cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-41834,https://securityvulnerability.io/vulnerability/CVE-2023-41834,Apache Flink Stateful Functions allowed HTTP header injection due to Improper Neutralization of CRLF Sequences,"Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests. Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.",Apache,Apache Flink Stateful Functions,6.1,MEDIUM,0.0025599999353289604,false,,false,false,false,,,false,false,,2023-09-19T13:16:00.000Z,0 CVE-2020-17519,https://securityvulnerability.io/vulnerability/CVE-2020-17519,Apache Flink directory traversal attack: reading remote files through the REST API,A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.,Apache,Apache Flink,7.5,HIGH,0.9729200005531311,true,2024-05-23T00:00:00.000Z,false,false,true,2022-03-08T09:19:27.000Z,true,false,false,,2021-01-05T11:40:14.000Z,0 CVE-2020-17518,https://securityvulnerability.io/vulnerability/CVE-2020-17518,Apache Flink directory traversal attack: remote file writing through the REST API,"Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.",Apache,Apache Flink,7.5,HIGH,0.9527000188827515,false,,false,false,true,2021-01-10T15:06:40.000Z,true,false,false,,2021-01-05T11:40:13.000Z,0 CVE-2020-1960,https://securityvulnerability.io/vulnerability/CVE-2020-1960,,"A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.",Apache,Apache Flink,4.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2020-05-14T16:02:50.000Z,0