Total vulnerabilities in the database
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
Software | From | Fixed in |
---|---|---|
sparkjava / spark | - | 2.7.2 |
![]() |
- | 2.7.2 |