CVE-2024-38038 |
Description: There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
CVSS: MEDIUM (6.1) EPSS Score: 0.06% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-38037 |
Description: There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
CVSS: MEDIUM (6.1) EPSS Score: 0.07% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25707 |
Description: There is a reflected cross site scripting in Esri Portal for ArcGIS 11.1 and below on Windows and Linux x64 allows a remote authenticated attacker with administrative access to supply a crafted string which could potentially execute arbitrary JavaScript code in the their own browser (Self XSS). A user cannot be phished into clicking a link to execute code.
CVSS: MEDIUM (4.8) EPSS Score: 0.05% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25702 |
Description: There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in the site configuration which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
CVSS: MEDIUM (4.8) EPSS Score: 0.04% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25701 |
Description: There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Experience Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in the Experience Builder Embed widget which when loaded could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
CVSS: MEDIUM (4.8) EPSS Score: 0.04% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25700 |
Description: There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high.
CVSS: MEDIUM (4.8) EPSS Score: 0.06%
April 10th, 2025 (11 days ago)
|
CVE-2024-25698 |
Description: There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
CVSS: MEDIUM (6.1) EPSS Score: 0.09% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25697 |
Description: There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link which when opening an authenticated users bio page will render an image in the victims browser. The privileges required to execute this attack are low.
CVSS: MEDIUM (5.4) EPSS Score: 0.08% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25696 |
Description: There is a Cross-site Scripting vulnerability in Portal for ArcGIS in versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when accessing the page editor an image will render in the victim’s browser. The privileges required to execute this attack are high.
CVSS: MEDIUM (4.8) EPSS Score: 0.07% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-25694 |
Description: There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise versions 11.1 and below that may allow a remote, authenticated attacker to create a crafted link that is stored in the Layer Showcase application configuration which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high. The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal.
CVSS: MEDIUM (4.8) EPSS Score: 0.04% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|