5.1

CVSS4.0

CVE-2025-54789 - Files is Vulnerable to Reflected Self-XSS through its File Move Functionality

Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, the File Move functionality does not contain logic that prevents injection of arbitrary JavaScript, which can lead to Browser JS code execution in the context of the user’s session. This is fixed in …

📅 Published: Aug. 1, 2025, 11:26 p.m. 🔄 Last Modified: Aug. 2, 2025, 12:15 a.m.

7.2

CVSS3.1

CVE-2025-54136 - Cursor's Modification of MCP Server Definitions Bypasses Manual Re-approvals

Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collabo…

📅 Published: Aug. 1, 2025, 11:08 p.m. 🔄 Last Modified: Aug. 2, 2025, 12:15 a.m.

5.3

CVSS4.0

CVE-2025-54133 - Cursor's MCP Install Deeplink Does Not Show Arguments in its User-Dialog

Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system commands through social engineering attacks. When…

📅 Published: Aug. 1, 2025, 11:07 p.m. 🔄 Last Modified: Aug. 2, 2025, 12:15 a.m.

4.4

CVSS3.1

CVE-2025-54132 - Cursor's Mermaid Diagram Tool is Vulnerable to an Arbitrary Image Fetch

Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled serve…

📅 Published: Aug. 1, 2025, 11:05 p.m. 🔄 Last Modified: Aug. 1, 2025, 11:15 p.m.

6.4

CVSS3.1

CVE-2025-54131 - Cursor bypasses its allow list to execute arbitrary commands

Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every terminal call) to an allowlist, an attacker can ex…

📅 Published: Aug. 1, 2025, 11:05 p.m. 🔄 Last Modified: Aug. 1, 2025, 11:15 p.m.

8.1

CVSS3.1

CVE-2025-54424 - 1Panel Agent Bypasses Certificate Verification Leading to Arbitrary Command Execution

1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server. In versions 2.0.5 and below, the HTTPS protocol used for communication between the Core and Agent endpoints has incomplete certificate verification during certificate validation…

📅 Published: Aug. 1, 2025, 11:04 p.m. 🔄 Last Modified: Aug. 1, 2025, 11:15 p.m.

9.3

CVSS4.0

CVE-2025-54792 - LocalSend is Vulnerable to Man-in-the-Middle Attacks, Leading to File Interception

LocalSend is an open-source app to securely share files and messages with nearby devices over local networks without needing an internet connection. In versions 1.16.1 and below, a critical Man-in-the-Middle (MitM) vulnerability in the software's discovery protocol allows an unauthenticated attacke…

📅 Published: Aug. 1, 2025, 11:04 p.m. 🔄 Last Modified: Aug. 1, 2025, 11:15 p.m.

2

CVSS4.0

CVE-2024-13978 - LibTIFF fax2ps tiff2pdf.c t2p_read_tiff_init null pointer dereference

A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locall…

📅 Published: Aug. 1, 2025, 9:32 p.m. 🔄 Last Modified: Aug. 1, 2025, 10:15 p.m.

8.7

CVSS4.0

CVE-2013-10053 - ZPanel <= 10.0.0.2 htpasswd Module Username Command Execution

A remote command execution vulnerability exists in ZPanel version 10.0.0.2 in its htpasswd module. When creating .htaccess files, the inHTUsername field is passed unsanitized to a system() call that invokes the system’s htpasswd binary. By injecting shell metacharacters into the username field, an …

📅 Published: Aug. 1, 2025, 8:49 p.m. 🔄 Last Modified: Aug. 1, 2025, 9:15 p.m.

7.5

CVSS4.0

CVE-2013-10057 - Synactis PDF In-The-Box ConnectToSynactic Stack-Based Buffer Overflow

A stack-based buffer overflow vulnerability exists in Synactis PDF In-The-Box ActiveX control (PDF_IN_1.ocx), specifically the ConnectToSynactis method. When a long string is passed to this method—intended to populate the ldCmdLine argument of a WinExec call—a strcpy operation overwrites a saved TR…

📅 Published: Aug. 1, 2025, 8:48 p.m. 🔄 Last Modified: Aug. 1, 2025, 9:15 p.m.
Total resulsts: 304018
Page 4 of 30,402
« previous page » next page
Filters