AI Development Tools | Cybersecurity | Software Vulnerabilities A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.
AI Security | Remote Code Execution | Vulnerability A vulnerability in the AI-powered Cursor IDE allows for the execution of remote code without requiring any interaction from the user.