Show filters
45 Total Results
Displaying 21-30 of 45
Sort by:
Attacker Value
Unknown
CVE-2019-15024
Disclosure Date: December 30, 2019 (last updated November 27, 2024)
In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem.
0
Attacker Value
Unknown
CVE-2019-18657
Disclosure Date: October 31, 2019 (last updated November 27, 2024)
ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.
0
Attacker Value
Unknown
CVE-2018-14672
Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages.
0
Attacker Value
Unknown
CVE-2018-14669
Disclosure Date: August 15, 2019 (last updated November 27, 2024)
ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server.
0
Attacker Value
Unknown
CVE-2018-14668
Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks.
0
Attacker Value
Unknown
CVE-2018-14670
Disclosure Date: August 15, 2019 (last updated November 27, 2024)
Incorrect configuration in deb package in ClickHouse before 1.1.54131 could lead to unauthorized use of the database.
0
Attacker Value
Unknown
CVE-2018-14671
Disclosure Date: August 15, 2019 (last updated November 27, 2024)
In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system which led to a Remote Code Execution vulnerability.
0
Attacker Value
Unknown
CVE-2019-16535
Disclosure Date: January 24, 2019 (last updated November 27, 2024)
In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol.
0
Attacker Value
Unknown
CVE-2016-10666
Disclosure Date: May 29, 2018 (last updated November 26, 2024)
tomita-parser is a Node wrapper for Yandex Tomita Parser tomita-parser downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2018-6604
Disclosure Date: February 05, 2018 (last updated November 26, 2024)
SQL Injection exists in the Zh YandexMap 6.2.1.0 component for Joomla! via the id parameter in a task=getPlacemarkDetails request.
0