Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Esri | Portal for ArcGIS | all ~ <=11.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit to PATH Traversal Esri Portal for ArcGIS versions <= 11.2 | https://github.com/MrCyb3rSec/CVE-2024-25693-exploit | POC Details |
| 2 | None | https://github.com/MrSecby/CVE-2024-25693-exploit | POC Details |
| 3 | None | https://github.com/AlexDoe11/CVE-2024-25693-exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-25699 | 8.5 HIGH | Portal for ArcGIS has an invalid authentication vulnerability |
| CVE-2024-25695 | 7.2 HIGH | concatenated errors resulting in cross site scripting and frame injection issues. |
| CVE-2024-25698 | 6.1 MEDIUM | Reflected XSS in Portal for ArcGIS |
| CVE-2024-25706 | 6.1 MEDIUM | HTMLi at createFolder Content Injection |
| CVE-2024-25709 | 6.1 MEDIUM | Self-XSS style in move item dialog |
| CVE-2024-25692 | 5.4 MEDIUM | BUG-000154722 - Cross-site request forgery (CSRF) issue in Portal for ArcGIS |
| CVE-2024-25697 | 5.4 MEDIUM | Stored XSS in Portal for ArcGIS |
| CVE-2024-25705 | 5.4 MEDIUM | Cross site scripting issue in embed widget |
| CVE-2024-25696 | 4.8 MEDIUM | Stored XSS in Portal for ArcGIS |
| CVE-2024-25700 | 4.8 MEDIUM | Persistent XSS in URL added to a shared map |
| CVE-2024-25708 | 4.8 MEDIUM | Persistent XSS when creating new application using Web App Builder |
| CVE-2024-25690 | 4.7 MEDIUM | HTML injection in ArcGIS Web AppBuilder |
No comments yet