(Credit: Timon – stock.adobe.com)
Cursor vulnerability enables stealthy RCE via indirect prompt injection
An attacker could have triggered certain shell built-in commands without user approval.
(Credit: Timon – stock.adobe.com)
You can skip this ad in 5 seconds