Show filters
55 Total Results
Displaying 1-10 of 55
Sort by:
Attacker Value
Unknown
CVE-2024-8149
Disclosure Date: October 04, 2024 (last updated January 31, 2025)
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1 and 11.2 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
0
Attacker Value
Unknown
CVE-2024-8148
Disclosure Date: October 04, 2024 (last updated January 31, 2025)
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 10.8.1 - 11.2 that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
0
Attacker Value
Unknown
CVE-2024-38040
Disclosure Date: October 04, 2024 (last updated October 16, 2024)
There is a local file inclusion vulnerability in Esri Portal for ArcGIS 11.2. 11.1, 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files.
0
Attacker Value
Unknown
CVE-2024-38039
Disclosure Date: October 04, 2024 (last updated October 16, 2024)
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
0
Attacker Value
Unknown
CVE-2024-38038
Disclosure Date: October 04, 2024 (last updated October 16, 2024)
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
0
Attacker Value
Unknown
CVE-2024-38037
Disclosure Date: October 04, 2024 (last updated October 16, 2024)
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
0
Attacker Value
Unknown
CVE-2024-38036
Disclosure Date: October 04, 2024 (last updated December 21, 2024)
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
0
Attacker Value
Unknown
CVE-2024-25707
Disclosure Date: October 04, 2024 (last updated October 16, 2024)
There is a reflected cross site scripting in Esri Portal for ArcGIS 11.1 and below on Windows and Linux x64 allows a remote authenticated attacker with administrative access to supply a crafted string which could potentially execute arbitrary JavaScript code in the their own browser (Self XSS). A user cannot be phished into clicking a link to execute code.
0
Attacker Value
Unknown
CVE-2024-25702
Disclosure Date: October 04, 2024 (last updated October 17, 2024)
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
0
Attacker Value
Unknown
CVE-2024-25701
Disclosure Date: October 04, 2024 (last updated October 17, 2024)
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Experience Builder versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Experience Builder Embed widget which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
0