Known Vulnerabilities for Enterprise Application Access by Akamai

Listed below are 2 of the newest known vulnerabilities associated with the software "Enterprise Application Access" by "Akamai".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-41744 All versions of yongyou PLM are affected by a command injection issue. UFIDA PLM (Product Life Cycle Management) is a strateg... Not Provided 2021-10-22 2021-10-22
CVE-2021-41619 An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application st... Not Provided 2021-10-27 2021-10-27
CVE-2021-40683 In Akamai EAA (Enterprise Application Access) Client before 2.3.1, 2.4.x before 2.4.1, and 2.5.x before 2.5.3, an unquoted pa... Not Provided 2021-10-04 2021-10-04
CVE-2021-35543 Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Activity Gu... Not Provided 2021-10-20 2021-10-20
CVE-2019-18847 Enterprise Access Client Auto-Updater allows for Remote Code Execution prior to version 2.0.1. 9.8 - CRITICAL 2020-08-26 2020-09-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAkamaiEnterprise Application Access2.0.1AllAllAll
ApplicationAkamaiEnterprise Application Access-AllAllAll

Popular searches for Enterprise Application Access

Enterprise Application Access | Remote Access to Applications | Akamai

J FEnterprise Application Access | Remote Access to Applications | Akamai Akamai Enterprise Application Access | EAA is an Identity-Aware Proxy IAP in the cloud. Its a flexible and adaptable service with granular decision-making access p n l based on real-time signals such as threat intelligence, device posture, and user information that delivers access 1 / - to corporate applications without providing access to the entire network. Application software Akamai Technologies Microsoft Access Cloud computing Computer security Computer network User (computing) Decision-making Application layer Computer hardware Proxy server User information Threat Intelligence Platform Real-time computing Single sign-on Granularity Computing platform Virtual private network Microsoft Edge Access (company)

Enterprise Application Access | アプリケーションへのリモートアクセス | Akamai

Enterprise Application Access | Akamai Akamai Enterprise Application Access

Akamai Technologies Application software Microsoft Access Virtual private network Application layer Microsoft Edge Access (company) Content delivery network Ha (kana) Gartner Denial-of-service attack Computing platform Single sign-on Return on investment Chief technology officer Software as a service URL DevOps Grant Thornton International Cloud computing

© 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license. and Source URL Uptime Status