Esri Vulnerabilities
Comprehensive security vulnerability database for Esri products
5
0
3
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2024-25709 | 6.1 | An attacker can create a malicious link that, when saved by a user in Esri Portal for ArcGIS, can run harmful JavaScript code in that user's web browser. This can be done by anyone, even without special permissions, as long as they are logged in to the system. | esriportal for arcgis | Theoretical | almost 2 years agoApr 4, 2024 |
| CVE-2024-25705 | 5.4 | This vulnerability allows an attacker with basic access to create a malicious link that, when clicked by a user, can run harmful JavaScript code in their browser. The attacker only needs to be logged in with low-level permissions, making it relatively easy to exploit. | esriportal for arcgis | Exploit Available | almost 2 years agoApr 4, 2024 |
| CVE-2024-25699 | 8.5 | This vulnerability allows a remote attacker with low-level access to gain unauthorized control over parts of the Esri Portal for ArcGIS software, potentially compromising sensitive data and system operations. It can be exploited under specific conditions, making it difficult but still possible for attackers to bypass security boundaries. | esriportal for arcgis | Exploit Available | almost 2 years agoApr 4, 2024 |
| CVE-2023-25837 | 8.4 | This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by a victim, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, alter trusted content, or disrupt the application's normal operations. | esriportal for arcgis | Exploit Available | over 2 years agoJul 21, 2023 |
| CVE-2023-25835 | 8.4 | This vulnerability allows an attacker with high-level access to create a malicious link that, when clicked by another user, can run harmful JavaScript in their browser. This could let the attacker steal sensitive information, change site content, or disrupt the site’s normal operations, but it requires the attacker to already have elevated privileges within the system. | esriportal for arcgis | Theoretical | over 2 years agoJul 21, 2023 |
About Esri Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Esri products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.