Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor.
"Disguised as developer tools offering 'the cheapest Cursor API,' these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor's
The Vulnerability Treadmill
The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. Our Vulnerability Operation Center (VOC) dataset analysis identified 1,337,797 unique findings (security issues) across 68,500 unique customer assets. 32,585 of them were distinct
A vulnerability, which was classified as critical, has been found in Themefic Instantio Plugin up to 3.3.16 on WordPress. This issue affects some unknown processing. The manipulation leads to unrestricted upload.
The identification of this vulnerability is CVE-2025-47550. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Themefic BEAF Plugin up to 4.6.10 on WordPress. It has been classified as critical. This affects an unknown part. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2025-47549. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in H3C GR-1800AX up to 100R008 and classified as critical. Affected by this issue is the function EnableIpv6 of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow.
This vulnerability is handled as CVE-2025-4440. Access to the local network is required for this attack to succeed. Furthermore, there is an exploit available.
A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formSetWAN_Wizard534. The manipulation of the argument curTime leads to buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is uniquely identified as CVE-2025-4441. It is possible to initiate the attack remotely. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability was found in D-Link DIR-605L 2.13B01. It has been declared as critical. This vulnerability affects the function formSetWAN_Wizard55. The manipulation of the argument curTime leads to buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability was named CVE-2025-4442. The attack can be initiated remotely. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability was found in D-Link DIR-605L 2.13B01. It has been rated as critical. This issue affects the function sub_454F2C. The manipulation of the argument sysCmd leads to command injection. This vulnerability only affects products that are no longer supported by the maintainer.
The identification of this vulnerability is CVE-2025-4443. The attack may be initiated remotely. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01. Affected is the function wake_on_lan. The manipulation of the argument mac leads to command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is traded as CVE-2025-4445. It is possible to launch the attack remotely. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability has been found in H3C GR-5400AX up to 100R008 and classified as critical. This vulnerability affects the function Edit_List_SSID of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow.
This vulnerability was named CVE-2025-4446. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability classified as critical was found in D-Link DIR-619L 2.04B04. This vulnerability affects the function formEasySetupWizard. The manipulation of the argument curTime leads to buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability was named CVE-2025-4448. The attack can be initiated remotely. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability, which was classified as problematic, was found in Microsoft Windows 10/Server 2016. This affects an unknown part of the component VHD Driver. The manipulation leads to improper access controls (File).
This vulnerability is uniquely identified as CVE-2016-7226. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.