Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
impala vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-35830
STW (aka Sensor-Technik Wiedemann) TCG-4 Connectivity Module DeploymentPackage_v3.03r0-Impala and DeploymentPackage_v3.04r2-Jellyfish and TCG-4lite Connectivity Module DeploymentPackage_v3.04r2-Jellyfish allow an malicious user to gain full remote access with root privileges with...
Stw-mobile-machines Tcg-4 Firmware 3.01r1
Stw-mobile-machines Tcg-4 Firmware 3.02r0
Stw-mobile-machines Tcg-4 Firmware 3.03r0
Stw-mobile-machines Tcg-4 Firmware 3.04r2
Stw-mobile-machines Tcg-4lite Firmware 3.04r2
534
VMScore
CVE-2021-28131
Impala sessions use a 16 byte secret to verify that the session is not being hijacked by another user. However, these secrets appear in the Impala logs, therefore Impala users with access to the logs can use another authenticated user's sessions with specially constructed re...
Apache Impala
312
VMScore
CVE-2019-14449
An issue exists in Cloudera Manager 5.x prior to 5.16.2, 6.0.x prior to 6.0.2, and 6.1.x prior to 6.1.1. Malicious impala queries can result in Cross Site Scripting (XSS) when viewed within this product.
Cloudera Cloudera Manager
Cloudera Cloudera Manager 6.0.0
Cloudera Cloudera Manager 6.0.1
Cloudera Cloudera Manager 6.1.0
578
VMScore
CVE-2016-4572
In Cloudera CDH prior to 5.7.1, Impala REVOKE ALL ON SERVER commands do not revoke all privileges.
Cloudera Cdh 5.5.0
Cloudera Cdh 5.5.1
Cloudera Cdh 5.5.2
Cloudera Cdh 5.5.3
Cloudera Cdh 5.5.4
Cloudera Cdh 5.6.0
Cloudera Cdh 5.6.1
Cloudera Cdh 5.7.0
409
VMScore
CVE-2019-10084
In Apache Impala 2.7.0 to 3.2.0, an authenticated user with access to the IDs of active Impala queries or sessions can interact with those sessions or queries via a specially-constructed request and thereby potentially bypass authorization and audit mechanisms. Session and query ...
Apache Impala
668
VMScore
CVE-2018-11792
In Apache Impala prior to 3.0.1, ALTER TABLE/VIEW RENAME required ALTER on the old table. This may pose a potential security risk, such as having ALTER on a table and ALL on a particular database allows a user to move the table to a database with ALL, which will automatically gra...
Apache Impala
356
VMScore
CVE-2018-11785
Missing authorization check in Apache Impala prior to 3.0.1 allows a Kerberos-authenticated but unauthorized user to inject random data into a running query, leading to wrong results for a query.
Apache Impala
356
VMScore
CVE-2017-9792
In Apache Impala (incubating) prior to 2.10.0, a malicious user with "ALTER" permissions on an Impala table can access any other Kudu table data by altering the table properties to make it "external" and then changing the underlying table mapping to point to o...
Apache Impala 2.8.0
Apache Impala 2.9.0
668
VMScore
CVE-2017-5640
It was noticed that a malicious process impersonating an Impala daemon in Apache Impala (incubating) 2.7.0 to 2.8.0 could cause Impala daemons to skip authentication checks when Kerberos is enabled (but TLS is not). If the malicious server responds with 'COMPLETE' befor...
Apache Impala 2.7.0
Apache Impala 2.8.0
445
VMScore
CVE-2017-5652
During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) 2.7.0 to 2.8.0 sent data in plaintext even when the cluster was configured to use TLS. The port in question was used by the StatestoreSubscriber class which did not use the approp...
Apache Impala 2.7.0
Apache Impala 2.8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »