CVE-2024-10572
- EPSS 0.12%
- Veröffentlicht 20.03.2025 10:09:28
- Zuletzt bearbeitet 15.10.2025 13:15:36
In h2oai/h2o-3 version 3.46.0.1, the `run_tool` command exposes classes in the `water.tools` package through the `ast` parser. This includes the `XGBoostLibExtractTool` class, which can be exploited to shut down the server and write large files to ar...
CVE-2024-10553
- EPSS 3.69%
- Veröffentlicht 20.03.2025 10:09:04
- Zuletzt bearbeitet 14.07.2025 13:43:55
A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveT...
CVE-2024-7765
- EPSS 0.17%
- Veröffentlicht 20.03.2025 10:08:46
- Zuletzt bearbeitet 01.04.2025 20:33:36
In h2oai/h2o-3 version 3.46.0.2, a vulnerability exists where uploading and repeatedly parsing a large GZIP file can cause a denial of service. The server becomes unresponsive due to memory exhaustion and a large number of concurrent slow-running job...
CVE-2024-8862
- EPSS 2.12%
- Veröffentlicht 14.09.2024 20:15:11
- Zuletzt bearbeitet 20.09.2024 15:47:10
A vulnerability, which was classified as critical, has been found in h2oai h2o-3 3.46.0.4. This issue affects the function getConnectionSafe of the file /dtale/chart-data/1 of the component JDBC Connection Handler. The manipulation of the argument qu...
CVE-2024-45758
- EPSS 0.11%
- Veröffentlicht 06.09.2024 16:15:03
- Zuletzt bearbeitet 29.09.2025 13:56:10
H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON docu...
CVE-2024-5979
- EPSS 0.12%
- Veröffentlicht 27.06.2024 19:15:18
- Zuletzt bearbeitet 15.10.2025 13:15:48
In h2oai/h2o-3 version 3.46.0, the `run_tool` command in the `rapids` component allows the `main` function of any class under the `water.tools` namespace to be called. One such class, `MojoConvertTool`, crashes the server when invoked with an invalid...
CVE-2024-5550
- EPSS 1.23%
- Veröffentlicht 06.06.2024 19:16:09
- Zuletzt bearbeitet 15.10.2025 13:15:46
In h2oai/h2o-3 version 3.40.0.4, an exposure of sensitive information vulnerability exists due to an arbitrary system path lookup feature. This vulnerability allows any remote user to view full paths in the entire file system where h2o-3 is hosted. S...
CVE-2024-1456
- EPSS 0.23%
- Veröffentlicht 16.04.2024 00:15:08
- Zuletzt bearbeitet 28.07.2025 14:04:52
An S3 bucket takeover vulnerability was identified in the h2oai/h2o-3 repository. The issue involves the S3 bucket 'http://s3.amazonaws.com/h2o-training', which was found to be vulnerable to unauthorized takeover.
CVE-2023-6569
- EPSS 0.21%
- Veröffentlicht 14.12.2023 13:15:55
- Zuletzt bearbeitet 21.11.2024 08:44:07
External Control of File Name or Path in h2oai/h2o-3
CVE-2023-6038
- EPSS 63.28%
- Veröffentlicht 16.11.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:43:01
A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default insta...