Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache solr 6.2.0 vulnerabilities and exploits
(subscribe to this query)
6
CVSSv2
CVE-2017-9803
Apache Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e...
Apache Solr 6.2.1
Apache Solr 6.4.0
Apache Solr 6.2.0
Apache Solr 6.4.1
Apache Solr 6.5.0
Apache Solr 6.4.2
Apache Solr 6.5.1
Apache Solr 6.3.0
Apache Solr 6.6.0
5
CVSSv2
CVE-2017-7660
Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe t...
Apache Solr 5.5.2
Apache Solr 5.5.3
Apache Solr 6.3.0
Apache Solr 6.4.0
Apache Solr 5.3.1
Apache Solr 5.3.2
Apache Solr 5.5.4
Apache Solr 6.0.0
Apache Solr 6.4.1
Apache Solr 6.4.2
Apache Solr 5.4.0
Apache Solr 5.4.1
Apache Solr 6.0.1
Apache Solr 6.1.0
Apache Solr 6.5.0
Apache Solr 6.5.1
Apache Solr 5.3.0
Apache Solr 5.5.0
Apache Solr 5.5.1
Apache Solr 6.2.0
Apache Solr 6.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started