A high-severity vulnerability in the AI-powered development tool Cursor allows installed extensions to access sensitive credentials, exposing API keys and session tokens without any user interaction.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results