Show filters
109 Total Results
Displaying 21-30 of 109
Sort by:
Attacker Value
Unknown

CVE-2024-25695

Disclosure Date: April 04, 2024 (last updated January 12, 2025)
There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions <= 11.2 that may allow a remote, authenticated attacker to provide input that is not sanitized properly and is rendered in error messages. The are no privileges required to execute this attack.
Attacker Value
Unknown

CVE-2024-25693

Disclosure Date: April 04, 2024 (last updated January 12, 2025)
There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory. 
Attacker Value
Unknown

CVE-2024-25692

Disclosure Date: April 04, 2024 (last updated January 12, 2025)
There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 11.1 and below that may in some cases allow a remote, unauthenticated attacker to trick an authorized user into executing unwanted actions via a crafted form. The impact to Confidentiality and Integrity vectors is limited and of low severity. 
Attacker Value
Unknown

CVE-2024-25690

Disclosure Date: April 04, 2024 (last updated January 12, 2025)
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.1 and below that may allow a remote, unauthenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser.
Attacker Value
Unknown

CVE-2023-25848

Disclosure Date: August 25, 2023 (last updated October 08, 2024)
ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. The information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.
Attacker Value
Unknown

CVE-2023-25841

Disclosure Date: July 21, 2023 (last updated October 08, 2024)
There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 – 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. Mitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.
Attacker Value
Unknown

CVE-2023-25840

Disclosure Date: July 21, 2023 (last updated October 08, 2024)
There is a Cross-site Scripting vulnerability in ArcGIS Server in versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser.  The privileges required to execute this attack are high.
Attacker Value
Unknown

CVE-2023-25837

Disclosure Date: July 21, 2023 (last updated October 08, 2024)
There is a Cross-site Scripting vulnerability in Esri ArcGIS Enterprise Sites versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser.  The privileges required to execute this attack are high.    The impact to Confidentiality, Integrity and Availability are High.
Attacker Value
Unknown

CVE-2023-25836

Disclosure Date: July 21, 2023 (last updated October 08, 2024)
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser.  The privileges required to execute this attack are low.
Attacker Value
Unknown

CVE-2023-25835

Disclosure Date: July 21, 2023 (last updated October 08, 2024)
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victims browser.  The privileges required to execute this attack are high. The impact to Confidentiality, Integrity and Availability are High.