Grafana suffers from an unauthorized arbitrary file reading vulnerability. Version 8.3.1 addresses this issue.
03758847d1cc50b64ba0545bbeb672ab0dab351105fe1fa058b3f6cde6f77d15
This Metasploit module exploits a vulnerability in Apache Solr versions 8.3.0 and below which allows remote code execution via a custom Velocity template. Currently, this module only supports Solr basic authentication. From the Tenable advisory: An attacker could target a vulnerable Apache Solr instance by first identifying a list of Solr core names. Once the core names have been identified, an attacker can send a specially crafted HTTP POST request to the Config API to toggle the params resource loader value for the Velocity Response Writer in the solrconfig.xml file to true. Enabling this parameter would allow an attacker to use the Velocity template parameter in a specially crafted Solr request, leading to remote code execution.
04c5dd5b8815196c9a380f26b4389f5a970acbe465ccd84df68c9cd5c9543808
LibSSH versions 0.7.6 and 0.8.4 unauthorized access proof of concept exploit.
c5b8fd0e5cbaa3811a98a28383bb380c8a42e3dea1a7a2195ac4e5790302813f