Vulnerability Manager Plus
Download 
  • Overview
  • Features
  • Demos
  • Documents
  • Get Quote
  • Support
 
Home » Help »

Vulnerability Database

  • Understanding Vulnerability Management
    • LAN Architecture
    • WAN Architecture
    • Supported networks
  • Installation & setup
    • Accessing the web console
    • Scope of management
    • Manage Windows systems
    • Manage Mac computers
    • Manage Linux computers
    • Manage roaming users
  • Settings
    • Server settings
    • Proxy settings
    • Mail Server settings
    • Configuring Active Directory
    • General settings
    • Exclude folders from antivirus scan
  • Managing vulnerabilities
    • Manage vulnerabilities
    • Mitigate Zero-day vulnerabilities
    • Vulnerability and patch management for closed network (DMZ)
  • Managing Patches
    • Patch Settings
    • Patch deployment
    • Decline patch
  • Securing windows systems
    • Manage security configurations
    • Audit high-risk software
    • Secure web servers
  • Misconfiguration
  • Vulnerability Database
  • How To's
  • Knowledge Base
  • FAQ's
  • Latest Vulnerabilities
  • Microsoft Vulnerabilities
  • Third Party Vulnerabilities
  • Web Server Vulnerabilities
  • DB Server Vulnerabilities
Last updated on Feb 25, 2026
S.No Vulnerability Name Severity
Vulnerabilities CVE-2025-54135 are affected in Cursor (x64) 1.2.1Important
Vulnerabilities CVE-2025-54130,CVE-2025-54135 are affected in Cursor (x64) 1.3.8Important
Vulnerabilities CVE-2025-54131,CVE-2025-54132,CVE-2025-54133,CVE-2025-54136 are affected in Cursor (x64) 1.2Moderate
Vulnerabilities CVE-2025-59944 are affected in Cursor (x64) 1.6.23Important
Vulnerabilities CVE-2025-61589,CVE-2025-61590 are affected in Cursor (x64) 1.6Important
Vulnerabilities CVE-2025-61591 are affected in Cursor (x64) 1.7Important
Vulnerabilities CVE-2025-64106,CVE-2025-64110 are affected in Cursor (x64) 1.9Important
Vulnerabilities CVE-2026-22708 are affected in Cursor (x64) 2.2Moderate
Vulnerabilities CVE-2026-26268 are affected in Cursor (x64) 2.4Important

Disclaimer: This webpage is intended to provide you information about vulnerability announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.