Filtered by vendor Akamai Subscriptions
Total 9 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-49493 1 Akamai 1 Cloudtest 2025-07-03 5.8 Medium
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.
CVE-2025-52491 1 Akamai 1 Cloudtest 2025-07-03 5.8 Medium
Akamai CloudTest before 60 2025.06.09 (12989) allows SSRF.
CVE-2016-10157 1 Akamai 1 Netsession 2025-04-20 N/A
Akamai NetSession 1.9.3.1 is vulnerable to DLL Hijacking: it tries to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because the mentioned DLL is missing from the installation, thus making it possible to hijack the DLL and subsequently inject code within the Akamai NetSession process space.
CVE-2008-1770 1 Akamai 1 Download Manager 2025-04-09 N/A
CRLF injection vulnerability in Akamai Download Manager ActiveX control before 2.2.3.6 allows remote attackers to force the download and execution of arbitrary files via a URL parameter containing an encoded LF followed by a malicious target line.
CVE-2025-24527 1 Akamai 1 Enterprise Application Access 2025-02-24 8 High
An issue was discovered in Akamai Enterprise Application Access (EAA) before 2025-01-17. If an admin knows another tenant's 128-bit connector GUID, they can execute debug commands on that connector.
CVE-2021-40683 2 Akamai, Microsoft 2 Enterprise Application Access, Windows 2024-11-21 7.8 High
In Akamai EAA (Enterprise Application Access) Client before 2.3.1, 2.4.x before 2.4.1, and 2.5.x before 2.5.3, an unquoted path may allow an attacker to hijack the flow of execution.
CVE-2019-18847 1 Akamai 1 Enterprise Application Access 2024-11-21 9.8 Critical
Enterprise Access Client Auto-Updater allows for Remote Code Execution prior to version 2.0.1.
CVE-2019-11011 1 Akamai 1 Cloudtest 2024-11-21 N/A
Akamai CloudTest before 58.30 allows remote code execution.
CVE-2024-45164 1 Akamai 1 Secure Internet Access Enterprise Threatavert 2024-11-06 4.3 Medium
Akamai SIA (Secure Internet Access Enterprise) ThreatAvert, in SPS (Security and Personalization Services) before the latest 19.2.0 patch and Apps Portal before 19.2.0.3 or 19.2.0.20240814, has incorrect authorization controls for the Admin functionality on the ThreatAvert Policy page. An authenticated user can navigate directly to the /#app/intelligence/threatAvertPolicies URI and disable policy enforcement.