CVE-2025-54782 – Nest Devtools Integration Remote Code Execution Vulnerability
Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and […]
CVE-2025-54781 – Microsoft Azure Entra ID/Intune Token Leak Vulnerability
The following table lists the changes that have been made to the CVE-2025-54781 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 02, 2025 Action […]
CVE-2025-54386 – Traefik WASM Plugin Path Traversal Vulnerability
Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefik’s plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with ../ sequences, an attacker can overwrite arbitrary files on the system outside of […]
CVE-2025-54136 – Cursor Remote Code Execution Vulnerability
Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target’s machine. Once a collaborator accepts a harmless MCP, the attacker can […]
CVE-2025-54133 – Cursor Model Context Protocol (MCP) UI Information Disclosure Vulnerability
Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor’s MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system commands through social engineering attacks. When users click malicious `cursor://anysphere.cursor-deeplink/mcp/install` links, the installation dialog does not show the […]
CVE-2025-54792 – LocalSend Man-in-the-Middle Vulnerability
LocalSend is an open-source app to securely share files and messages with nearby devices over local networks without needing an internet connection. In versions 1.16.1 and below, a critical Man-in-the-Middle (MitM) vulnerability in the software’s discovery protocol allows an unauthenticated attacker on the same local network to impersonate legitimate devices, silently intercepting, reading, and modifying […]
CVE-2025-54424 – 1Panel Remote Code Execution (RCE) via Incomplete Certificate Verification
1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server. In versions 2.0.5 and below, the HTTPS protocol used for communication between the Core and Agent endpoints has incomplete certificate verification during certificate validation, leading to unauthorized interface access. Due to the presence of numerous […]
CVE-2025-54132 – “Cursor Mermaid Image Exfiltration Vulnerability”
The following table lists the changes that have been made to the CVE-2025-54132 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]
CVE-2025-54131 – Cursor Command Injection Bypass
The following table lists the changes that have been made to the CVE-2025-54131 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 01, 2025 Action […]