeInfo.Id.CLASS on SparkListenerEvent objects, allowing an attacker to specify arbitrary class names in the event JSON. This behavior permits instantiating unintended classes, such as org.apache.hive.jdbc.HiveConnection, which can perform network calls or other malicious actions during deserialization.\n\nThe attacker can exploit this by injecting crafted JSON content into the Spark event log files, which the History Server then deserializes on startup or when loading event logs. For example, the attacker can force the History Server to open a JDBC connection to a remote attacker-controlled server, demonstrating remote command injection capability.\n\n## Proof of Concept:\n\n1. Run Spark with event logging enabled, writing to a writable directory (spark-logs).\n\n2. Inject the following JSON at the beginning of an event log file:\n\n```\n{\n\n  \"Event\": \"org.apache.hive.jdbc.HiveConnection\",\n  \"uri\": \"jdbc:hive2://<IP>:<PORT>/\",\n  \"info\": {\n    \"hive.metastore.uris\": \"thrift://<IP>:<PORT>\"\n  }\n}\n```\n3. Start the Spark History Server with logs pointing to the modified directory.\n\n4. The Spark History Server initiates a JDBC connection to the attacker’s server, confirming the injection.\n\n## Impact\n\nAn attacker with write access to Spark event logs can execute arbitrary code on the server running the History Server, potentially compromising the entire system.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65871",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65837",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65841",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6766",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67662",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71428",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71405",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71395",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71412",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7252",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72489",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7248",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72478",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54920"
                },
                {
                    "reference_url": "https://github.com/apache/spark",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/spark"
                },
                {
                    "reference_url": "https://github.com/apache/spark/pull/51312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://github.com/apache/spark/pull/51312"
                },
                {
                    "reference_url": "https://github.com/apache/spark/pull/51323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://github.com/apache/spark/pull/51323"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/SPARK-52381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/SPARK-52381"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54920"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2026/03/13/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2026/03/13/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447599",
                    "reference_id": "2447599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447599"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jwp6-cvj8-fw65",
                    "reference_id": "GHSA-jwp6-cvj8-fw65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jwp6-cvj8-fw65"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2025-54920",
                "GHSA-jwp6-cvj8-fw65"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1gtx-thb1-9ud6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10071?format=api",
            "vulnerability_id": "VCID-as3y-ffvw-rube",
            "summary": "Improper Authentication\nIn all versions of Apache Spark, the standalone resource manager accepts code to execute on a `master` host, that then runs that code on `worker` hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79065",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78972",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78981",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78987",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79011",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79014",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7901",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79044",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7905",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17190"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-21"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/105976"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17190",
                    "reference_id": "CVE-2018-17190",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17190"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-phg2-9c5g-m4q7",
                    "reference_id": "GHSA-phg2-9c5g-m4q7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-phg2-9c5g-m4q7"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-17190",
                "GHSA-phg2-9c5g-m4q7"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-as3y-ffvw-rube"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9748?format=api",
            "vulnerability_id": "VCID-pa42-1gk4-9yhj",
            "summary": "Improper Authentication\nApache Spark standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property `spark.authenticate.secret` establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11770.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11770.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99532",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99528",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99526",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.88996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.8957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.8957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99553",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11770"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485%40%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://spark.apache.org/security.html#CVE-2018-11770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://spark.apache.org/security.html#CVE-2018-11770"
                },
                {
                    "reference_url": "https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20200227114942/http://www.securityfocus.com/bid/105097"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/105097"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615652",
                    "reference_id": "1615652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615652"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11770",
                    "reference_id": "CVE-2018-11770",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11770"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-w4r4-65mg-45x2",
                    "reference_id": "GHSA-w4r4-65mg-45x2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-w4r4-65mg-45x2"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78930?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.3.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.3.3"
                }
            ],
            "aliases": [
                "CVE-2018-11770",
                "GHSA-w4r4-65mg-45x2"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pa42-1gk4-9yhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9600?format=api",
            "vulnerability_id": "VCID-pgne-36yk-37bj",
            "summary": "Information Exposure\nIn Apache Spark it is possible for a malicious user to construct a URL pointing to a Spark cluster UI job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97847",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97818",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9782",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97823",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97827",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9783",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97833",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97836",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97842",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97846",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97843",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.5025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97812",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8024"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba%40%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba%40%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://spark.apache.org/security.html#CVE-2018-8024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://spark.apache.org/security.html#CVE-2018-8024"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:spark:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:spark:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8024",
                    "reference_id": "CVE-2018-8024",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N"
                        },
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8024"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8cw6-5qvp-q3wj",
                    "reference_id": "GHSA-8cw6-5qvp-q3wj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8cw6-5qvp-q3wj"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/35355?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        },
                        {
                            "vulnerability": "VCID-pa42-1gk4-9yhj"
                        },
                        {
                            "vulnerability": "VCID-vqmm-ru8x-ukcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.2.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/35356?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.3.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        },
                        {
                            "vulnerability": "VCID-pa42-1gk4-9yhj"
                        },
                        {
                            "vulnerability": "VCID-vqmm-ru8x-ukcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.3.1"
                }
            ],
            "aliases": [
                "CVE-2018-8024",
                "GHSA-8cw6-5qvp-q3wj"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pgne-36yk-37bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5918?format=api",
            "vulnerability_id": "VCID-vqmm-ru8x-ukcx",
            "summary": "Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67752",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6775",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67739",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67725",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6769",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67723",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67738",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67714",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.677",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67669",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67648",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10099"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-114.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10099"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fp5j-3fpf-mhj5",
                    "reference_id": "GHSA-fp5j-3fpf-mhj5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fp5j-3fpf-mhj5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78930?format=api",
                    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.3.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1gtx-thb1-9ud6"
                        },
                        {
                            "vulnerability": "VCID-as3y-ffvw-rube"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.3.3"
                }
            ],
            "aliases": [
                "CVE-2019-10099",
                "GHSA-fp5j-3fpf-mhj5",
                "PYSEC-2019-114"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqmm-ru8x-ukcx"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.2.1"
}