spark-3.5-scala-2.13-compat

Direct Vulnerabilities

Known vulnerabilities in the spark-3.5-scala-2.13-compat package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-72hv-8253-57qq

<3.5.8-r3
  • L
Arbitrary Code Injection

<3.5.8-r1
  • H
Out-of-bounds Read

*
  • M
Improper Certificate Validation

*
  • L
CRLF Injection

*
  • H
Improper Certificate Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Information Exposure

*
  • M
Improper Input Validation

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Files or Directories Accessible to External Parties

*
  • H
CVE-2022-3171

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • L
GHSA-58qw-p7qm-5rvh

*
  • H
Out-of-bounds Write

*
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • L
Out-of-bounds Write

*
  • L
Resource Exhaustion

*
  • H
HTTP Request Smuggling

*
  • H
Uncontrolled Recursion

*
  • L
CVE-2025-24970

*
  • H
Out-of-bounds Write

*
  • L
CVE-2024-25638

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
CVE-2024-29025

*
  • L
Creation of Temporary File With Insecure Permissions

*
  • M
CVE-2023-42503

*
  • H
Out-of-bounds Write

*
  • H
CVE-2022-3510

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
GHSA-xpw8-rcwv-8f8p

*
  • H
Deserialization of Untrusted Data

*
  • L
Uncontrolled Recursion

*
  • C
Authorization Bypass Through User-Controlled Key

*
  • L
Resource Exhaustion

*
  • H
Deserialization of Untrusted Data

*
  • M
CVE-2024-6763

*
  • H
CVE-2023-52428

*
  • H
Deserialization of Untrusted Data

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Input Validation

*
  • L
Out-of-bounds Write

*
  • M
CVE-2021-22569

*
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Uncontrolled Recursion

*
  • L
Deserialization of Untrusted Data

*
  • H
CVE-2022-3509

*
  • L
Missing Authorization

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
CVE-2025-48734

*
  • L
Information Exposure

*