Show filters
45 Total Results
Displaying 21-30 of 45
Sort by:
Attacker Value
Unknown

CVE-2019-15024

Disclosure Date: December 30, 2019 (last updated November 27, 2024)
In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem.
Attacker Value
Unknown

CVE-2019-18657

Disclosure Date: October 31, 2019 (last updated November 27, 2024)
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
Attacker Value
Unknown

CVE-2018-14672

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages.
0
Attacker Value
Unknown

CVE-2018-14669

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server.
0
Attacker Value
Unknown

CVE-2018-14668

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks.
0
Attacker Value
Unknown

CVE-2018-14670

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
Incorrect configuration in deb package in ClickHouse before 1.1.54131 could lead to unauthorized use of the database.
0
Attacker Value
Unknown

CVE-2018-14671

Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system which led to a Remote Code Execution vulnerability.
0
Attacker Value
Unknown

CVE-2019-16535

Disclosure Date: January 24, 2019 (last updated November 27, 2024)
In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol.
Attacker Value
Unknown

CVE-2016-10666

Disclosure Date: May 29, 2018 (last updated November 26, 2024)
tomita-parser is a Node wrapper for Yandex Tomita Parser tomita-parser downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown

CVE-2018-6604

Disclosure Date: February 05, 2018 (last updated November 26, 2024)
SQL Injection exists in the Zh YandexMap 6.2.1.0 component for Joomla! via the id parameter in a task=getPlacemarkDetails request.
0