{"vulnerability": "CVE-2024-2569", "sightings": [{"uuid": "b0ea1be3-4ac9-4f2f-bbcd-1040fc41f9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25691", "type": "seen", "source": "https://t.me/cvedetector/7014", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25691 - Esri Portal for ArcGIS Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-25691 \nPublished : Oct. 4, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1, 10.9.1 and 10.8.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T21:03:28.000000Z"}, {"uuid": "1c1cc036-348e-41d5-849d-ef154f6732c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25694", "type": "seen", "source": "https://t.me/cvedetector/7009", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25694 - Esri Portal for ArcGIS Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-25694 \nPublished : Oct. 4, 2024, 6:15 p.m. | 41\u00a0minutes ago \nDescription : There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise versions 10.8.1 \u2013 10.9.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Layer Showcase application configuration which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser.  The privileges required to execute this attack are high.  The attack could disclose a privileged token which may result in the attacker gaining full control of the Portal. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-04T21:03:21.000000Z"}, {"uuid": "aaa2de80-8d06-405a-b283-c4620b0b23a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2569", "type": "seen", "source": "https://t.me/ctinow/210092", "content": "https://ift.tt/TjgUzrB\nCVE-2024-2569", "creation_timestamp": "2024-03-18T01:26:30.000000Z"}, {"uuid": "7df81157-1007-4b58-b3ef-a09c1c9e64e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2569", "type": "seen", "source": "https://t.me/ctinow/210088", "content": "https://ift.tt/TjgUzrB\nCVE-2024-2569", "creation_timestamp": "2024-03-18T01:21:49.000000Z"}, {"uuid": "d6428112-8d98-4d55-9a95-c971e673d6ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2569", "type": "seen", "source": "https://t.me/ctinow/209965", "content": "https://ift.tt/5wjEW7J\nCVE-2024-2569 | SourceCodester Employee Task Management System 1.0 /admin-manage-user.php redirect", "creation_timestamp": "2024-03-17T15:51:27.000000Z"}]}