-

-

11 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 14.08.2025 09:49:52
  • Last modified 14.08.2025 16:15:41

User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.

  • EPSS 0.22%
  • Published 13.08.2025 08:55:14
  • Last modified 13.08.2025 20:15:32

Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.

  • EPSS 0.36%
  • Published 09.07.2025 12:41:44
  • Last modified 10.07.2025 13:17:30

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

Exploit
  • EPSS 0.22%
  • Published 23.05.2025 14:53:43
  • Last modified 13.08.2025 15:42:28

Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerab...

  • EPSS 0.1%
  • Published 13.07.2018 20:29:02
  • Last modified 21.11.2024 03:10:57

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including improperly specified padding in CBC mode allows use of an EDA tool as a de...

  • EPSS 0.1%
  • Published 13.07.2018 20:29:02
  • Last modified 21.11.2024 03:10:57

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including improperly specified HDL syntax allows use of an EDA tool as a decryption ...

  • EPSS 0.1%
  • Published 13.07.2018 20:29:02
  • Last modified 21.11.2024 03:10:57

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of encrypted IP cyphertext to insert hardware trojans. The me...

  • EPSS 0.04%
  • Published 13.07.2018 20:29:02
  • Last modified 21.11.2024 03:10:57

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of the encryption key and insertion of hardware trojans in an...

  • EPSS 0.1%
  • Published 13.07.2018 20:29:02
  • Last modified 21.11.2024 03:10:57

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of a license-deny response to a license grant. The methods ar...

  • EPSS 0.1%
  • Published 13.07.2018 20:29:02
  • Last modified 21.11.2024 03:10:57

The P1735 IEEE standard describes flawed methods for encrypting electronic-design intellectual property (IP), as well as the management of access rights for such IP, including modification of Rights Block to remove or relax access control. The method...