
City of Odessa, Texas
City of Odessa, TX LinkedIn Filled with amazing people, food & places! Social Media - https://tinyurl.com/26ckbwsv



City of Odessa, TX LinkedIn Filled with amazing people, food & places! Social Media - https://tinyurl.com/26ckbwsv

Making Orange County a safe, healthy, and fulfilling place to live, work, and play, today and for generations to come, by providing outstanding, cost-effective regional public services. We strive to be a high quality model governmental agency that delivers services to the community in ways that demonstrate: Excellence - Provide responsive and timely services Leadership - Leverage available resources as we partner with regional businesses and other governmental entities Stewardship - Seek cost-effective and efficient methods Innovation Use leading-edge innovative technology
Security & Compliance Standards Overview












No incidents recorded for City of Odessa, Texas in 2025.
No incidents recorded for County of Orange in 2025.
City of Odessa, Texas cyber incidents detection timeline including parent company and subsidiaries
County of Orange cyber incidents detection timeline including parent company and subsidiaries
Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.
Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.
Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.
LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.
CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.