
CVE-2020-7369 – Yandex Browser Address Bar Spooofing
https://notcve.org/view.php?id=CVE-2020-7369
20 Oct 2020 — User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of the Yandex Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Yandex Browser version 20.8.3 and prior versions, and was fixed in version 20.8.4 released October 1, 2020. Una vulnerabilidad de Representación Inapropiada de la Interfaz de Usuario (UI) de una Información Crítica en la barra de direcciones del Yandex Browser permite a un atacante ocul... • https://blog.rapid7.com/2020/10/20/vulntober-multiple-mobile-browser-address-bar-spoofing-vulnerabilities • CWE-306: Missing Authentication for Critical Function CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVE-2019-15024
https://notcve.org/view.php?id=CVE-2019-15024
30 Dec 2019 — In all versions of ClickHouse before 19.14.3, an attacker having write access to ZooKeeper and who is able to run a custom server available from the network where ClickHouse runs, can create a custom-built malicious server that will act as a ClickHouse replica and register it in ZooKeeper. When another replica will fetch data part from the malicious replica, it can force clickhouse-server to write to arbitrary path on filesystem. En todas las versiones de ClickHouse anteriores a la versión 19.14.3, un ataca... • https://clickhouse.yandex/docs/en/security_changelog •

CVE-2019-16535
https://notcve.org/view.php?id=CVE-2019-16535
30 Dec 2019 — In all versions of ClickHouse before 19.14, an OOB read, OOB write and integer underflow in decompression algorithms can be used to achieve RCE or DoS via native protocol. En todas las versiones de ClickHouse anteriores a la versión 19.14, una lectura OOB, escritura OOB y un desbordamiento de enteros en algoritmos de descompresión pueden ser usados para lograr una RCE o DoS por medio del protocolo nativo. • https://clickhouse.yandex/docs/en/security_changelog • CWE-125: Out-of-bounds Read CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •

CVE-2019-18657
https://notcve.org/view.php?id=CVE-2019-18657
31 Oct 2019 — ClickHouse before 19.13.5.44 allows HTTP header injection via the url table function. ClickHouse versiones anteriores a 19.13.5.44, permite una inyección de encabezado HTTP por medio de la función url table. • https://github.com/ClickHouse/ClickHouse/blob/master/CHANGELOG.md • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2018-14672
https://notcve.org/view.php?id=CVE-2018-14672
15 Aug 2019 — In ClickHouse before 18.12.13, functions for loading CatBoost models allowed path traversal and reading arbitrary files through error messages. En ClickHouse versiones anteriores a 18.12.13, las funciones para cargar modelos CatBoost permitían el salto de ruta (path) y la lectura de archivos arbitrarios por medio de mensajes de error. • https://clickhouse.yandex/docs/en/security_changelog • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-14671
https://notcve.org/view.php?id=CVE-2018-14671
15 Aug 2019 — In ClickHouse before 18.10.3, unixODBC allowed loading arbitrary shared objects from the file system which led to a Remote Code Execution vulnerability. En ClickHouse versiones anteriores a 18.10.3, unixODBC permitía cargar objetos compartidos arbitrarios desde el sistema de archivos, lo que conlleva a una vulnerabilidad de Ejecución de Código Remota. • https://clickhouse.yandex/docs/en/security_changelog • CWE-20: Improper Input Validation •

CVE-2018-14669
https://notcve.org/view.php?id=CVE-2018-14669
15 Aug 2019 — ClickHouse MySQL client before versions 1.1.54390 had "LOAD DATA LOCAL INFILE" functionality enabled that allowed a malicious MySQL database read arbitrary files from the connected ClickHouse server. El cliente ClickHouse MySQL versiones anteriores a 1.1.54390, tenía habilitada la funcionalidad "LOAD DATA LOCAL INFILE" que permitía a una base de datos MySQL maliciosa leer archivos arbitrarios desde el servidor ClickHouse conectado. • https://clickhouse.yandex/docs/en/security_changelog • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2018-14668
https://notcve.org/view.php?id=CVE-2018-14668
15 Aug 2019 — In ClickHouse before 1.1.54388, "remote" table function allowed arbitrary symbols in "user", "password" and "default_database" fields which led to Cross Protocol Request Forgery Attacks. En ClickHouse versiones anteriores a 1.1.54388, la función de tabla "remote" permitía símbolos arbitrarios en los campos "user", "password" y "default_database" que conllevan a ataques de tipo Cross Protocol Request Forgery. • https://clickhouse.yandex/docs/en/security_changelog • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2018-14670
https://notcve.org/view.php?id=CVE-2018-14670
15 Aug 2019 — Incorrect configuration in deb package in ClickHouse before 1.1.54131 could lead to unauthorized use of the database. Una configuración incorrecta en el paquete deb en ClickHouse versiones anteriores a 1.1.54131, podría conllevar a un uso no autorizado de la base de datos. • https://clickhouse.yandex/docs/en/security_changelog • CWE-285: Improper Authorization •

CVE-2016-10666
https://notcve.org/view.php?id=CVE-2016-10666
29 May 2018 — tomita-parser is a Node wrapper for Yandex Tomita Parser tomita-parser downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. tomita-parser es un wrapper Node para Yandex Tomita Parser. tomita-parser descarga recursos binarios por HTTP, lo que lo deja vulnerable a ... • https://nodesecurity.io/advisories/261 • CWE-310: Cryptographic Issues CWE-311: Missing Encryption of Sensitive Data •