<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alfresco community edition and Apache Solr 6.6.5 vulnerabilities in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488833#M40045</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Is there any news on a ETA of the new version of search services ? on github, i can only see the 2.0.11-A3 release.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Apr 2025 09:36:54 GMT</pubDate>
    <dc:creator>pierre_lorson</dc:creator>
    <dc:date>2025-04-09T09:36:54Z</dc:date>
    <item>
      <title>Alfresco community edition and Apache Solr 6.6.5 vulnerabilities</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/148393#M39230</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What is the position of the Alfresco community regarding the dependency with Apache Solr6.6.5 and the CVEs identified on this version (see an extract of the CVEs that can impact Solr in an Alfresco context).&lt;/P&gt;&lt;P&gt;Is there a plan to upgrade to Apache Solr 9.6.1? or an opening to elastic search (not only for the enterprise version)?&lt;/P&gt;&lt;TABLE width="1336px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="138px"&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291" target="_blank" rel="noopener nofollow noreferrer"&gt;CVE-2023-50291&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107px"&gt;&lt;P&gt;2024-02-08&lt;/P&gt;&lt;/TD&gt;&lt;TD width="669px"&gt;&lt;P&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Apache&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Solr&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;peut divulguer certains mots de passe en raison d’incohérences dans la logique de rédaction des pro...&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="87px"&gt;&lt;P&gt;Modérée&lt;/P&gt;&lt;/TD&gt;&lt;TD width="335px"&gt;&lt;P&gt;Apache Solr 6.0.0 à 8.11.2&lt;/P&gt;&lt;P&gt;Apache Solr 9.0.0 avant la version 9.3.0&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="138px"&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386" target="_blank" rel="noopener nofollow noreferrer"&gt;CVE-2023-50386&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107px"&gt;&lt;P&gt;2024-02-08&lt;/P&gt;&lt;/TD&gt;&lt;TD width="669px"&gt;&lt;P&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Apache&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Solr&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;: les API de sauvegarde/restauration permettent le déploiement d’exécutables dans des&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;ConfigSet&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;malveillants&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="87px"&gt;&lt;P&gt;Modérée&lt;/P&gt;&lt;/TD&gt;&lt;TD width="335px"&gt;&lt;P&gt;Apache Solr 6.0.0 à 8.11.2&lt;/P&gt;&lt;P&gt;Apache Solr 9.0.0 avant la version 9.4.1&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="138px"&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2020-13957" target="_blank" rel="noopener nofollow noreferrer"&gt;CVE-2020-13957&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107px"&gt;&lt;P&gt;2020-10-12&lt;/P&gt;&lt;/TD&gt;&lt;TD width="669px"&gt;&lt;P&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Les vérifications ajoutées aux téléchargements de&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;configset&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;non authentifiés dans Apache&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Solr&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;peuvent être contournées&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="87px"&gt;&lt;P&gt;Haut&lt;/P&gt;&lt;/TD&gt;&lt;TD width="335px"&gt;&lt;P&gt;6.6.0 à 6.6.6, 7.0.0 à 7.7.3, 8.0.0 à 8.6.2&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="138px"&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-17558" target="_blank" rel="noopener nofollow noreferrer"&gt;CVE-2019-17558&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107px"&gt;&lt;P&gt;2019-12-30&lt;/P&gt;&lt;/TD&gt;&lt;TD width="669px"&gt;&lt;P&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Apache&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Solr&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;RCE via&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://solr.apache.org/security.html" target="_blank" rel="noopener nofollow noreferrer"&gt;VelocityResponseWriter&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="87px"&gt;&lt;P&gt;Haut&lt;/P&gt;&lt;/TD&gt;&lt;TD width="335px"&gt;&lt;P&gt;5.0.0 à 8.3.1&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Tue, 11 Jun 2024 08:31:52 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/148393#M39230</guid>
      <dc:creator>gilles_lafargue</dc:creator>
      <dc:date>2024-06-11T08:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco community edition and Apache Solr 6.6.5 vulnerabilities</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/148394#M39231</link>
      <description>&lt;P style="box-sizing: border-box; margin-top: 0px !important; margin-bottom: 16px; caret-color: #1f2328; color: #1f2328; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;We're addressing these vulnerabilities for the next release of Search Services, that will happen in the following weeks.&lt;/P&gt;
&lt;P style="box-sizing: border-box; margin-top: 0px !important; margin-bottom: 16px; caret-color: #1f2328; color: #1f2328; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&lt;A style="box-sizing: border-box; background-color: transparent; color: var(--fgcolor-accent, var(--color-accent-fg)); text-decoration: underline; text-underline-offset: 0.2rem; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" href="https://private-user-images.githubusercontent.com/48685308/338539367-8f9dc005-e23b-4502-9dc7-3e72d48019f3.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MTgxNzI3OTUsIm5iZiI6MTcxODE3MjQ5NSwicGF0aCI6Ii80ODY4NTMwOC8zMzg1MzkzNjctOGY5ZGMwMDUtZTIzYi00NTAyLTlkYzctM2U3MmQ0ODAxOWYzLnBuZz9YLUFtei1BbGdvcml0aG09QVdTNC1ITUFDLVNIQTI1NiZYLUFtei1DcmVkZW50aWFsPUFLSUFWQ09EWUxTQTUzUFFLNFpBJTJGMjAyNDA2MTIlMkZ1cy1lYXN0LTElMkZzMyUyRmF3czRfcmVxdWVzdCZYLUFtei1EYXRlPTIwMjQwNjEyVDA2MDgxNVomWC1BbXotRXhwaXJlcz0zMDAmWC1BbXotU2lnbmF0dXJlPTAzZmUwMDdjOTk2MmEzNDI4MjIyNmMzMGQyYjU4ZDU2NDA0ODgyOThiOGMzMjA0MTI2ZGZiYjNmMzEwOGI2ZmMmWC1BbXotU2lnbmVkSGVhZGVycz1ob3N0JmFjdG9yX2lkPTAma2V5X2lkPTAmcmVwb19pZD0wIn0.h0eeG58UtO_3os1y6namxbtst8pU-GEWsESz4V3YQ_w" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;IMG style="box-sizing: content-box; border-style: none; max-width: 100%; background-color: var(--bgcolor-default, var(--color-canvas-default));" src="https://private-user-images.githubusercontent.com/48685308/338539367-8f9dc005-e23b-4502-9dc7-3e72d48019f3.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.h0eeG58UtO_3os1y6namxbtst8pU-GEWsESz4V3YQ_w" border="0" alt="Screenshot 2024-06-11 at 12 11 12" /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px !important; caret-color: #1f2328; color: #1f2328; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&lt;SPAN&gt;Just to note, that in relation to your specific list of CVEs the release will be patching &lt;/SPAN&gt;&lt;A style="box-sizing: border-box; background-color: transparent; color: var(--fgcolor-accent, var(--color-accent-fg)); text-decoration: underline; text-underline-offset: 0.2rem; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" title="CVE-2020-13957" href="https://github.com/advisories/GHSA-3c7p-vv5r-cmr5" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-3c7p-vv5r-cmr5/hovercard" target="_blank" rel="nofollow noopener noreferrer"&gt;CVE-2020-13957&lt;/A&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;A style="box-sizing: border-box; background-color: transparent; color: var(--fgcolor-accent, var(--color-accent-fg)); text-decoration: underline; text-underline-offset: 0.2rem; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" title="CVE-2023-50386" href="https://github.com/advisories/GHSA-37vr-vmg4-jwpw" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-37vr-vmg4-jwpw/hovercard" target="_blank" rel="nofollow noopener noreferrer"&gt;CVE-2023-50386&lt;/A&gt;&lt;SPAN&gt;and &lt;/SPAN&gt;&lt;A style="box-sizing: border-box; background-color: transparent; color: var(--fgcolor-accent, var(--color-accent-fg)); text-decoration: underline; text-underline-offset: 0.2rem; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" title="CVE-2023-50291" href="https://github.com/advisories/GHSA-3hwc-rqwp-v36q" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-3hwc-rqwp-v36q/hovercard" target="_blank" rel="nofollow noopener noreferrer"&gt;CVE-2023-50291&lt;/A&gt;&lt;SPAN&gt;. Since Alfresco is not using &lt;/SPAN&gt;&lt;CODE class="notranslate" style="box-sizing: border-box; font-family: var(--fontStack-monospace, ui-monospace, SFMono-Regular, SF Mono, Menlo, Consolas, Liberation Mono, monospace); font-size: 11.9px; padding: 0.2em 0.4em; margin: 0px; white-space: break-spaces; background-color: var(--bgcolor-neutral-muted, var(--color-neutral-muted)); border-radius: 6px; caret-color: #1f2328; color: #1f2328; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;VelocityResponseWriter&lt;/CODE&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;A style="box-sizing: border-box; background-color: transparent; color: var(--fgcolor-accent, var(--color-accent-fg)); text-decoration: underline; text-underline-offset: 0.2rem; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" title="CVE-2019-17558" href="https://github.com/advisories/GHSA-ww97-9w65-2crx" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-ww97-9w65-2crx/hovercard" target="_blank" rel="nofollow noopener noreferrer"&gt;CVE-2019-17558&lt;/A&gt;&lt;SPAN&gt; is not being addressed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="box-sizing: border-box; margin-top: 0px; margin-bottom: 0px !important; caret-color: #1f2328; color: #1f2328; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="box-sizing: border-box; margin-top: 0px; margin-bottom: 16px; caret-color: #1f2328; color: #1f2328; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;Despite Elasticsearch/OpenSearch is the current focus of development, Search Services is still live and maintained.&lt;/P&gt;
&lt;P style="box-sizing: border-box; margin-top: 0px; margin-bottom: 16px; caret-color: #1f2328; color: #1f2328; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', 'Noto Sans', Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji'; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;"&gt;Additionally, there will be a Community aided support for OpenSearch later this year. Details are available in &lt;A style="box-sizing: border-box; background-color: transparent; color: var(--fgcolor-accent, var(--color-accent-fg)); text-decoration: underline; text-underline-offset: 0.2rem;" href="https://github.com/AlfrescoLabs/alfresco-lisbon-hack-a-thon-2024?tab=readme-ov-file#projects" target="_blank" rel="nofollow noopener noreferrer"&gt;https://github.com/AlfrescoLabs/alfresco-lisbon-hack-a-thon-2024?tab=readme-ov-file#projects&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Please, let me know if you need additional information.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 06:09:50 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/148394#M39231</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2024-06-12T06:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco community edition and Apache Solr 6.6.5 vulnerabilities</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488833#M40045</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Is there any news on a ETA of the new version of search services ? on github, i can only see the 2.0.11-A3 release.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2025 09:36:54 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488833#M40045</guid>
      <dc:creator>pierre_lorson</dc:creator>
      <dc:date>2025-04-09T09:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco community edition and Apache Solr 6.6.5 vulnerabilities</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488834#M40046</link>
      <description>&lt;P&gt;Latest version is 2.0.15: &lt;A href="https://hub.docker.com/r/alfresco/alfresco-search-services/tags" target="_blank"&gt;https://hub.docker.com/r/alfresco/alfresco-search-services/tags&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2025 09:49:26 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488834#M40046</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2025-04-09T09:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco community edition and Apache Solr 6.6.5 vulnerabilities</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488836#M40047</link>
      <description>&lt;P&gt;Thanks for your quick response. I apologize for not finding it.&lt;BR /&gt;&lt;BR /&gt;Still, i'm surprised there's no more tags on github. Also, on the release notes blog posts, i can't see any new zip for the search services.&lt;BR /&gt;&lt;BR /&gt;Are the search services only provided in the form of docker images now ?&lt;BR /&gt;&lt;BR /&gt;Also, is there a changelog somewhere where we can see the treated CVEs ? i can't find it.&lt;BR /&gt;&lt;BR /&gt;Thanks again&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2025 10:59:32 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/alfresco-community-edition-and-apache-solr-6-6-5-vulnerabilities/m-p/488836#M40047</guid>
      <dc:creator>pierre_lorson</dc:creator>
      <dc:date>2025-04-09T10:59:32Z</dc:date>
    </item>
  </channel>
</rss>

