| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-1186 | Path Traversal in EAP Legislator | ABC PRO SP. Z O.O. | EAP Legislator | - | - | 2026-02-02 13:59:57 | Deep Dive |
| CVE-2025-9290 | Authentication Weakness on Omada Controllers, Gateways and Access Points | TP-Link Systems Inc. | Omada Software Controller | 中危 | - | 2026-01-22 23:14:46 | Deep Dive |
| CVE-2024-8447 | Narayana: deadlock via multiple join requests sent to lra coordinator | - | - | Medium | 5.9 | 2025-01-02 20:19:30 | Deep Dive |
| CVE-2024-6162 | Undertow: url-encoded request path information can be broken on ajp-listener | - | - | High | 7.5 | 2024-06-20 14:33:10 | Deep Dive |
| CVE-2024-22250 | Session Hijack Vulnerability in Deprecated EAP Browser Plugin | VMware | VMware Enhanced Authentication Plug-in (EAP) | High | 7.8 | 2024-02-20 17:35:23 | Deep Dive |
| CVE-2024-22245 | Arbitrary Authentication Relay Vulnerability in Deprecated EAP Browser Plugin | VMware | VMware Enhanced Authentication Plug-in (EAP) | Critical | 9.6 | 2024-02-20 17:35:09 | Deep Dive |
| CVE-2023-4503 | Eap-galleon: custom provisioning creates unsecured http-invoker | Red Hat | EAP 7.4.14 | Medium | 6.8 | 2024-02-06 08:39:02 | Deep Dive |
| CVE-2023-3171 | Eap-7: heap exhaustion via deserialization | Red Hat | EAP 7.4.13 | High | 7.5 | 2023-12-27 15:45:33 | Deep Dive |
| CVE-2023-1108 | Undertow: infinite loop in sslconduit during close | - | - | High | 7.5 | 2023-09-14 14:48:59 | Deep Dive |
| CVE-2021-20318 | Red Hat Jboss Enterprise Application Platform 7 代码问题漏洞 | - | Artemis in EAP 7 | 高危 | - | 2021-12-23 19:48:41 | Deep Dive |
| CVE-2019-14885 | Red Hat JBoss Enterprise Application Platform 日志信息泄露漏洞 | Red Hat | JBoss EAP | 中危 | - | 2020-01-23 00:00:00 | Deep Dive |
| CVE-2014-0169 | Red Hat JBoss Enterprise Application Platform 安全漏洞 | Red Hat | JBoss EAP | 中危 | - | 2020-01-02 19:09:51 | Deep Dive |
| CVE-2019-9499 | The implementations of EAP-PWD in wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit | Wi-Fi Alliance | hostapd with EAP-pwd support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9498 | The implementations of EAP-PWD in hostapd EAP Server do not validate the scalar and element values in EAP-pwd-Commit | Wi-Fi Alliance | hostapd with EAP-pwd support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9497 | The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit | Wi-Fi Alliance | hostapd with EAP-pwd support | 高危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2019-9495 | The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns | Wi-Fi Alliance | hostapd with EAP-pwd support | 低危 | - | 2019-04-17 13:31:08 | Deep Dive |
| CVE-2018-5393 | TP-Link EAP Controller versions 2.5.3 and earlier lack RMI authentication | TP-LINK | EAP Controller | 超危 | - | 2018-09-28 17:00:00 | Deep Dive |
| CVE-2016-7061 | Red hat JBoss Enterprise Application Platform 信息泄露漏洞 | Red Hat | EAP | 中危 | - | 2018-09-10 16:00:00 | Deep Dive |
| CVE-2017-12167 | Red Hat JBoss Enterprise Application Platform 信息泄露漏洞 | Red Hat | EAP-7 | 中危 | - | 2018-07-26 17:00:00 | Deep Dive |
| CVE-2016-9585 | Red Hat JBoss Enterprise Application Platform 安全漏洞 | Red Hat, Inc. | EAP-5 | 中危 | - | 2018-03-09 15:00:00 | Deep Dive |