Check Point researchers uncovered a remote code execution bug in popular vibe-coding AI tool Cursor that could allow an attacker to poison developer environments by secretly modifying a previously ...
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. The ...
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser — and potentially leverage the IDE’s privileges to perform system tasks.
The Browser MCP (Model Context Protocol) server, when paired with Cursor, provides a comprehensive platform for automating browser tasks and testing web applications. By combining browser navigation, ...
Enhancing the coding capabilities of Cursor AI can significantly improve your software development process. By integrating Zapier MCP servers, you gain the ability to automate tasks, connect APIs, and ...
Scispot, the AI-native lab operating system for modern life science teams, today announced the availability of the Scispot MCP Server, a Model Context Protocol server that lets AI assistants securely ...
The Model Context Protocol (MCP) enables AI agents to interact with external tools across hybrid environments but introduces critical security vulnerabilities, including identity theft, data leakage, ...
Lens by Mirantis today announced the launch of a built-in MCP (Model Context Protocol) server in Lens Desktop, the world's most widely adopted Kubernetes IDE with more than 1 mill ...