Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
arcgis_server Vendor: esri

About This Product

arcgis_server is a software product offered by esri. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 65 known vulnerabilities affecting esri arcgis_server. This includes 4 critical-severity issues and 5 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2012 to 2025, indicating a sustained research interest and ongoing security attention. 52 medium-severity issues and 4 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-4949 2012-11-14 2025-04-11 - 6.5 Likely
CVE-2013-5221 2013-09-24 2025-04-11 - 3.5 Unknown
CVE-2013-5222 2013-12-30 2025-04-11 - 3.5 Unknown
CVE-2013-7231 2013-12-30 2025-04-11 - 3.5 Unknown
CVE-2013-7232 2013-12-30 2025-04-11 - 7.5 Likely
CVE-2014-5121 2014-08-22 2025-04-12 - 4.3 Likely
CVE-2014-5122 2014-08-22 2025-04-12 - 5.8 Likely
CVE-2014-9741 2015-07-08 2025-04-12 - 4.3 Likely
CVE-2020-35712 2020-12-26 2024-11-21 9.8 9.3 Likely
CVE-2021-29093 2021-03-25 2024-11-21 6.8 6.0 Unknown
CVE-2021-29094 2021-03-25 2024-11-21 6.8 6.0 Unknown
CVE-2021-29095 2021-03-25 2024-11-21 6.8 6.0 Unknown
CVE-2021-29099 2021-06-07 2024-11-21 5.3 5.0 Likely
CVE-2021-29106 2021-07-10 2024-11-21 6.1 4.3 Likely
CVE-2021-29107 2021-07-10 2024-11-21 6.1 4.3 Likely
CVE-2021-29102 2021-07-11 2024-11-21 9.1 6.4 Likely
CVE-2021-29103 2021-07-11 2024-11-21 6.1 4.3 Likely
CVE-2021-29104 2021-07-11 2024-11-21 6.1 4.3 Likely
CVE-2021-29105 2021-07-11 2024-11-21 5.4 3.5 Unknown
CVE-2021-29113 2021-12-07 2024-11-21 4.7 4.3 Likely
CVE-2021-29114 2021-12-07 2024-11-21 9.8 7.5 Likely
CVE-2021-29116 2021-12-07 2024-11-21 6.1 4.3 Likely
CVE-2022-38195 2022-10-25 2024-11-21 6.1 - -
CVE-2022-38196 2022-10-25 2024-11-21 6.5 - -
CVE-2022-38197 2022-10-25 2024-11-21 6.1 - -
CVE-2022-38198 2022-10-25 2024-11-21 6.1 - -
CVE-2022-38199 2022-10-25 2024-11-21 6.1 - -
CVE-2022-38200 2022-10-25 2024-11-21 6.1 - -
CVE-2022-38202 2022-12-28 2024-11-21 7.5 - -
CVE-2023-25840 2023-07-21 2025-04-10 3.4 - -
CVE-2023-25841 2023-07-21 2025-04-10 6.1 - -
CVE-2023-25848 2023-08-25 2024-11-21 5.3 - -
CVE-2024-10904 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51942 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51944 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51945 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51946 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51947 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51948 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51949 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51950 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51951 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51952 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51953 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51954 2025-03-03 2026-02-13 8.5 - -
CVE-2024-51956 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51957 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51958 2025-03-03 2025-04-10 4.9 - -
CVE-2024-51959 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51960 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51961 2025-03-03 2025-04-10 7.5 - -
CVE-2024-51962 2025-03-03 2026-02-13 8.7 - -
CVE-2024-51963 2025-03-03 2025-04-10 4.8 - -
CVE-2024-51966 2025-03-03 2025-04-10 4.9 - -
CVE-2024-5888 2025-03-03 2025-04-10 4.8 - -
CVE-2025-57870 2025-10-22 2025-10-31 10.0 - -
CVE-2025-67703 2025-12-31 2026-01-06 6.1 - -
CVE-2025-67704 2025-12-31 2026-01-06 6.1 - -
CVE-2025-67705 2025-12-31 2026-01-06 6.1 - -
CVE-2025-67706 2025-12-31 2026-02-19 5.6 - -
CVE-2025-67707 2025-12-31 2026-02-20 5.6 - -
CVE-2025-67708 2025-12-31 2026-01-06 6.1 - -
CVE-2025-67709 2025-12-31 2026-01-06 6.1 - -
CVE-2025-67710 2025-12-31 2026-01-06 6.1 - -
CVE-2025-67711 2025-12-31 2026-01-06 6.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for esri arcgis_server by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.