Heard of fileless malware? How about malwareless cyber espionage? Russia's APT28 is spying on global organizations by modifying just one DNS setting in vulnerable routers.
A vulnerability classified as critical was found in agentfront frontmcp, adapters, sdk and mcp-from-openapi. This affects the function initialize of the component Model Context Protocol. The manipulation of the argument ref results in server-side request forgery.
This vulnerability is identified as CVE-2026-39885. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in ail-project ail-framework up to 6.7. The impacted element is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-39416. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Yamato-Security hayabusa up to 3.7.0/3.7.x. The affected element is an unknown function. Executing a manipulation of the argument Computer can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-40028. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in Sonatype Nexus Repository up to 3.90.x. Impacted is an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability was named CVE-2026-3438. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in InvenTree up to 1.2.6. This issue affects some unknown processing. Such manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2026-35479. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Shopify tophat up to 2.5.0. This vulnerability affects unknown code of the file /bin/bash of the component URL Parser. This manipulation causes os command injection.
This vulnerability is handled as CVE-2026-39862. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in open-telemetry opentelemetry-go up to 1.42.x. This affects an unknown part. The manipulation results in untrusted search path.
This vulnerability is known as CVE-2026-39883. Attacking locally is a requirement. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in LobeHub up to 2.1.47. It has been rated as critical. Affected by this issue is some unknown functionality of the file /webapi/chat/. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2026-39411. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.