| CVE | CVE-2026-40372 (Microsoft ASP.NET Core), CVE-2026-33626 (LMDeploy), CVE-2026-5760 (SGLang), CVE-2026-5752 (Cohere AI Terrarium), CVE-2026-3517, CVE-2026-3518, CVE-2026-3519, CVE-2026-4048 (Progress LoadMaster, ECS Connection Manager, Object Scale Connection Manager, and MOVEit WAF), CVE-2026-21876 (Progress MOVEit WAF), CVE-2026-32173 (Microsoft Azure SRE Agent), CVE-2026-25262 (Qualcomm), CVE-2025-24371 (CometBFT), CVE-2026-5754 (Radware Alteon), CVE-2026-40872 (Mailcow), CVE-2026-27654 (Nginx), CVE-2026-5756 (DRC INSIGHT), CVE-2026-5757 (Ollama), CVE-2026-41651 aka Pack2TheRoot (Linux PackageKit), CVE-2026-33824 (Microsoft Windows IKEv2), CVE-2026-21571, CVE-2026-33871 (Atlassian Bamboo Data Center), CVE-2026-40050 (CrowdStrike LogScale), CVE-2026-32604, CVE-2026-32613 (Spinnaker), CVE-2026-33694 (Tenable Nessus Agent on Windows), TRA-2026-30 (Windows-driver- samples), TRA-2026-35 (Yuma AI), and a remote code execution flaw in Slippi (no CVE). |
| 影響を受ける製品 | Microsoft ASP.NET Core, LMDeploy, SGLang, Cohere AI Terrarium, Progress LoadMaster, ECS Connection Manager, Object Scale Connection Manager, MOVEit WAF, Progress MOVEit WAF, Microsoft Azure SRE Agent, Qualcomm, CometBFT, Radware Alteon, Mailcow, Nginx, DRC INSIGHT, Ollama, Linux PackageKit, Microsoft Windows IKEv2, Atlassian Bamboo Data Center, CrowdStrike LogScale, Spinnaker, Tenable Nessus Agent on Windows, Windows-driver-samples, Yuma AI, Slippi |