Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: cloudera Clear
ID Title
CVE-2016-6605 Impala in CDH 5.2.0 through 5.7.2 and 5.8.0 allows remote attackers to bypass Setry authorization.
Impala in CDH 5.2.0 through 5.7.2 and 5.8.0 allows remote attackers to bypass Setry authorization.
CVE-2013-6446 Vulnerability in cloudera (CVE-2013-6446)
vulnerability in cloudera (CVE-2013-6446). Risk of unauthorized operations or information disclosure.
CVE-2014-0229 Vulnerability in apache (CVE-2014-0229)
vulnerability in apache (CVE-2014-0229). Risk of unauthorized operations or information disclosure.
CVE-2015-2263 Vulnerability in cloudera (CVE-2015-2263)
vulnerability in cloudera (CVE-2015-2263). Risk of unauthorized operations or information disclosure.
CVE-2015-4078 Information Disclosure in cloudera (CVE-2015-4078)
vulnerability in cloudera (CVE-2015-4078). Risk of unauthorized operations or information disclosure.
CVE-2015-4166 Vulnerability in cloudera (CVE-2015-4166)
vulnerability in cloudera (CVE-2015-4166). Successful exploitation can lead to full system takeover.
CVE-2016-4946 Cross-Site Scripting (XSS) in cloudera (CVE-2016-4946)
cross-site scripting in cloudera (CVE-2016-4946). Risk of unauthorized operations or information disclosure.
CVE-2016-4947 Information Disclosure in cloudera (CVE-2016-4947)
vulnerability in cloudera (CVE-2016-4947). Risk of unauthorized operations or information disclosure.
CVE-2016-4948 Cross-Site Scripting (XSS) in cloudera (CVE-2016-4948)
cross-site scripting in cloudera (CVE-2016-4948). Risk of unauthorized operations or information disclosure.
CVE-2016-4949 Information Disclosure in cloudera (CVE-2016-4949)
vulnerability in cloudera (CVE-2016-4949). Confidential information can be exposed externally.
CVE-2016-4950 Information Disclosure in cloudera (CVE-2016-4950)
vulnerability in cloudera (CVE-2016-4950). Confidential information can be exposed externally.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →