CVE-2024-23945
- EPSS 10.34%
- Published 23.12.2024 16:15:05
- Last modified 14.07.2025 18:32:34
Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnera...
CVE-2023-32007
- EPSS 91.16%
- Published 02.05.2023 09:15:10
- Last modified 13.02.2025 17:16:29
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the applicati...
CVE-2023-22946
- EPSS 0.28%
- Published 17.04.2023 08:15:07
- Last modified 21.11.2024 07:45:41
In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configura...
CVE-2022-31777
- EPSS 0.11%
- Published 01.11.2022 16:15:13
- Last modified 06.05.2025 04:16:00
A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be return...
CVE-2022-33891
- EPSS 93.27%
- Published 18.07.2022 07:15:07
- Last modified 30.07.2025 19:07:53
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code ...
CVE-2021-38296
- EPSS 0.88%
- Published 10.03.2022 09:15:07
- Last modified 21.11.2024 06:16:44
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. ...
CVE-2020-27223
- EPSS 33.82%
- Published 26.02.2021 22:15:19
- Last modified 20.08.2025 10:15:27
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) ...
CVE-2020-27218
- EPSS 0.6%
- Published 28.11.2020 01:15:11
- Last modified 21.11.2024 05:20:52
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if a...
CVE-2020-9480
- EPSS 87.22%
- Published 23.06.2020 22:15:14
- Last modified 21.11.2024 05:40:43
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an ap...
CVE-2019-20445
- EPSS 0.96%
- Published 29.01.2020 21:15:11
- Last modified 21.11.2024 04:38:30
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.