The JFrog Security research team identified seven new security vulnerabilities in ClickHouse, an open-source Database Management System (DBMS) used primarily for online analytical processing, which were promptly disclosed to and addressed by ClickHouse maintainers. These vulnerabilities, which can be exploited by any authenticated user with read permissions, include heap buffer overflows, heap out-of-bounds reads, and divide-by-zero errors, potentially leading to server crashes, memory leaks, or remote code execution. The vulnerabilities affect various compression codecs within ClickHouse, and users are advised to update to version v21.10.2.15-stable or later to mitigate these risks. JFrog products remain unaffected as they do not utilize ClickHouse, and the JFrog team commends ClickHouse Inc. for their swift resolution of these issues.