<cvrf:cvrfdoc
  xmlns:vuln="http://www.icasi.org/CVRF/schema/vuln/1.1"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:cvrf-common="http://www.icasi.org/CVRF/schema/common/1.1"
  xmlns:prod="http://www.icasi.org/CVRF/schema/prod/1.1"
  xmlns:scap-core="https://scap.nist.gov/schema/scap-core/1.0"
  xmlns:cvssv2="https://scap.nist.gov/schema/cvss-v2/1.0"
  xmlns:cpe-lang="http://cpe.mitre.org/language/2.0"
  xmlns:sch="http://purl.oclc.org/dsdl/schematron"
  xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <cvrf:DocumentTitle>February 2022 Security Updates</cvrf:DocumentTitle>
  <cvrf:DocumentType>Security Update</cvrf:DocumentType>
  <cvrf:DocumentPublisher
    Type="Vendor">
    <cvrf:ContactDetails>secure@microsoft.com</cvrf:ContactDetails>
    <cvrf:IssuingAuthority>The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to security incidents and Microsoft software security vulnerabilities. For more information, see http://www.microsoft.com/security/msrc.</cvrf:IssuingAuthority>
  </cvrf:DocumentPublisher>
  <cvrf:DocumentTracking>
    <cvrf:Identification>
      <cvrf:ID>2022-Feb</cvrf:ID>
      <cvrf:Alias>2022-Feb</cvrf:Alias>
    </cvrf:Identification>
    <cvrf:Status>Final</cvrf:Status>
    <cvrf:Version>1.0</cvrf:Version>
    <cvrf:RevisionHistory>
      <cvrf:Revision>
        <cvrf:Number>42</cvrf:Number>
        <cvrf:Date>2026-02-18T03:19:01</cvrf:Date>
        <cvrf:Description>February 2022 Security Updates</cvrf:Description>
      </cvrf:Revision>
    </cvrf:RevisionHistory>
    <cvrf:InitialReleaseDate>2022-02-08T08:00:00</cvrf:InitialReleaseDate>
    <cvrf:CurrentReleaseDate>2026-02-18T03:19:01</cvrf:CurrentReleaseDate>
  </cvrf:DocumentTracking>
  <cvrf:DocumentNotes>
    <cvrf:Note
      Title="Release Notes"
      Audience="Public"
      Type="Details"
      Ordinal="0">&lt;h2 id="updates-this-month"&gt;Updates this Month&lt;/h2&gt;
&lt;p&gt;This release consists of security updates for the following products, features and roles.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Azure Data Explorer&lt;/li&gt;
&lt;li&gt;Kestrel Web Server&lt;/li&gt;
&lt;li&gt;Microsoft Dynamics&lt;/li&gt;
&lt;li&gt;Microsoft Dynamics GP&lt;/li&gt;
&lt;li&gt;Microsoft Edge (Chromium-based)&lt;/li&gt;
&lt;li&gt;Microsoft Office&lt;/li&gt;
&lt;li&gt;Microsoft Office Excel&lt;/li&gt;
&lt;li&gt;Microsoft Office Outlook&lt;/li&gt;
&lt;li&gt;Microsoft Office SharePoint&lt;/li&gt;
&lt;li&gt;Microsoft Office Visio&lt;/li&gt;
&lt;li&gt;Microsoft OneDrive&lt;/li&gt;
&lt;li&gt;Microsoft Teams&lt;/li&gt;
&lt;li&gt;Microsoft Windows Codecs Library&lt;/li&gt;
&lt;li&gt;Power BI&lt;/li&gt;
&lt;li&gt;Roaming Security Rights Management Services&lt;/li&gt;
&lt;li&gt;Role: DNS Server&lt;/li&gt;
&lt;li&gt;Role: Windows Hyper-V&lt;/li&gt;
&lt;li&gt;SQL Server&lt;/li&gt;
&lt;li&gt;Visual Studio Code&lt;/li&gt;
&lt;li&gt;Windows Common Log File System Driver&lt;/li&gt;
&lt;li&gt;Windows DWM Core Library&lt;/li&gt;
&lt;li&gt;Windows Kernel&lt;/li&gt;
&lt;li&gt;Windows Kernel-Mode Drivers&lt;/li&gt;
&lt;li&gt;Windows Named Pipe File System&lt;/li&gt;
&lt;li&gt;Windows Print Spooler Components&lt;/li&gt;
&lt;li&gt;Windows Remote Access Connection Manager&lt;/li&gt;
&lt;li&gt;Windows Remote Procedure Call Runtime&lt;/li&gt;
&lt;li&gt;Windows User Account Profile&lt;/li&gt;
&lt;li&gt;Windows Win32K&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Please note the following information regarding the security updates:&lt;/p&gt;
&lt;h2 id="security-update-guide-blog-posts"&gt;Security Update Guide Blog Posts&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;
&lt;th&gt;Blog Post&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;January 11, 2022&lt;/td&gt;
&lt;td&gt;&lt;a href="https://aka.ms/SUGNotificationProfile"&gt;Coming Soon: New Security Update Guide Notification System&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;February 9, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/02/09/continuing-to-listen-good-news-about-the-security-update-guide-api/"&gt;Continuing to Listen: Good News about the Security Update Guide API&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 13, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;December 8, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/12/08/security-update-guide-lets-keep-the-conversation-going/"&gt;Security Update Guide: Let’s keep the conversation going&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;November 9, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/11/09/vulnerability-descriptions-in-the-new-version-of-the-security-update-guide/"&gt;Vulnerability Descriptions in the New Version of the Security Update Guide&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="relevant-information"&gt;Relevant Information&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The new Hotpatching feature is now generally available. Please see &lt;a href="https://docs.microsoft.com/en-us/azure/automanage/automanage-hotpatch?WT.mc_id=modinfra-18529-thmaure"&gt;Hotpatching feature for Windows Server Azure Edition virtual machines (VMs)&lt;/a&gt; for more information.&lt;/li&gt;
&lt;li&gt;Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the &lt;a href="https://www.catalog.update.microsoft.com/Home.aspx"&gt;Microsoft Update Catalog&lt;/a&gt;. For information on lifecycle and support dates for Windows 10 operating systems, please see &lt;a href="https://docs.microsoft.com/en-us/lifecycle/faq/windows"&gt;Windows Lifecycle Facts Sheet&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Microsoft is improving Windows Release Notes. For more information, please see &lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-next-for-windows-release-notes/ba-p/1754399"&gt;What's next for Windows release notes&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A list of the latest servicing stack updates for each operating system can be found in &lt;a href="https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001"&gt;ADV990001&lt;/a&gt;. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.&lt;/li&gt;
&lt;li&gt;In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.&lt;/li&gt;
&lt;li&gt;Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See &lt;a href="https://support.microsoft.com/en-us/topic/procedure-to-continue-receiving-security-updates-after-extended-support-ends-on-january-14-2020-48c59204-fe67-3f42-84fc-c3c3145ff28e"&gt;4522133&lt;/a&gt; for more information.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="faqs-mitigations-and-workarounds"&gt;FAQs, Mitigations, and Workarounds&lt;/h2&gt;
&lt;p&gt;The following CVEs have FAQs, Mitigations, or Workarounds. You can see these in more detail from the Vulnerabilities tab by selecting &lt;strong&gt;FAQs&lt;/strong&gt;, &lt;strong&gt;Mitigations&lt;/strong&gt; and &lt;strong&gt;Workarounds&lt;/strong&gt; columns in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0452"&gt;CVE-2022-0452&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0453"&gt;CVE-2022-0453&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0454"&gt;CVE-2022-0454&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0455"&gt;CVE-2022-0455&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0456"&gt;CVE-2022-0456&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0457"&gt;CVE-2022-0457&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0458"&gt;CVE-2022-0458&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0459"&gt;CVE-2022-0459&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0460"&gt;CVE-2022-0460&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0461"&gt;CVE-2022-0461&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0462"&gt;CVE-2022-0462&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0463"&gt;CVE-2022-0463&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0464"&gt;CVE-2022-0464&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0465"&gt;CVE-2022-0465&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0466"&gt;CVE-2022-0466&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0467"&gt;CVE-2022-0467&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0468"&gt;CVE-2022-0468&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0469"&gt;CVE-2022-0469&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0470"&gt;CVE-2022-0470&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21844"&gt;CVE-2022-21844&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21926"&gt;CVE-2022-21926&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21927"&gt;CVE-2022-21927&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21965"&gt;CVE-2022-21965&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21968"&gt;CVE-2022-21968&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21971"&gt;CVE-2022-21971&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21974"&gt;CVE-2022-21974&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21984"&gt;CVE-2022-21984&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21985"&gt;CVE-2022-21985&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21986"&gt;CVE-2022-21986&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21987"&gt;CVE-2022-21987&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21988"&gt;CVE-2022-21988&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21989"&gt;CVE-2022-21989&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21991"&gt;CVE-2022-21991&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21992"&gt;CVE-2022-21992&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21993"&gt;CVE-2022-21993&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21995"&gt;CVE-2022-21995&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21997"&gt;CVE-2022-21997&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21998"&gt;CVE-2022-21998&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22003"&gt;CVE-2022-22003&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22004"&gt;CVE-2022-22004&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22005"&gt;CVE-2022-22005&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22709"&gt;CVE-2022-22709&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22712"&gt;CVE-2022-22712&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22716"&gt;CVE-2022-22716&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22717"&gt;CVE-2022-22717&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23252"&gt;CVE-2022-23252&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23254"&gt;CVE-2022-23254&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23255"&gt;CVE-2022-23255&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23256"&gt;CVE-2022-23256&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23261"&gt;CVE-2022-23261&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23262"&gt;CVE-2022-23262&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23263"&gt;CVE-2022-23263&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23269"&gt;CVE-2022-23269&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23272"&gt;CVE-2022-23272&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23274"&gt;CVE-2022-23274&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23276"&gt;CVE-2022-23276&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23280"&gt;CVE-2022-23280&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="known-issues"&gt;Known Issues&lt;/h2&gt;
&lt;p&gt;You can see these in more detail from the Deployments tab by selecting &lt;strong&gt;Known Issues&lt;/strong&gt; column in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;p&gt;For more information about Windows Known Issues, please see &lt;a href="https://docs.microsoft.com/en-us/windows/release-information/windows-message-center"&gt;Windows message center&lt;/a&gt; (links to currently-supported versions of Windows are in the left pane).&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;KB Article&lt;/th&gt;
&lt;th&gt;Applies To&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010342"&gt;5010342&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 20H2, Windows Server, version 20H2, Windows 10, version 21H1, Windows 10, version 21H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010351"&gt;5010351&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 1809, Windows Server 2019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010354"&gt;5010354&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2022&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010384"&gt;5010384&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010392"&gt;5010392&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2012 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010395"&gt;5010395&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 8.1, Windows Server 2012 R2 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010403"&gt;5010403&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010404"&gt;5010404&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 7, Windows Server 2008 R2 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010412"&gt;5010412&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2012 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010419"&gt;5010419&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5010422"&gt;5010422&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 7, Windows Server 2008 R2 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5002135"&gt;5002135&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;SharePoint Server 2019&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</cvrf:Note>
    <cvrf:Note
      Title="Legal Disclaimer"
      Audience="Public"
      Type="Legal Disclaimer"
      Ordinal="1">The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.</cvrf:Note>
  </cvrf:DocumentNotes>
  <prod:ProductTree>
    <prod:Branch
      Type="Vendor"
      Name="Microsoft">
      <prod:Branch
        Type="Product Family"
        Name="Windows">
        <prod:FullProductName
          ProductID="11568">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11569">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11570">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11571">Windows Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11572">Windows Server 2019 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11712">Windows 10 Version 1909 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11713">Windows 10 Version 1909 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11714">Windows 10 Version 1909 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11896">Windows 10 Version 21H1 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11897">Windows 10 Version 21H1 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11898">Windows 10 Version 21H1 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11923">Windows Server 2022</prod:FullProductName>
        <prod:FullProductName
          ProductID="11924">Windows Server 2022 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11801">Windows 10 Version 20H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11802">Windows 10 Version 20H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11803">Windows Server, version 20H2 (Server Core Installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11926">Windows 11 version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11927">Windows 11 version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11929">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11930">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11931">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10852">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10853">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10816">Windows Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="10855">Windows Server 2016 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12010">HEVC Video Extension</prod:FullProductName>
        <prod:FullProductName
          ProductID="11808">HEVC Video Extensions</prod:FullProductName>
        <prod:FullProductName
          ProductID="10729">Windows 10 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10735">Windows 10 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10481">Windows 8.1 for 32-bit systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10482">Windows 8.1 for x64-based systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10484">Windows RT 8.1</prod:FullProductName>
        <prod:FullProductName
          ProductID="11884">VP9 Video Extensions</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Dynamics">
        <prod:FullProductName
          ProductID="11664">Microsoft Dynamics 365 (on-premises) version 9.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="11921">Microsoft Dynamics 365 (on-premises) version 9.1</prod:FullProductName>
        <prod:FullProductName
          ProductID="12005">Microsoft Dynamics GP</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Office">
        <prod:FullProductName
          ProductID="11858">Microsoft Teams for iOS</prod:FullProductName>
        <prod:FullProductName
          ProductID="12007">Microsoft Teams for Android</prod:FullProductName>
        <prod:FullProductName
          ProductID="12008">Microsoft Teams Admin Center</prod:FullProductName>
        <prod:FullProductName
          ProductID="10950">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="11099">Microsoft SharePoint Enterprise Server 2013 Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="11585">Microsoft SharePoint Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11961">Microsoft SharePoint Server Subscription Edition</prod:FullProductName>
        <prod:FullProductName
          ProductID="11573">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11574">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11762">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11763">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11952">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11953">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="10612">Microsoft SharePoint Foundation 2013 Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="11575">Microsoft Office 2019 for Mac</prod:FullProductName>
        <prod:FullProductName
          ProductID="11605">Microsoft Office Online Server</prod:FullProductName>
        <prod:FullProductName
          ProductID="11951">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
        <prod:FullProductName
          ProductID="10739">Microsoft Excel 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10740">Microsoft Excel 2016 (64-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10656">Microsoft Excel 2013 RT Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10654">Microsoft Excel 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10655">Microsoft Excel 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10611">Microsoft Office Web Apps Server 2013 Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10753">Microsoft Office 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10754">Microsoft Office 2016 (64-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10603">Microsoft Office 2013 RT Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10601">Microsoft Office 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10602">Microsoft Office 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11441">Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11442">Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11726">OneDrive for Android</prod:FullProductName>
        <prod:FullProductName
          ProductID="10768">Microsoft Outlook 2016 for Mac</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="ESU">
        <prod:FullProductName
          ProductID="10047">Windows 7 for 32-bit Systems Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10048">Windows 7 for x64-based Systems Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="9312">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10287">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="9318">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="9344">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10051">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10049">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10378">Windows Server 2012</prod:FullProductName>
        <prod:FullProductName
          ProductID="10379">Windows Server 2012 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10483">Windows Server 2012 R2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10543">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="SQL Server">
        <prod:FullProductName
          ProductID="12011">PowerBI-client JS SDK</prod:FullProductName>
        <prod:FullProductName
          ProductID="12006">SQL Server 2019 for Linux Containers</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Browser">
        <prod:FullProductName
          ProductID="11655">Microsoft Edge (Chromium-based)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Developer Tools">
        <prod:FullProductName
          ProductID="11872">Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11935">Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11969">Microsoft Visual Studio 2022 version 17.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="11901">Visual Studio 2019 for Mac version 8.10</prod:FullProductName>
        <prod:FullProductName
          ProductID="11761">.NET 5.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="12009">.NET 6.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="11622">Visual Studio Code</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Azure">
        <prod:FullProductName
          ProductID="12004">Azure Data Explorer</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Mariner">
        <prod:FullProductName
          ProductID="12139">CBL Mariner 2.0 x64</prod:FullProductName>
        <prod:FullProductName
          ProductID="12140">CBL Mariner 2.0 ARM</prod:FullProductName>
        <prod:FullProductName
          ProductID="12137">CBL Mariner 1.0 x64</prod:FullProductName>
        <prod:FullProductName
          ProductID="12138">CBL Mariner 1.0 ARM</prod:FullProductName>
      </prod:Branch>
    </prod:Branch>
    <prod:FullProductName
      ProductID="10047"
      CPE="cpe:2.3:o:microsoft:windows_7:6.1.7601.25860:sp1:*:*:*:*:x86:*">Windows 7 for 32-bit Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10048"
      CPE="cpe:2.3:o:microsoft:windows_7:6.1.7601.25860:sp1:*:*:*:*:x64:*">Windows 7 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10049"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25860:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10051"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25860:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10287"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10378"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23605:*:*:*:*:*:x64:*">Windows Server 2012</prod:FullProductName>
    <prod:FullProductName
      ProductID="10379"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23605:*:*:*:*:*:x64:*">Windows Server 2012 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10481"
      CPE="cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20269:*:*:*:*:*:x86:*">Windows 8.1 for 32-bit systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10482"
      CPE="cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20269:*:*:*:*:*:x64:*">Windows 8.1 for x64-based systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10483"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20269:*:*:*:*:*:x64:*">Windows Server 2012 R2</prod:FullProductName>
    <prod:FullProductName
      ProductID="10484"
      CPE="cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20269:*:*:*:*:*:*:*">Windows RT 8.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10543"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20269:*:*:*:*:*:x64:*">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10601"
      CPE="cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*">Microsoft Office 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10602"
      CPE="cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*">Microsoft Office 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10603"
      CPE="cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*">Microsoft Office 2013 RT Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10611"
      CPE="cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*">Microsoft Office Web Apps Server 2013 Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10612"
      CPE="cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*">Microsoft SharePoint Foundation 2013 Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10654"
      CPE="cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*">Microsoft Excel 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10655"
      CPE="cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*">Microsoft Excel 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10656"
      CPE="cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*">Microsoft Excel 2013 RT Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10729"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19204:*:*:*:*:*:x86:*">Windows 10 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10735"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19204:*:*:*:*:*:x64:*">Windows 10 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10739"
      CPE="cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*">Microsoft Excel 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10740"
      CPE="cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*">Microsoft Excel 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10753"
      CPE="cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*">Microsoft Office 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10754"
      CPE="cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*">Microsoft Office 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10768"
      CPE="cpe:2.3:a:microsoft:outlook_2016:*:*:*:*:*:macos:*:*">Microsoft Outlook 2016 for Mac</prod:FullProductName>
    <prod:FullProductName
      ProductID="10816"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4946:*:*:*:*:*:*:*">Windows Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="10852"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4946:*:*:*:*:*:x86:*">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10853"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4946:*:*:*:*:*:x64:*">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10855"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4946:*:*:*:*:*:*:*">Windows Server 2016 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10950"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="11099"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:enterprise:*:*:*">Microsoft SharePoint Enterprise Server 2013 Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11441"
      CPE="cpe:2.3:a:microsoft:office:2013:*:*:*:click-to-run:*:x86:*">Microsoft Office 2013 Click-to-Run (C2R) for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11442"
      CPE="cpe:2.3:a:microsoft:office:2013:*:*:*:click-to-run:*:x64:*">Microsoft Office 2013 Click-to-Run (C2R) for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11568"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2565:*:*:*:*:*:x86:*">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11569"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2565:*:*:*:*:*:x64:*">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11570"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2565:*:*:*:*:*:arm64:*">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11571"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2565:*:*:*:*:*:*:*">Windows Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11572"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2565:*:*:*:*:*:*:*">Windows Server 2019 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11573"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11574"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11575"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*">Microsoft Office 2019 for Mac</prod:FullProductName>
    <prod:FullProductName
      ProductID="11585"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*">Microsoft SharePoint Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11605"
      CPE="cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*">Microsoft Office Online Server</prod:FullProductName>
    <prod:FullProductName
      ProductID="11622"
      CPE="cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*">Visual Studio Code</prod:FullProductName>
    <prod:FullProductName
      ProductID="11655"
      CPE="cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*">Microsoft Edge (Chromium-based)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11664"
      CPE="cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*">Microsoft Dynamics 365 (on-premises) version 9.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11712"
      CPE="cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:x86:*">Windows 10 Version 1909 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11713"
      CPE="cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.2094:*:*:*:*:*:x64:*">Windows 10 Version 1909 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11714"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.2094:*:*:*:*:*:x64:*">Windows 10 Version 1909 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11726"
      CPE="cpe:2.3:a:microsoft:onedrive:-:*:*:*:*:android:*:*">OneDrive for Android</prod:FullProductName>
    <prod:FullProductName
      ProductID="11761"
      CPE="cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*">.NET 5.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11762"
      CPE="cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11763"
      CPE="cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11801"
      CPE="cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1526:*:*:*:*:*:x86:*">Windows 10 Version 20H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11802"
      CPE="cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1526:*:*:*:*:*:arm64:*">Windows 10 Version 20H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11803"
      CPE="cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1526:*:*:*:*:*:*:*">Windows Server, version 20H2 (Server Core Installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11808"
      CPE="cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*">HEVC Video Extensions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11858"
      CPE="cpe:2.3:a:microsoft:teams:-:*:*:*:*:iphone_os:*:*">Microsoft Teams for iOS</prod:FullProductName>
    <prod:FullProductName
      ProductID="11872"
      CPE="cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*">Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11884"
      CPE="cpe:2.3:a:microsoft:vp9_video_extensions:*:*:*:*:*:*:*:*">VP9 Video Extensions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11896"
      CPE="cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1526:*:*:*:*:*:x64:*">Windows 10 Version 21H1 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11897"
      CPE="cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1526:*:*:*:*:*:arm64:*">Windows 10 Version 21H1 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11898"
      CPE="cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1526:*:*:*:*:*:x86:*">Windows 10 Version 21H1 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11901"
      CPE="cpe:2.3:a:microsoft:visual_studio_2019:8.10:*:*:*:*:macos:*:*">Visual Studio 2019 for Mac version 8.10</prod:FullProductName>
    <prod:FullProductName
      ProductID="11921"
      CPE="cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*">Microsoft Dynamics 365 (on-premises) version 9.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11923"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.524:*:*:*:*:*:*:*">Windows Server 2022</prod:FullProductName>
    <prod:FullProductName
      ProductID="11924"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.524:*:*:*:*:*:*:*">Windows Server 2022 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11926"
      CPE="cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.493:*:*:*:*:*:x64:*">Windows 11 version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11927"
      CPE="cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.493:*:*:*:*:*:arm64:*">Windows 11 version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11929"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1526:*:*:*:*:*:x86:*">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11930"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1526:*:*:*:*:*:arm64:*">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11931"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1526:*:*:*:*:*:x64:*">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11935"
      CPE="cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11951"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
    <prod:FullProductName
      ProductID="11952"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11953"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11961"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*">Microsoft SharePoint Server Subscription Edition</prod:FullProductName>
    <prod:FullProductName
      ProductID="11969"
      CPE="cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*">Microsoft Visual Studio 2022 version 17.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="12004"
      CPE="cpe:2.3:a:microsoft:azure_data_explorer:-:*:*:*:*:*:*:*">Azure Data Explorer</prod:FullProductName>
    <prod:FullProductName
      ProductID="12005"
      CPE="cpe:2.3:a:microsoft:dynamics_gp:-:*:*:*:*:*:*:*">Microsoft Dynamics GP</prod:FullProductName>
    <prod:FullProductName
      ProductID="12006"
      CPE="cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:*:*">SQL Server 2019 for Linux Containers</prod:FullProductName>
    <prod:FullProductName
      ProductID="12007"
      CPE="cpe:2.3:a:microsoft:teams:-:*:*:*:*:android:*:*">Microsoft Teams for Android</prod:FullProductName>
    <prod:FullProductName
      ProductID="12008"
      CPE="cpe:2.3:a:microsoft:teams:*:*:*:*:*:*:*:*">Microsoft Teams Admin Center</prod:FullProductName>
    <prod:FullProductName
      ProductID="12009"
      CPE="cpe:2.3:a:microsoft:.net:6.0.0:*:*:*:*:*:*:*">.NET 6.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="12010"
      CPE="cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*">HEVC Video Extension</prod:FullProductName>
    <prod:FullProductName
      ProductID="12011"
      CPE="cpe:2.3:a:microsoft:powerbi-client_js_sdk:*:*:*:*:*:*:*:*">PowerBI-client JS SDK</prod:FullProductName>
    <prod:FullProductName
      ProductID="12137"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:x64">CBL Mariner 1.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12138"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:arm">CBL Mariner 1.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="12139"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:2.0:*:*:*:*:*:*:x64">CBL Mariner 2.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12140"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:2.0:*:*:*:*:*:*:arm">CBL Mariner 2.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="16863-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_samba_4.12.5-6:*:*:*:*:*:*:*:*">cbl2 samba 4.12.5-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="16864-16817"
      CPE="cpe:2.3:a:microsoft:azl3_samba_4.18.3-1:*:*:*:*:*:*:*:*">azl3 samba 4.18.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="16864-17084"
      CPE="cpe:2.3:a:microsoft:azl3_samba_4.18.3-1:*:*:*:*:*:*:*:*">azl3 samba 4.18.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17004-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_python-twisted_22.2.0-1:*:*:*:*:*:*:*:*">cbl2 python-twisted 22.2.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17021-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.16.2-2:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.16.2-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17057-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_usbguard_1.1.0-1:*:*:*:*:*:*:*:*">cbl2 usbguard 1.1.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17197-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_application-gateway-kubernetes-ingress_1.4.0-25:*:*:*:*:*:*:*:*">cbl2 application-gateway-kubernetes-ingress 1.4.0-25 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17447-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-engine_20.10.27-4:*:*:*:*:*:*:*:*">cbl2 moby-engine 20.10.27-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17515-17084"
      CPE="cpe:2.3:a:microsoft:azl3_application-gateway-kubernetes-ingress_1.7.2-3:*:*:*:*:*:*:*:*">azl3 application-gateway-kubernetes-ingress 1.7.2-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17761-17084"
      CPE="cpe:2.3:a:microsoft:azl3_keda_2.14.0-1:*:*:*:*:*:*:*:*">azl3 keda 2.14.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17811-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rpm-ostree_2024.4-1:*:*:*:*:*:*:*:*">azl3 rpm-ostree 2024.4-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17814-17084"
      CPE="cpe:2.3:a:microsoft:azl3_moby-engine_25.0.3-1:*:*:*:*:*:*:*:*">azl3 moby-engine 25.0.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17936-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.189.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.189.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17964-17084"
      CPE="cpe:2.3:a:microsoft:azl3_moby-engine_20.10.25-3:*:*:*:*:*:*:*:*">azl3 moby-engine 20.10.25-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18454-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.111.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.111.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18469-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mozjs_102.15.1-1:*:*:*:*:*:*:*:*">azl3 mozjs 102.15.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18476-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.32.1-2:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.32.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18704-16820"
      CPE="cpe:2.3:a:microsoft:cm1_mariadb_10.3.35-1:*:*:*:*:*:*:*:*">cm1 mariadb 10.3.35-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18728-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libtiff_4.3.0-2:*:*:*:*:*:*:*:*">cbl2 libtiff 4.3.0-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18756-16820"
      CPE="cpe:2.3:a:microsoft:cm1_qemu-kvm_4.2.0-38:*:*:*:*:*:*:*:*">cm1 qemu-kvm 4.2.0-38 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18757-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-2:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18758-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_vim_8.2.4743-1:*:*:*:*:*:*:*:*">cbl2 vim 8.2.4743-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18769-16820"
      CPE="cpe:2.3:a:microsoft:cm1_libtiff_4.1.0-3:*:*:*:*:*:*:*:*">cm1 libtiff 4.1.0-3 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18772-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.17.8-1:*:*:*:*:*:*:*:*">cbl2 golang 1.17.8-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18774-16820"
      CPE="cpe:2.3:a:microsoft:cm1_nodejs_14.18.3-1:*:*:*:*:*:*:*:*">cm1 nodejs 14.18.3-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18775-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs_16.14.0-1:*:*:*:*:*:*:*:*">cbl2 nodejs 16.14.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18776-16820"
      CPE="cpe:2.3:a:microsoft:cm1_libxml2_2.9.13-1:*:*:*:*:*:*:*:*">cm1 libxml2 2.9.13-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18777-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libxml2_2.9.13-1:*:*:*:*:*:*:*:*">cbl2 libxml2 2.9.13-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18778-16820"
      CPE="cpe:2.3:a:microsoft:cm1_util-linux_2.32.1-7:*:*:*:*:*:*:*:*">cm1 util-linux 2.32.1-7 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18779-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_util-linux_2.37.4-1:*:*:*:*:*:*:*:*">cbl2 util-linux 2.37.4-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18780-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.102.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.102.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18781-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.26.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.26.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18782-16820"
      CPE="cpe:2.3:a:microsoft:cm1_cyrus-sasl_2.1.28-1:*:*:*:*:*:*:*:*">cm1 cyrus-sasl 2.1.28-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18783-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cyrus-sasl_2.1.28-1:*:*:*:*:*:*:*:*">cbl2 cyrus-sasl 2.1.28-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18784-16820"
      CPE="cpe:2.3:a:microsoft:cm1_vim_8.2.4495-1:*:*:*:*:*:*:*:*">cm1 vim 8.2.4495-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18785-16820"
      CPE="cpe:2.3:a:microsoft:cm1_mariadb_10.3.34-1:*:*:*:*:*:*:*:*">cm1 mariadb 10.3.34-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18786-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_mariadb_10.6.7-1:*:*:*:*:*:*:*:*">cbl2 mariadb 10.6.7-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18787-16820"
      CPE="cpe:2.3:a:microsoft:cm1_expat_2.4.6-1:*:*:*:*:*:*:*:*">cm1 expat 2.4.6-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18788-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_expat_2.4.8-1:*:*:*:*:*:*:*:*">cbl2 expat 2.4.8-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18789-16820"
      CPE="cpe:2.3:a:microsoft:cm1_vim_8.2.4432-1:*:*:*:*:*:*:*:*">cm1 vim 8.2.4432-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18790-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.93.1-4:*:*:*:*:*:*:*:*">cm1 kernel 5.10.93.1-4 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18791-16820"
      CPE="cpe:2.3:a:microsoft:cm1_unzip_6.0-19:*:*:*:*:*:*:*:*">cm1 unzip 6.0-19 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18792-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_unzip_6.0-21:*:*:*:*:*:*:*:*">cbl2 unzip 6.0-21 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18793-17084"
      CPE="cpe:2.3:a:microsoft:azl3_unzip_6.0-21:*:*:*:*:*:*:*:*">azl3 unzip 6.0-21 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18794-16820"
      CPE="cpe:2.3:a:microsoft:cm1_python3_3.7.10-6:*:*:*:*:*:*:*:*">cm1 python3 3.7.10-6 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18795-16820"
      CPE="cpe:2.3:a:microsoft:cm1_python2_2.7.18-9:*:*:*:*:*:*:*:*">cm1 python2 2.7.18-9 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18796-16820"
      CPE="cpe:2.3:a:microsoft:cm1_golang_1.16.14-1:*:*:*:*:*:*:*:*">cm1 golang 1.16.14-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18797-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.18.8-3:*:*:*:*:*:*:*:*">cbl2 golang 1.18.8-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18798-16820"
      CPE="cpe:2.3:a:microsoft:cm1_python-twisted_20.3.0-2:*:*:*:*:*:*:*:*">cm1 python-twisted 20.3.0-2 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18799-16820"
      CPE="cpe:2.3:a:microsoft:cm1_vim_8.2.4281-1:*:*:*:*:*:*:*:*">cm1 vim 8.2.4281-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18815-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rpm-ostree_2022.1-7:*:*:*:*:*:*:*:*">azl3 rpm-ostree 2022.1-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18817-17084"
      CPE="cpe:2.3:a:microsoft:azl3_librsvg2_2.58.1-1:*:*:*:*:*:*:*:*">azl3 librsvg2 2.58.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18818-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_crossbeam_utils-0.8.7:*:*:*:*:*:*:*:*">azl3 rust crossbeam_utils-0.8.7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18822-17084"
      CPE="cpe:2.3:a:microsoft:azl3_node-problem-detector_0.8.15-1:*:*:*:*:*:*:*:*">azl3 node-problem-detector 0.8.15-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18823-17084"
      CPE="cpe:2.3:a:microsoft:azl3_multus_4.0.2-1:*:*:*:*:*:*:*:*">azl3 multus 4.0.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18829-17084"
      CPE="cpe:2.3:a:microsoft:azl3_prometheus-process-exporter_0.8.2-1:*:*:*:*:*:*:*:*">azl3 prometheus-process-exporter 0.8.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18837-17084"
      CPE="cpe:2.3:a:microsoft:azl3_application-gateway-kubernetes-ingress_1.7.2-2:*:*:*:*:*:*:*:*">azl3 application-gateway-kubernetes-ingress 1.7.2-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18861-17084"
      CPE="cpe:2.3:a:microsoft:azl3_unzip_6.0-22:*:*:*:*:*:*:*:*">azl3 unzip 6.0-22 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18898-16820"
      CPE="cpe:2.3:a:microsoft:cm1_polkit_0.116-6:*:*:*:*:*:*:*:*">cm1 polkit 0.116-6 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18899-16820"
      CPE="cpe:2.3:a:microsoft:cm1_zsh_5.8.1-1:*:*:*:*:*:*:*:*">cm1 zsh 5.8.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18900-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_zsh_5.9-1:*:*:*:*:*:*:*:*">cbl2 zsh 5.9-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18905-16820"
      CPE="cpe:2.3:a:microsoft:cm1_mariadb_10.3.32-1:*:*:*:*:*:*:*:*">cm1 mariadb 10.3.32-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19467-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_wireshark_3.4.14-1:*:*:*:*:*:*:*:*">cbl2 wireshark 3.4.14-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19472-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_usbredir_0.12.0-1:*:*:*:*:*:*:*:*">cbl2 usbredir 0.12.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19494-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-14:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-14 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19641-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_php_:*:*:*:*:*:*:*:*">cbl2 php  on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19671-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-14:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-14 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19686-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.86.0-1:*:*:*:*:*:*:*:*">azl3 rust 1.86.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19696-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.11.0-3:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.11.0-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19697-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.24.3-1:*:*:*:*:*:*:*:*">azl3 golang 1.24.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19713-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_application-gateway-kubernetes-ingress_1.4.0-25:*:*:*:*:*:*:*:*">cbl2 application-gateway-kubernetes-ingress 1.4.0-25 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19737-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19743-17084"
      CPE="cpe:2.3:a:microsoft:azl3_librsvg2_2.50.3-4:*:*:*:*:*:*:*:*">azl3 librsvg2 2.50.3-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19777-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_cri-o_1.22.3-14:*:*:*:*:*:*:*:*">cbl2 cri-o 1.22.3-14 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19784-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-buildx_0.7.1-24:*:*:*:*:*:*:*:*">cbl2 moby-buildx 0.7.1-24 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19790-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-cli_20.10.27-5:*:*:*:*:*:*:*:*">cbl2 moby-cli 20.10.27-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19792-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_libcontainers-common_20210626-7:*:*:*:*:*:*:*:*">cbl2 libcontainers-common 20210626-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19840-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kube-vip-cloud-provider_0.0.2-22:*:*:*:*:*:*:*:*">cbl2 kube-vip-cloud-provider 0.0.2-22 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19854-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_rook_1.6.2-26:*:*:*:*:*:*:*:*">cbl2 rook 1.6.2-26 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19877-17084"
      CPE="cpe:2.3:a:microsoft:azl3_keda_2.4.0-15:*:*:*:*:*:*:*:*">azl3 keda 2.4.0-15 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20017-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-engine_20.10.27-4:*:*:*:*:*:*:*:*">cbl2 moby-engine 20.10.27-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20086-17084"
      CPE="cpe:2.3:a:microsoft:azl3_multus_3.8-13:*:*:*:*:*:*:*:*">azl3 multus 3.8-13 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20089-17084"
      CPE="cpe:2.3:a:microsoft:azl3_prometheus-process-exporter_0.7.10-15:*:*:*:*:*:*:*:*">azl3 prometheus-process-exporter 0.7.10-15 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20293-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_local-path-provisioner_0.0.21-18:*:*:*:*:*:*:*:*">cbl2 local-path-provisioner 0.0.21-18 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20297-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nmi_1.8.7-15:*:*:*:*:*:*:*:*">cbl2 nmi 1.8.7-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20299-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_node-problem-detector_0.8.10-20:*:*:*:*:*:*:*:*">cbl2 node-problem-detector 0.8.10-20 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20300-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_prometheus-node-exporter_1.3.1-26:*:*:*:*:*:*:*:*">cbl2 prometheus-node-exporter 1.3.1-26 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20301-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_prometheus-process-exporter_0.7.10-21:*:*:*:*:*:*:*:*">cbl2 prometheus-process-exporter 0.7.10-21 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20307-17084"
      CPE="cpe:2.3:a:microsoft:azl3_node-problem-detector_0.8.10-18:*:*:*:*:*:*:*:*">azl3 node-problem-detector 0.8.10-18 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="9312"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9318"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9344"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21374:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
  </prod:ProductTree>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3773</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17936-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17936-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17936-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17936-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17936-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.189.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17936-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0185</vuln:CVE>
    <vuln:CWE
      ID="CWE-191">Integer Underflow (Wrap or Wraparound)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0382</vuln:CVE>
    <vuln:CWE
      ID="CWE-909">Missing Initialization of Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>A flaw was found in Python specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1 3.9.5 3.8.11 3.7.11 and 3.6.14.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0391</vuln:CVE>
    <vuln:CWE
      ID="CWE-74">Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18794-16820</vuln:ProductID>
        <vuln:ProductID>18795-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18794-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18795-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18794-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18795-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18794-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18795-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18794-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.7.10-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18794-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18795-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.7.18-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18795-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Conversion of a wide string to a local string that leads to a heap of out-of-bound write</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Red Hat, Inc."
        Type="CNA"
        Ordinal="30">Red Hat, Inc.</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0529</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18791-16820</vuln:ProductID>
        <vuln:ProductID>18792-16823</vuln:ProductID>
        <vuln:ProductID>18793-17084</vuln:ProductID>
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18791-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18792-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18791-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18792-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18791-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18792-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18791-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.0-19</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18791-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18792-16823</vuln:ProductID>
        <vuln:ProductID>18793-17084</vuln:ProductID>
        <vuln:ProductID>18861-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.0-21</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18792-16823</vuln:ProductID>
        <vuln:ProductID>18793-17084</vuln:ProductID>
        <vuln:ProductID>18861-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-11-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>Conversion of a wide string to a local string that leads to a heap of out-of-bound write</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Red Hat, Inc."
        Type="CNA"
        Ordinal="30">Red Hat, Inc.</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0530</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18861-17084</vuln:ProductID>
        <vuln:ProductID>18791-16820</vuln:ProductID>
        <vuln:ProductID>18792-16823</vuln:ProductID>
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18791-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18792-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18791-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18792-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18861-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18791-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18792-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18793-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18861-17084</vuln:ProductID>
        <vuln:ProductID>18792-16823</vuln:ProductID>
        <vuln:ProductID>18793-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.0-21</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18861-17084</vuln:ProductID>
        <vuln:ProductID>18792-16823</vuln:ProductID>
        <vuln:ProductID>18793-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18791-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.0-19</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18791-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-11-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources a fix is available with commit 561599c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0562</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18769-16820</vuln:ProductID>
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18769-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18769-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18769-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18769-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.1.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18769-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18728-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.3.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18728-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0563</vuln:CVE>
    <vuln:CWE
      ID="CWE-209">Generation of Error Message Containing Sensitive Information</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18778-16820</vuln:ProductID>
        <vuln:ProductID>18779-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18778-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18779-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18778-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18779-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18778-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18779-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18778-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.32.1-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18778-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18779-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.37.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18779-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0582</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0583</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="58">
    <vuln:Title>A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0617</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="59">
    <vuln:Title>Stack-based Buffer Overflow in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0629</vuln:CVE>
    <vuln:CWE
      ID="CWE-121">Stack-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="66">
    <vuln:Title>Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter which could be "__proto__". The prototype pollution has very limited control in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js &gt;= 12.22.9 &gt;= 14.18.3 &gt;= 16.13.2 and &gt;= 17.3.1 use a null protoype for the object these properties are being assigned to.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21824</vuln:CVE>
    <vuln:CWE
      ID="CWE-1321">Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.2</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</vuln:Vector>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.2</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="68">
    <vuln:Title>Improper Restriction of Operations within the Bounds of a Memory Buffer and Race Condition in crossbeam-utils</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23639</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization (&amp;#39;Race Condition&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
        <vuln:ProductID>18815-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>18818-17084</vuln:ProductID>
        <vuln:ProductID>17811-17084</vuln:ProductID>
        <vuln:ProductID>18817-17084</vuln:ProductID>
        <vuln:ProductID>19743-17084</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18815-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18818-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17811-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19743-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>18815-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18818-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17811-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19743-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18815-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18818-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17811-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19743-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18815-17084</vuln:ProductID>
        <vuln:ProductID>17811-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2024.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18815-17084</vuln:ProductID>
        <vuln:ProductID>17811-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18818-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>crossbeam_utils-0.8.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18818-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18817-17084</vuln:ProductID>
        <vuln:ProductID>19743-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.58.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18817-17084</vuln:ProductID>
        <vuln:ProductID>19743-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="69">
    <vuln:Title>Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23772</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.16.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18772-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.17.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18772-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2026-02-18T02:07:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="70">
    <vuln:Title>cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23773</vuln:CVE>
    <vuln:CWE
      ID="CWE-436">Interpretation Conflict</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18772-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.16.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18772-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.17.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18772-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="73">
    <vuln:Title>MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="zdi"
        Type="CNA"
        Ordinal="30">zdi</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24050</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="74">
    <vuln:Title>MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="zdi"
        Type="CNA"
        Ordinal="30">zdi</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24051</vuln:CVE>
    <vuln:CWE
      ID="CWE-134">Use of Externally-Controlled Format String</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="77">
    <vuln:Title>An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag and tries to open a regular file nfs_atomic_open() performs a regular lookup. If a regular file is found ENOTDIR should occur but the server instead returns uninitialized data in the file descriptor.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24448</vuln:CVE>
    <vuln:CWE
      ID="CWE-755">Improper Handling of Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="78">
    <vuln:Title>drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-&gt;buf release.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24958</vuln:CVE>
    <vuln:CWE
      ID="CWE-763">Release of Invalid Pointer or Reference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18476-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18476-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18476-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18476-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18476-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.32.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18476-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="79">
    <vuln:Title>An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24959</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="82">
    <vuln:Title>In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX QProcess could execute a binary from the current working directory when not found in the PATH.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25255</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19494-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19494-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19494-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19494-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19494-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19494-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="83">
    <vuln:Title>An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25258</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.6</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.6</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="86">
    <vuln:Title>In Expat (aka libexpat) before 2.4.5 there is an integer overflow in copyString.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25314</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="87">
    <vuln:Title>In Expat (aka libexpat) before 2.4.5 there is an integer overflow in storeRawNames.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25315</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="88">
    <vuln:Title>An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25375</vuln:CVE>
    <vuln:CWE
      ID="CWE-1284">Improper Validation of Specified Quantity in Input</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-20320</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity because software that relies on UDP source port randomization are indirectly affected as well.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-20322</vuln:CVE>
    <vuln:CWE
      ID="CWE-330">Use of Insufficiently Random Values</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory resulting in a denial of service. The highest threat from this vulnerability is to system availability.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3607</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.0</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.2.0-38</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3608</vuln:CVE>
    <vuln:CWE
      ID="CWE-824">Access of Uninitialized Pointer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.0</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.2.0-38</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>A use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in the usbredirparser_serialize() in usbredirparser/usbredirparser.c. This issue occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3700</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19472-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19472-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19472-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19472-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19472-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.12.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19472-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality integrity as well as system availability.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3752</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU resulting in a denial of service condition.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3930</vuln:CVE>
    <vuln:CWE
      ID="CWE-193">Off-by-one Error</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.2.0-38</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.2.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw a local attacker with user privilege may gain access to out-of-bounds memory leading to a system integrity and confidentiality threat.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-4090</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-4093</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-44141</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>Node.js &lt; 12.22.9 &lt; 14.18.3 &lt; 16.13.2 and &lt; 17.3.1 converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain allowing the bypass of these name constraints.Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the --security-revert command-line option.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-44532</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>Node.js &lt; 12.22.9 &lt; 14.18.3 &lt; 16.13.2 and &lt; 17.3.1 did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name for example in order to inject a Common Name that would allow bypassing the certificate subject verification.Affected versions of Node.js that do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-44533</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3 special files are not considered leading to a move_data_page NULL pointer dereference.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-44879</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18454-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18454-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18454-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18454-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18454-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18454-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction which allows local users to obtain potentially sensitive address information aka a "pointer leak."</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-45402</vuln:CVE>
    <vuln:CWE
      ID="CWE-668">Exposure of Resource to Wrong Sphere</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46661</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46663</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46664</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>MariaDB before 10.6.5 has a sql_lex.cc integer overflow leading to an application crash.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46667</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18905-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18905-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18905-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18905-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18905-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.32-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18905-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46668</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>A flaw was found in the way Samba as an Active Directory Domain Controller implemented Kerberos name-based authentication. The Samba AD DC could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-25719</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.12.5-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-25722</vuln:CVE>
    <vuln:CWE
      ID="CWE-863">Incorrect Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.12.5-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running an unprivileged user could make USBGuard allow all USB devices to be connected in the future.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2019-25058</vuln:CVE>
    <vuln:CWE
      ID="CWE-863">Incorrect Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17057-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17057-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17057-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17057-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17057-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17057-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>UAF due to php_filter_float() failing</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="php"
        Type="CNA"
        Ordinal="30">php</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-21708</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19641-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19641-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19641-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.2</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L</vuln:Vector>
        <vuln:ProductID>19641-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19641-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19641-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions &lt; v5.16-rc6</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0264</vuln:CVE>
    <vuln:CWE
      ID="CWE-755">Improper Handling of Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Heap-based Buffer Overflow in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0417</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18799-16820</vuln:ProductID>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18799-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18799-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18799-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18799-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18799-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Use After Free in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0443</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18799-16820</vuln:ProductID>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18799-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18799-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18799-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18799-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18799-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0487</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Use of Out-of-range Pointer Offset in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0554</vuln:CVE>
    <vuln:CWE
      ID="CWE-823">Use of Out-of-range Pointer Offset</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18789-16820</vuln:ProductID>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18789-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18789-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18789-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18789-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4432-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18789-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources the fix is available with commit eecb0712.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0561</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18769-16820</vuln:ProductID>
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18769-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18769-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18769-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18728-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18769-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.1.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18769-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18728-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.3.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18728-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Heap-based Buffer Overflow in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0572</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18789-16820</vuln:ProductID>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18789-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18789-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18789-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18789-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4432-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18789-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0581</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0585</vuln:CVE>
    <vuln:CWE
      ID="CWE-834">Excessive Iteration</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitLab"
        Type="CNA"
        Ordinal="30">GitLab</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0586</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition ('Infinite Loop')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19467-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19467-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="60">
    <vuln:Title>Use of Out-of-range Pointer Offset in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0685</vuln:CVE>
    <vuln:CWE
      ID="CWE-823">Use of Out-of-range Pointer Offset</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="61">
    <vuln:Title>NULL Pointer Dereference in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0696</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="62">
    <vuln:Title>Heap-based Buffer Overflow in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0714</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18784-16820</vuln:ProductID>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18784-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18784-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18784-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18784-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4495-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18784-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="63">
    <vuln:Title>Use of Out-of-range Pointer Offset in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntrdev"
        Type="CNA"
        Ordinal="30">@huntrdev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0729</vuln:CVE>
    <vuln:CWE
      ID="CWE-823">Use of Out-of-range Pointer Offset</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18784-16820</vuln:ProductID>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18784-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18784-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18784-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18758-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18784-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4495-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18784-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18758-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="64">
    <vuln:Title>Uncontrolled Resource Consumption in promhttp</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21698</vuln:CVE>
    <vuln:CWE
      ID="CWE-770">Allocation of Resources Without Limits or Throttling</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18829-17084</vuln:ProductID>
        <vuln:ProductID>18822-17084</vuln:ProductID>
        <vuln:ProductID>18823-17084</vuln:ProductID>
        <vuln:ProductID>17814-17084</vuln:ProductID>
        <vuln:ProductID>17761-17084</vuln:ProductID>
        <vuln:ProductID>18837-17084</vuln:ProductID>
        <vuln:ProductID>19713-17086</vuln:ProductID>
        <vuln:ProductID>19792-17086</vuln:ProductID>
        <vuln:ProductID>19784-17086</vuln:ProductID>
        <vuln:ProductID>19790-17086</vuln:ProductID>
        <vuln:ProductID>20017-17086</vuln:ProductID>
        <vuln:ProductID>20297-17086</vuln:ProductID>
        <vuln:ProductID>20301-17086</vuln:ProductID>
        <vuln:ProductID>17515-17084</vuln:ProductID>
        <vuln:ProductID>17197-17086</vuln:ProductID>
        <vuln:ProductID>17447-17086</vuln:ProductID>
        <vuln:ProductID>19840-17086</vuln:ProductID>
        <vuln:ProductID>20293-17086</vuln:ProductID>
        <vuln:ProductID>20299-17086</vuln:ProductID>
        <vuln:ProductID>20300-17086</vuln:ProductID>
        <vuln:ProductID>19854-17086</vuln:ProductID>
        <vuln:ProductID>19877-17084</vuln:ProductID>
        <vuln:ProductID>17964-17084</vuln:ProductID>
        <vuln:ProductID>20086-17084</vuln:ProductID>
        <vuln:ProductID>20307-17084</vuln:ProductID>
        <vuln:ProductID>20089-17084</vuln:ProductID>
        <vuln:ProductID>19777-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18829-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17814-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17761-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18837-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19713-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19792-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19784-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19790-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20017-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20297-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20301-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17515-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17197-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17447-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19840-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20293-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20299-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20300-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19854-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19877-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17964-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20086-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20307-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20089-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19777-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18829-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17814-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17761-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18837-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19713-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19792-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19784-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19790-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20017-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20297-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20301-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17515-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17197-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17447-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19840-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20293-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20299-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20300-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19854-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19877-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17964-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20086-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20307-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20089-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19777-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18829-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18822-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17814-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17761-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18837-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19713-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19792-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19784-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19790-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20017-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20297-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20301-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17515-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17197-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17447-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19840-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20293-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20299-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20300-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19854-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19877-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17964-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20086-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20307-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20089-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19777-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18829-17084</vuln:ProductID>
        <vuln:ProductID>20089-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.8.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18829-17084</vuln:ProductID>
        <vuln:ProductID>20089-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18822-17084</vuln:ProductID>
        <vuln:ProductID>20307-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.8.15-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18822-17084</vuln:ProductID>
        <vuln:ProductID>20307-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18823-17084</vuln:ProductID>
        <vuln:ProductID>20086-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.0.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18823-17084</vuln:ProductID>
        <vuln:ProductID>20086-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17814-17084</vuln:ProductID>
        <vuln:ProductID>17964-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>25.0.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17814-17084</vuln:ProductID>
        <vuln:ProductID>17964-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17761-17084</vuln:ProductID>
        <vuln:ProductID>19877-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17761-17084</vuln:ProductID>
        <vuln:ProductID>19877-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18837-17084</vuln:ProductID>
        <vuln:ProductID>17515-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.7.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18837-17084</vuln:ProductID>
        <vuln:ProductID>17515-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19713-17086</vuln:ProductID>
        <vuln:ProductID>17197-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.4.0-17</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19713-17086</vuln:ProductID>
        <vuln:ProductID>17197-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19784-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.7.1-16</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19784-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19790-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.10.27-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19790-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20017-17086</vuln:ProductID>
        <vuln:ProductID>17447-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.10.27-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20017-17086</vuln:ProductID>
        <vuln:ProductID>17447-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20297-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.8.11-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20297-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20301-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.7.10-18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20301-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19840-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.0.2-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19840-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20293-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.0.21-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20293-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20299-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.8.10-19</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20299-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20300-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.3.1-23</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20300-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19854-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.6.2-18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19854-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19777-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.7-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19777-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-02-18T03:19:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-11-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-01-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0
Added kube-vip-cloud-provider to CBL-Mariner 2.0
Added local-path-provisioner to CBL-Mariner 2.0
Added moby-buildx to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-04-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added cri-o to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.3</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.4</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="65">
    <vuln:Title>Cookie and header exposure in twisted</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21712</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18798-16820</vuln:ProductID>
        <vuln:ProductID>17004-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18798-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17004-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18798-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17004-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18798-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17004-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18798-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.3.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18798-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17004-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>22.2.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17004-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="67">
    <vuln:Title>valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23308</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18776-16820</vuln:ProductID>
        <vuln:ProductID>18777-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18776-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18777-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18776-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18777-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18776-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18777-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18776-16820</vuln:ProductID>
        <vuln:ProductID>18777-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.9.13-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18776-16820</vuln:ProductID>
        <vuln:ProductID>18777-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="71">
    <vuln:Title>Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17.x before 1.17.7 can incorrectly return true in situations with a big.Int value that is not a valid field element.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23806</vuln:CVE>
    <vuln:CWE
      ID="CWE-252">Unchecked Return Value</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:ProductID>18797-16823</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18797-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18797-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18796-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18797-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.16.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18796-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18797-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.18.8-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18797-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2026-02-18T01:06:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="72">
    <vuln:Title>MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="zdi"
        Type="CNA"
        Ordinal="30">zdi</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24048</vuln:CVE>
    <vuln:CWE
      ID="CWE-121">Stack-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="75">
    <vuln:Title>MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="zdi"
        Type="CNA"
        Ordinal="30">zdi</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24052</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="76">
    <vuln:Title>In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28 plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24407</vuln:CVE>
    <vuln:CWE
      ID="CWE-89">Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18782-16820</vuln:ProductID>
        <vuln:ProductID>18783-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18782-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18783-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18782-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18783-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18782-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18783-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18782-16820</vuln:ProductID>
        <vuln:ProductID>18783-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.28-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18782-16820</vuln:ProductID>
        <vuln:ProductID>18783-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="80">
    <vuln:Title>xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding such as checks for whether a UTF-8 character is valid in a certain context.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25235</vuln:CVE>
    <vuln:CWE
      ID="CWE-116">Improper Encoding or Escaping of Output</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="81">
    <vuln:Title>xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25236</vuln:CVE>
    <vuln:CWE
      ID="CWE-668">Exposure of Resource to Wrong Sphere</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="84">
    <vuln:Title>In the Linux kernel through 5.16.10 certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g. with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25265</vuln:CVE>
    <vuln:CWE
      ID="CWE-913">Improper Control of Dynamically-Managed Code Resources</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18781-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18781-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="85">
    <vuln:Title>In Expat (aka libexpat) before 2.4.5 an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-25313</vuln:CVE>
    <vuln:CWE
      ID="CWE-674">Uncontrolled Recursion</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18787-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18788-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18787-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.8-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18788-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-20321</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to for example create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3560</vuln:CVE>
    <vuln:CWE
      ID="CWE-754">Improper Check for Unusual or Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18898-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18898-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18898-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18898-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18898-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.116-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18898-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3753</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18780-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18780-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3947</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18756-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.2.0-38</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18756-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.2.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-4154</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18790-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18790-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>The Samba vfs_fruit module uses extended file attributes (EA xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd typically root.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-44142</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Accepting arbitrary Subject Alternative Name (SAN) types unless a PKI is specifically defined to use a particular SAN type can result in bypassing name-constrained intermediates. Node.js &lt; 12.22.9 &lt; 14.18.3 &lt; 16.13.2 and &lt; 17.3.1 was accepting URI SAN types which PKIs are often not defined to use. Additionally when a protocol allows URI SANs Node.js did not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-44531</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18774-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18774-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-03-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>In zsh before 5.8.1 an attacker can achieve code execution if they control a command output inside the prompt as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-45444</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18899-16820</vuln:ProductID>
        <vuln:ProductID>18900-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18899-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18900-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18899-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18900-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18899-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18900-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18899-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.8.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18899-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18900-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18900-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46662</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46665</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18785-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18785-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46666</vuln:CVE>
    <vuln:CWE
      ID="CWE-617">Reachable Assertion</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18905-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18905-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18905-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18905-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18905-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.32-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18905-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46669</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18704-16820</vuln:ProductID>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18704-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18704-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18704-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18786-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18704-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.3.35-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18704-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18786-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-25717</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.12.5-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>A flaw was found in the way samba as an Active Directory Domain Controller is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-25718</vuln:CVE>
    <vuln:CWE
      ID="CWE-862">Missing Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.12.5-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2016-2124</vuln:CVE>
    <vuln:CWE
      ID="CWE-287">Improper Authentication</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:ProductID>16864-16817</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16864-16817</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16864-16817</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16864-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16863-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16864-16817</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:ProductID>16864-16817</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16864-17084</vuln:ProductID>
        <vuln:ProductID>16864-16817</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.12.5-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16863-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="79">
    <vuln:Title>Windows Runtime Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Remote Procedure Call Runtime"
        Type="Tag"
        Ordinal="20">Windows Remote Procedure Call Runtime</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21971</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/jq0904"&gt;Jinquan(@jq0904)&lt;/a&gt; with &lt;a href="https://www.dbappsecurity.com.cn/product/cloud250.html"&gt;DBAPPSecurity Lieying Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/wh1tc"&gt;Zesen Ye (@wh1tc)&lt;/a&gt; and &lt;a href="https://twitter.com/edwardzpeng"&gt;Zhiniang Peng (@edwardzpeng)&lt;/a&gt; with &lt;a href="https://www.sangfor.com/en"&gt;Sangfor&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="80">
    <vuln:Title>Roaming Security Rights Management Services Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS score, the Attack Vector is Local. Why does the CVE title indicate that this is a Remote Code Execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution/&amp;quot;ACE&amp;quot;. The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;An example scenario for a When the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, that describes an exploit that an attacker, through social engineering, convinces a victim, for example, to go to a download and locally run a malicious file from a website or attached to an email which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Roaming Security Rights Management Services"
        Type="Tag"
        Ordinal="20">Roaming Security Rights Management Services</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21974</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/wh1tc"&gt;Zesen Ye (@wh1tc)&lt;/a&gt; and &lt;a href="https://twitter.com/edwardzpeng"&gt;Zhiniang Peng (@edwardzpeng)&lt;/a&gt; with &lt;a href="https://www.sangfor.com/en"&gt;Sangfor&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="73">
    <vuln:Title>HEVC Video Extensions Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the difference between HEVC Video Extension and HEVC Video Extensions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;HEVC Video Extension is available to consumers and HEVC Video Extensions is used by device OEMs.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by convincing a victim to download and open a specially crafted file, which could lead to a crash.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the updated app?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"&gt;here&lt;/a&gt; for details.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My system is in a disconnected environment; is it vulnerable?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. VLSC customers can visit the Volume Licensing Servicing Center to get the update &lt;a href="https://www.microsoft.com/Licensing/servicecenter/"&gt;https://www.microsoft.com/Licensing/servicecenter/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I check if the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If your device manufacturer preinstalled this app, package versions &lt;strong&gt;1.0.43421.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;If you purchased this app from the Microsoft Store, package versions &lt;strong&gt;1.0.41532.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;You can check the package version in PowerShell:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Get-AppxPackage -Name Microsoft.HEVCVideoExtension*&lt;/code&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21844</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12010</vuln:ProductID>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>VLSC</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12010</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.43421.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Description</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11808</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.43422.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dhanesh Kizhakkinan with Mandiant</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="74">
    <vuln:Title>HEVC Video Extensions Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the difference between HEVC Video Extension and HEVC Video Extensions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;HEVC Video Extension is available to consumers and HEVC Video Extensions is used by device OEMs.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by convincing a victim to download and open a specially crafted file, which could lead to a crash.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the updated app?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"&gt;here&lt;/a&gt; for details.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My system is in a disconnected environment; is it vulnerable?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. VLSC customers can visit the Volume Licensing Servicing Center to get the update &lt;a href="https://www.microsoft.com/Licensing/servicecenter/"&gt;https://www.microsoft.com/Licensing/servicecenter/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I check if the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If your device manufacturer preinstalled this app, package versions &lt;strong&gt;1.0.43421.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;If you purchased this app from the Microsoft Store, package versions &lt;strong&gt;1.0.41532.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;You can check the package version in PowerShell:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Get-AppxPackage -Name Microsoft.HEVCVideoExtension*&lt;/code&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21926</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12010</vuln:ProductID>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>VLSC</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12010</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.43421.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Description</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11808</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.43422.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dhanesh Kizhakkinan with Mandiant</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="75">
    <vuln:Title>HEVC Video Extensions Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the difference between HEVC Video Extension and HEVC Video Extensions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;HEVC Video Extension is available to consumers and HEVC Video Extensions is used by device OEMs.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by convincing a victim to download and open a specially crafted file, which could lead to a crash.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the updated app?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"&gt;here&lt;/a&gt; for details.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My system is in a disconnected environment; is it vulnerable?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. VLSC customers can visit the Volume Licensing Servicing Center to get the update &lt;a href="https://www.microsoft.com/Licensing/servicecenter/"&gt;https://www.microsoft.com/Licensing/servicecenter/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I check if the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If your device manufacturer preinstalled this app, package versions &lt;strong&gt;1.0.43421.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;If you purchased this app from the Microsoft Store, package versions &lt;strong&gt;1.0.41532.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;You can check the package version in PowerShell:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Get-AppxPackage -Name Microsoft.HEVCVideoExtension*&lt;/code&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21927</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12010</vuln:ProductID>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely;Older Software Release:Exploitation Unlikely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12010</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11808</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>VLSC</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12010</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.43421.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Description</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11808</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.43422.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dhanesh Kizhakkinan with Mandiant</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="76">
    <vuln:Title>Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for the Microsoft Dynamics 365 (on-premises) versions listed in this vulnerability currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update for Microsoft Dynamics 365 (on-premises) version 9.0 and Microsoft Dynamics 365 (on-premises) version 9.1 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dynamics"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21957</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11664</vuln:ProductID>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5012732</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=104010</vuln:URL>
        <vuln:ProductID>11664</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.37.2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5012731</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=104009</vuln:URL>
        <vuln:ProductID>11921</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.1.9.8</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.linkedin.com/in/fabian-schmidt-42-/"&gt;Fabian Schmidt&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-03-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added FAQ to explain that the security updates for Microsoft Dynamics 365 (on-premises) version 8.2 and Microsoft Dynamics 365 (on-premises) version 9.1 are not immediately available, and that customers will be notified via a revision to the CVE when the updates are available.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2022-03-23T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;The following revisions have been made to the Security Updates table: 1) Microsoft is announcing the availability of the security updates for Microsoft Dynamics 365 (on-premises) version 9.0 and Microsoft Dynamics 365 (on-premises) version 9.1. Customers running these versions of Microsoft Dynamics 365 (on-premises) should install the update for their product to be protected from this vulnerability. See the Security Updates table for Download and Article links. 2) Removed Microsoft Dynamics 365 (on-premises) version 8.2 as it is not affected by this vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="77">
    <vuln:Title>Microsoft Teams Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the update for Teams for Android?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tap the &lt;strong&gt;Google Play&lt;/strong&gt; icon on your home screen.&lt;/li&gt;
&lt;li&gt;Swipe in from the left edge of the screen.&lt;/li&gt;
&lt;li&gt;Tap &lt;strong&gt;My apps &amp;amp; games&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Tap the Update box next to the &lt;strong&gt;Teams app&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Is there a direct link on the web?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes: &lt;a href="https://play.google.com/store/apps/details?id=com.microsoft.teams"&gt;https://play.google.com/store/apps/details?id=com.microsoft.teams&lt;/a&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the update for Microsoft Teams for iOS?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tap the &lt;strong&gt;Settings&lt;/strong&gt; icon&lt;/li&gt;
&lt;li&gt;Tap the** iTunes &amp;amp; App Store**&lt;/li&gt;
&lt;li&gt;Turn on AUTOMATIC DOWNLOADS for Apps&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Alternatively&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tap the** App Store** icon&lt;/li&gt;
&lt;li&gt;Scroll down to find Microsoft Teams&lt;/li&gt;
&lt;li&gt;Tap the &lt;strong&gt;Update&lt;/strong&gt; button&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I find out what version of Teams I am running?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Click on the User Avatar at the top right of the Teams Windows.&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About&lt;/strong&gt;, then &lt;strong&gt;Version&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;The version will be displayed in the banner below the Search bar.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Where do I get the latest version of Teams?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The latest version of Microsoft Teams can be downloaded at &lt;a href="https://teams.microsoft.com/download"&gt;https://teams.microsoft.com/download&lt;/a&gt;.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Teams"
        Type="Tag"
        Ordinal="20">Microsoft Teams</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21965</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11858</vuln:ProductID>
        <vuln:ProductID>12007</vuln:ProductID>
        <vuln:ProductID>12008</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11858</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12007</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12008</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11858</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12007</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12008</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11858</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12007</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12008</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://apps.apple.com/us/app/microsoft-teams/id1113153706</vuln:URL>
        <vuln:ProductID>11858</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.5.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://play.google.com/store/apps/details?id=com.microsoft.teams</vuln:URL>
        <vuln:ProductID>12007</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1416/1.0.0.2021040701</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/microsoftteams/teams-client-update</vuln:URL>
        <vuln:ProductID>12008</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Frank Cozijnsen of the KPN REDteam</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="104">
    <vuln:Title>Windows Common Log File System Driver Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22710</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>RyeLv(@b2ahex) of Tencent</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="105">
    <vuln:Title>Windows Hyper-V Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Role: Windows Hyper-V"
        Type="Tag"
        Ordinal="20">Role: Windows Hyper-V</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22712</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/rezer0dai"&gt;rezer0dai&lt;/a&gt; with Tutti Frutti</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="85">
    <vuln:Title>Microsoft SharePoint Server Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a target be lured to and make use of a specially crafted functionality on a SharePoint page created by the attacker.&lt;/p&gt;
&lt;p&gt;An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to use the intended functionality.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the nature of the spoofing?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authenticated attacker could manipulate a SharePoint page they control to trick targeted users into sending attacker-controlled requests to the server under the permissions context of the target.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21987</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002136</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=977f2baf-941b-423a-bc79-8383a844310a</vuln:URL>
        <vuln:Supercedence>5002113</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002120</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=931bc018-8f42-4e39-ae81-ebdb7e4180f3</vuln:URL>
        <vuln:Supercedence>5002008</vuln:Supercedence>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002135</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=9062c391-efc6-40d0-b679-e7a31d2bb294</vuln:URL>
        <vuln:Supercedence>5002109</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10383.20001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5002135</vuln:Description>
        <vuln:URL>https://support.microsoft.com/kb/5002135</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002145</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=e66ce694-33fb-41c6-ac72-535d3d6c579d</vuln:URL>
        <vuln:Supercedence>5002111</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.14326.20742</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>malacupa</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="86">
    <vuln:Title>Microsoft Office Visio Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A user needs to be tricked into running malicious files.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Visio"
        Type="Tag"
        Ordinal="20">Microsoft Office Visio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21988</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>kdot working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="112">
    <vuln:Title>Microsoft Power BI Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What actions do I need to take to be protected from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The main update will be automatically pushed to all affected products and services.&lt;/p&gt;
&lt;p&gt;We recommend that customers update PowerBI Client JS SDK to version 2.19.1.
The package can be downloaded from &lt;a href="https://www.npmjs.com/package/powerbi-client"&gt;NPM&lt;/a&gt; or &lt;a href="https://www.nuget.org/packages/Microsoft.PowerBI.JavaScript/"&gt;NuGet Gallery&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I know if I am affected?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Our team will contact customers that are affected by this vulnerability.&lt;/p&gt;
&lt;p&gt;We recommend that affected customers save their Power Apps to ensure the fix takes effect as expected.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Power BI"
        Type="Tag"
        Ordinal="20">Power BI</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23254</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12011</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12011</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12011</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12011</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://www.nuget.org/packages/Microsoft.PowerBI.JavaScript/</vuln:URL>
        <vuln:ProductID>12011</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.19.1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Corrected the CVE title and description to address the vulnerability as Information Disclosure. In the Affected Products table, corrected the Impact to Information Disclosure. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="119">
    <vuln:Title>Microsoft Dynamics GP Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authenticated user would have to visit a specific URL that will create an action for a workflow.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L).  What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires that an attacker has privileges to generate a workflow. Dynamics GP will send an email to the user based on the info registered.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Information in the victim's browser associated with the vulnerable URL can be read by the malicious JavaScript code and sent to the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dynamics GP"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics GP</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23269</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://mbs2.microsoft.com/fileexchange/?fileID=57a6b620-7f89-42cd-99f0-65a1cff920b8</vuln:URL>
        <vuln:ProductID>12005</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.4.1434</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Ha Anh Hoang with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-25T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated one or more CVSS scores for the affected products and added an FAQ explaining the vector string settings. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="120">
    <vuln:Title>Microsoft Dynamics GP Elevation Of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Dynamics GP"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics GP</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23271</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://mbs2.microsoft.com/fileexchange/?fileID=57a6b620-7f89-42cd-99f0-65a1cff920b8</vuln:URL>
        <vuln:ProductID>12005</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.4.1434</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Ha Anh Hoang with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="121">
    <vuln:Title>Microsoft Dynamics GP Elevation Of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could send a specially crafted request to a vulnerable Dynamics site and overwrite database contents.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dynamics GP"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics GP</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23272</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://mbs2.microsoft.com/fileexchange/?fileID=57a6b620-7f89-42cd-99f0-65a1cff920b8</vuln:URL>
        <vuln:ProductID>12005</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.4.1434</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Ha Anh Hoang with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="122">
    <vuln:Title>Microsoft Dynamics GP Elevation Of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Dynamics GP"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics GP</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23273</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://mbs2.microsoft.com/fileexchange/?fileID=57a6b620-7f89-42cd-99f0-65a1cff920b8</vuln:URL>
        <vuln:ProductID>12005</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.4.1434</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Ha Anh Hoang with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="123">
    <vuln:Title>Microsoft Dynamics GP Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authenticated user could send a specially crafted SQL request to a Dynamics GP Web Service and perform remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of availability (A:H)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could impact availability of the data by assuming control of the server through remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dynamics GP"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics GP</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23274</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12005</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://mbs2.microsoft.com/fileexchange/?fileID=57a6b620-7f89-42cd-99f0-65a1cff920b8</vuln:URL>
        <vuln:ProductID>12005</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.4.1434</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Ha Anh Hoang with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-03-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an FAQ and updated the CVSS score. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="124">
    <vuln:Title>SQL Server for Linux Containers Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;If I'm running SQL Server 2019 on premise, am I vulnerable to this CVE?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability only exists in the containerized version of SQL Server 2019 for Linux. If you are running that version, Microsoft recommends applying the update.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="SQL Server"
        Type="Tag"
        Ordinal="20">SQL Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23276</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12006</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12006</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12006</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12006</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010657</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/sql/linux/sql-server-linux-change-repo?view=sql-server-ver15&amp;pivots=ld2-rhel</vuln:URL>
        <vuln:ProductID>12006</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.2090.38</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/alon_z4"&gt;Alon Zahavi&lt;/a&gt; and &lt;a href="https://twitter.com/c_h4ck_0"&gt;Nir Chako&lt;/a&gt; with &lt;a href="https://labs.cyberark.com/"&gt;CyberArk Labs&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-09T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="115">
    <vuln:Title>Microsoft Edge (Chromium-based) Tampering Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23261</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Tampering</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://github.com/ylemkimon"&gt;Young Min Kim&lt;/a&gt; with &lt;a href="https://compsec.snu.ac.kr/"&gt;CompSec Lab at Seoul National University&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="116">
    <vuln:Title>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23262</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.daviderceg.com/"&gt;David Erceg&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="117">
    <vuln:Title>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could lead to a browser sandbox escape.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23263</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.daviderceg.com/"&gt;David Erceg&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="118">
    <vuln:Title>Microsoft Edge (Chromium-based) Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.50&lt;/td&gt;
&lt;td&gt;2/10/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23264</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description />
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.50</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.instagram.com/zaid_ghiffarii/"&gt;MUHAMMAD ZAID GHIFARI&lt;/a&gt; with &lt;a href="https://borneosec.or.id/"&gt;KALIMMANTAN UTARA&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-10T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="63">
    <vuln:Title>Chromium: CVE-2022-0603 Use after free in File Manager</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0603</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="64">
    <vuln:Title>Chromium: CVE-2022-0604 Heap buffer overflow in Tab Groups</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0604</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="65">
    <vuln:Title>Chromium: CVE-2022-0605 Use after free in Webstore API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0605</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="66">
    <vuln:Title>Chromium: CVE-2022-0606 Use after free in ANGLE</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0606</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="67">
    <vuln:Title>Chromium: CVE-2022-0607 Use after free in GPU</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0607</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="68">
    <vuln:Title>Chromium: CVE-2022-0608 Integer overflow in Mojo</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0608</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="69">
    <vuln:Title>Chromium: CVE-2022-0609 Use after free in Animation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information. Google is aware of reports that an exploit for CVE-2022-0609 exists in the wild.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0609</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="70">
    <vuln:Title>Chromium: CVE-2022-0610 Inappropriate implementation in Gamepad API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.55&lt;/td&gt;
&lt;td&gt;2/15/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.102&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0610</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.55</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="78">
    <vuln:Title>Microsoft SharePoint Server Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L).  What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker must have read access to the target site within SharePoint.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker would be able to bypass the protection in SharePoint blocking the HTTP request based on IP range.  If an attacker successfully exploited this vulnerability, they could validate the presence or absence of an HTTP endpoint within the blocked IP range.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21968</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:ProductID>10612</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10612</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10612</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>3.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>3.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>3.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>3.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10612</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002136</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=977f2baf-941b-423a-bc79-8383a844310a</vuln:URL>
        <vuln:Supercedence>5002113</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002135</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=9062c391-efc6-40d0-b679-e7a31d2bb294</vuln:URL>
        <vuln:Supercedence>5002109</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10383.20001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5002135</vuln:Description>
        <vuln:URL>https://support.microsoft.com/kb/5002135</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002145</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=e66ce694-33fb-41c6-ac72-535d3d6c579d</vuln:URL>
        <vuln:Supercedence>5002111</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.14326.20742</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002155</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=7887bc43-5ade-4bfd-a7ba-46bef6736d9e</vuln:URL>
        <vuln:Supercedence>5002127</vuln:Supercedence>
        <vuln:ProductID>10612</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Steven Seeley (mr_me)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="106">
    <vuln:Title>Named Pipe File System Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Named Pipe File System"
        Type="Tag"
        Ordinal="20">Windows Named Pipe File System</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22715</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Kunlun lab (https://www.cyberkl.com) via TianfuCup (https://www.tianfucup.com)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="107">
    <vuln:Title>Microsoft Excel Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for the Microsoft Office for Mac currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22716</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11605</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:ProductID>10656</vuln:ProductID>
        <vuln:ProductID>10654</vuln:ProductID>
        <vuln:ProductID>10655</vuln:ProductID>
        <vuln:ProductID>10611</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11605</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10656</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10654</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10611</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11605</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10656</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10654</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10611</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11605</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10656</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10654</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10611</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002147</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=07d82b42-2d3e-43f0-9499-d9d5269ce17d</vuln:URL>
        <vuln:Supercedence>5002102</vuln:Supercedence>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.58.22021501</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002133</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=5f04d448-b87e-438f-bd6f-948b15e0f836</vuln:URL>
        <vuln:Supercedence>5002107</vuln:Supercedence>
        <vuln:ProductID>11605</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10383.20001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002137</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=b262c1ef-3e93-405a-9c4b-ff9fa1c6959a</vuln:URL>
        <vuln:Supercedence>5002114</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002137</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=413d5865-3126-4552-97a3-27a967d01dba</vuln:URL>
        <vuln:Supercedence>5002114</vuln:Supercedence>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002156</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002128</vuln:Supercedence>
        <vuln:ProductID>10656</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002156</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=b5bba37b-31ec-49c3-93c0-b4307a917aa1</vuln:URL>
        <vuln:Supercedence>5002128</vuln:Supercedence>
        <vuln:ProductID>10654</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002156</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=658fb07a-c645-4ebd-b65e-b30ae8ca4cb7</vuln:URL>
        <vuln:Supercedence>5002128</vuln:Supercedence>
        <vuln:ProductID>10655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002149</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=f0251975-2daa-42e7-b175-50dd7cc28030</vuln:URL>
        <vuln:Supercedence>5002122</vuln:Supercedence>
        <vuln:ProductID>10611</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Jaanus K\xc3\xa4\xc3\xa4p, Clarified Security working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2022-02-17T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="108">
    <vuln:Title>Windows Print Spooler Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22717</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/APTeeb0w"&gt;Thibault Van Geluwe de Berlaere&lt;/a&gt; with &lt;a href="https://www.mandiant.com/"&gt;Mandiant&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="109">
    <vuln:Title>Windows Print Spooler Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22718</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>NSFOCUS TIANJI Lab via TianfuCup</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-09T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an acknowledgement. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="82">
    <vuln:Title>Windows DNS Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Role: DNS Server"
        Type="Tag"
        Ordinal="20">Role: DNS Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21984</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Mitigation">
        <vuln:Description>&lt;p&gt;The following &lt;a href="https://technet.microsoft.com/library/security/dn848375.aspx"&gt;mitigating factors&lt;/a&gt; may be helpful in your situation:&lt;/p&gt;
&lt;p&gt;To be vulnerable, a DNS server would need to have dynamic updates enabled.&lt;/p&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Offensive Research &amp; Security Engineering (MORSE)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="83">
    <vuln:Title>Windows Remote Access Connection Manager Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Remote Access Connection Manager"
        Type="Tag"
        Ordinal="20">Windows Remote Access Connection Manager</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21985</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>ziming zhang with Ant Security Light-Year Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="84">
    <vuln:Title>.NET Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What .NET component is affected by this denial of service vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability affects applications that utilize the Kestrel web server when processing certain HTTP/2 and HTTP/3 requests.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Kestrel Web Server"
        Type="Tag"
        Ordinal="20">Kestrel Web Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21986</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:ProductID>11969</vuln:ProductID>
        <vuln:ProductID>11901</vuln:ProductID>
        <vuln:ProductID>11761</vuln:ProductID>
        <vuln:ProductID>12009</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11969</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12009</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11969</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12009</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11969</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12009</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.9</vuln:URL>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.9.17</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.11</vuln:URL>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.11.10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.0</vuln:URL>
        <vuln:ProductID>11969</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.0.6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://visualstudio.microsoft.com/vs/mac/</vuln:URL>
        <vuln:ProductID>11901</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.10.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet/5.0</vuln:URL>
        <vuln:ProductID>11761</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.0.14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet/6.0</vuln:URL>
        <vuln:ProductID>12009</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.0.2</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="87">
    <vuln:Title>Windows Kernel Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this case, a successful attack could be performed from a low privilege &lt;a href="https://docs.microsoft.com/windows/win32/secauthz/appcontainer-isolation"&gt;AppContainer&lt;/a&gt;. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21989</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="88">
    <vuln:Title>Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker would need to send a specially crafted request to a host running the Visual Studio Code Remote Development Extension. This issue only affects systems configured to host a remote development environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Visual Studio Code"
        Type="Tag"
        Ordinal="20">Visual Studio Code</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21991</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://code.visualstudio.com/Download</vuln:URL>
        <vuln:ProductID>11622</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.64.1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>levatao and eastjiao</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="89">
    <vuln:Title>Windows Mobile Device Management Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21992</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/wh1tc"&gt;Zesen Ye (@wh1tc) &amp; Zhiniang Peng(&lt;a href="https://twitter.com/edwardzpeng"&gt;@edwardzpeng&lt;/a&gt;) of &lt;a href="https://www.sangfor.com/en"&gt;Sangfor &lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/jq0904"&gt;Jinquan(@jq0904)&lt;/a&gt; with &lt;a href="https://www.dbappsecurity.com.cn/product/cloud250.html"&gt;DBAPPSecurity Lieying Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="90">
    <vuln:Title>Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel-Mode Drivers"
        Type="Tag"
        Ordinal="20">Windows Kernel-Mode Drivers</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21993</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>yyjb with http://blog.noah.360.net/</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="91">
    <vuln:Title>Windows DWM Core Library Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows DWM Core Library"
        Type="Tag"
        Ordinal="20">Windows DWM Core Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21994</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/hillstone_lab"&gt;He YiSheng, Zhang WangJunJie, and Li WenYue&lt;/a&gt; with &lt;a href="https://www.hillstonenet.com.cn/"&gt;Hillstone Network Security Research Institute&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="92">
    <vuln:Title>Windows Hyper-V Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Role: Windows Hyper-V"
        Type="Tag"
        Ordinal="20">Role: Windows Hyper-V</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21995</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.9</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/rezer0dai"&gt;rezer0dai&lt;/a&gt; with EatingFigs ENooPig</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="93">
    <vuln:Title>Win32k Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Win32K"
        Type="Tag"
        Ordinal="20">Windows Win32K</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21996</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:N/A;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>bee13oy with &lt;a href="https://www.cyberkl.com/"&gt;Cyber Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="94">
    <vuln:Title>Windows Print Spooler Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21997</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://wubonetcn.github.io/"&gt;Bo Wu&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="95">
    <vuln:Title>Windows Common Log File System Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21998</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="96">
    <vuln:Title>Windows Print Spooler Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21999</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/ly4k_"&gt;Oliver Lyak&lt;/a&gt; with &lt;a href="https://ifcr.dk/"&gt;Institut For Cyber Risk&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Xuefeng Li (@lxf02942370) &amp; Zhiniang Peng (@edwardzpeng) of Sangfor Via Tianfu CUP</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-09T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added acknowledgements. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="97">
    <vuln:Title>Windows Common Log File System Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22000</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://cyberkl.com"&gt;Kunlun Lab&lt;/a&gt; via &lt;a href="http://tianfucup.com"&gt;TianfuCup&lt;/a&gt; 
</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-09T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="98">
    <vuln:Title>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Remote Access Connection Manager"
        Type="Tag"
        Ordinal="20">Windows Remote Access Connection Manager</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22001</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>ziming zhang of Ant Security Light-Year Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="99">
    <vuln:Title>Windows User Account Profile Picture Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows User Account Profile"
        Type="Tag"
        Ordinal="20">Windows User Account Profile</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22002</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri working with Trend Micro Zero Day Initiative</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="100">
    <vuln:Title>Microsoft Office Graphics Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A user needs to be tricked into running malicious files.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for the Microsoft Office for Mac currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22003</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:ProductID>10603</vuln:ProductID>
        <vuln:ProductID>10601</vuln:ProductID>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10603</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10601</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10603</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10601</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10603</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10601</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.58.22021501</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002140</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=ab5c9559-8cb9-440a-b2e0-7b586957581f</vuln:URL>
        <vuln:Supercedence>5002116</vuln:Supercedence>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002140</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=4287cc1e-9024-4457-973f-cdab4bf70b2f</vuln:URL>
        <vuln:Supercedence>5002116</vuln:Supercedence>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002146</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002119</vuln:Supercedence>
        <vuln:ProductID>10603</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002146</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=7a138a91-b9f4-432f-bef6-d843e53eff48</vuln:URL>
        <vuln:Supercedence>5002119</vuln:Supercedence>
        <vuln:ProductID>10601</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002146</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=5f1deeac-3328-4be0-88a4-5c1547d0de08</vuln:URL>
        <vuln:Supercedence>5002119</vuln:Supercedence>
        <vuln:ProductID>10602</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.linkedin.com/in/jaanuskaap/"&gt;Jaanus Kääp&lt;/a&gt; with &lt;a href="https://www.clarifiedsecurity.com/"&gt;Clarified Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2022-02-17T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="101">
    <vuln:Title>Microsoft Office ClickToRun Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22004</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11441</vuln:ProductID>
        <vuln:ProductID>11442</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11441</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11442</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11441</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11442</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11441</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11442</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Update History</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11441</vuln:ProductID>
        <vuln:ProductID>11442</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5415.xxxxxx</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>DoHyun Lee(@l33d0hyun)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>SeungYun LEE</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://https/"&gt;JaeHeng Yoon(@onnoveath)&lt;/a&gt; with JENBlack Soft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="102">
    <vuln:Title>Microsoft SharePoint Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker must be authenticated and possess the permissions for page creation to be able to exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22005</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002136</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=977f2baf-941b-423a-bc79-8383a844310a</vuln:URL>
        <vuln:Supercedence>5002113</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002120</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=931bc018-8f42-4e39-ae81-ebdb7e4180f3</vuln:URL>
        <vuln:Supercedence>5002008</vuln:Supercedence>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002135</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=9062c391-efc6-40d0-b679-e7a31d2bb294</vuln:URL>
        <vuln:Supercedence>5002109</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10383.20001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5002135</vuln:Description>
        <vuln:URL>https://support.microsoft.com/kb/5002135</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002145</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=e66ce694-33fb-41c6-ac72-535d3d6c579d</vuln:URL>
        <vuln:Supercedence>5002111</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.14326.20742</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="111">
    <vuln:Title>Microsoft Office Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23252</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:ProductID>10603</vuln:ProductID>
        <vuln:ProductID>10601</vuln:ProductID>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10603</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10601</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10603</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10601</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10603</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10601</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10602</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>3118335</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=a265f8e2-cdb6-4046-ba33-554915ed8b26</vuln:URL>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>3118335</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=a82bd191-f4b2-4e31-864a-34aa8b32d7cf</vuln:URL>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5278.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>3172514</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>10603</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>3172514</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=a265f8e2-cdb6-4046-ba33-554915ed8b26</vuln:URL>
        <vuln:ProductID>10601</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>3172514</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=e70bd0c6-f6d2-4394-8b2c-c04e5433d27e</vuln:URL>
        <vuln:ProductID>10602</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5423.1000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Jaanus K\xc3\xa4\xc3\xa4p, Clarified Security working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="113">
    <vuln:Title>Microsoft OneDrive for Android Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L).  What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker needs access to an unlocked mobile device to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The authentication to access OneDrive files could potentially be bypassed. Microsoft recommends installing the update for this vulnerability as soon as possible.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft OneDrive"
        Type="Tag"
        Ordinal="20">Microsoft OneDrive</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23255</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11726</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11726</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11726</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11726</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>App Store</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11726</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.46</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.linkedin.com/in/harsh-tyagi-1468b3193/"&gt;Harsh Tyagi&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="81">
    <vuln:Title>Windows Common Log File System Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-21981</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351</vuln:URL>
        <vuln:Supercedence>5009557</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2565</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010351</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010351</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010345</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345</vuln:URL>
        <vuln:Supercedence>5009545</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.2094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010342</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354</vuln:URL>
        <vuln:Supercedence>5009555</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.524</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010354</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010354</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010456</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.525</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010386</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386</vuln:URL>
        <vuln:Supercedence>5009566</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.493</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010342</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342</vuln:URL>
        <vuln:Supercedence>5009543</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.1526</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010358</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358</vuln:URL>
        <vuln:Supercedence>5009585</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19204</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359</vuln:URL>
        <vuln:Supercedence>5009546</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4946</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010359</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010359</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404</vuln:URL>
        <vuln:Supercedence>5009610</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010404</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010404</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25860</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010422</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419</vuln:URL>
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010419</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010395</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010395</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010419</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5009624</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20269</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384</vuln:URL>
        <vuln:Supercedence>5009627</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21374</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010384</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010384</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21372</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010403</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010403</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392</vuln:URL>
        <vuln:Supercedence>5009586</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010392</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23605</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5010412</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5010412</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://cyberkl.com"&gt;Kunlun Lab&lt;/a&gt;  </vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="114">
    <vuln:Title>Azure Data Explorer Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability discloses a user's JSON web token to the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the security update for Azure Data Explorer?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;You need to restart the Kusto.Explorer application. The update will be automatically downloaded.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Where can I find information about the update?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Release notes for the update are available in the application menu under &lt;strong&gt;Help-&amp;gt;What’s new&lt;/strong&gt;, under the applicable Version.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of integrity (I:H)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The compromised JSON web token can be used to compromise accounts and modify account information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Data Explorer"
        Type="Tag"
        Ordinal="20">Azure Data Explorer</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23256</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12004</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12004</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12004</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12004</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="125">
    <vuln:Title>Microsoft Outlook for Mac Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker would be able to bypass the protection in Outlook that prevents an image from being shown automatically in an email. Depending on the user's settings, the user would normally need to choose to download images for display. If an attacker successfully exploited this vulnerability it could expose the target's IP information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the update for Outlook for Mac?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tap the Settings Icon&lt;/li&gt;
&lt;li&gt;Tap the iTunes &amp;amp; App Store&lt;/li&gt;
&lt;li&gt;Turn on AUTOMATIC DOWNLOADS for Apps&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Alternatively&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Tap the App Store Icon&lt;/li&gt;
&lt;li&gt;Scroll down to find Microsoft Outlook&lt;/li&gt;
&lt;li&gt;Tap the Update button&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;If the preview pane is an attack vector, why is the severity for this vulnerability Important and not Critical?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Even though the preview pane is an attack vector, the attacker cannot achieve remote code execution if they successfully exploit the vulnerability, but can only gain information from the victim.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, the Preview Pane is an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Outlook"
        Type="Tag"
        Ordinal="20">Microsoft Office Outlook</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-23280</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10768</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10768</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>App Store</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>10768</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.57</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/r0ns3n"&gt;Ronnie Salomonsen&lt;/a&gt; with &lt;a href="https://www.mandiant.com/"&gt;Mandiant&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-02-09T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="103">
    <vuln:Title>VP9 Video Extensions Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the updated app?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"&gt;here&lt;/a&gt; for details.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My system is in a disconnected environment; is it vulnerable?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. VLSC customers can visit the Volume Licensing Servicing Center to get the update &lt;a href="https://www.microsoft.com/Licensing/servicecenter/"&gt;https://www.microsoft.com/Licensing/servicecenter/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I check if the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;App package versions &lt;strong&gt;1.0.42791.0&lt;/strong&gt; and later contain this update.
You can check the package version in PowerShell: &lt;code&gt;Get-AppxPackage -Name Microsoft.VP9VideoExtensions&lt;/code&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22709</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11884</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11884</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11884</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11884</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>MS Store Information</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11884</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.42791.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=""&gt;Zhihua Yao&lt;/a&gt; with &lt;a href=""&gt;KunLun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>Chromium: CVE-2022-0452 Use after free in Safe Browsing</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0452</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:02:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Chromium: CVE-2022-0453 Use after free in Reader Mode</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0453</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:02:30</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>Chromium: CVE-2022-0454 Heap buffer overflow in ANGLE</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0454</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:02:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>Chromium: CVE-2022-0455 Inappropriate implementation in Full Screen Mode</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0455</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:02:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>Chromium: CVE-2022-0456 Use after free in Web Search</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0456</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:02:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>Chromium: CVE-2022-0457 Type Confusion in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0457</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:03:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>Chromium: CVE-2022-0458 Use after free in Thumbnail Tab Strip</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0458</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:03:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>Chromium: CVE-2022-0459 Use after free in Screen Capture</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0459</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:03:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>Chromium: CVE-2022-0460 Use after free in Window Dialog</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0460</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:03:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Chromium: CVE-2022-0461 Policy bypass in COOP</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0461</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:03:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Chromium: CVE-2022-0462 Inappropriate implementation in Scroll</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0462</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:03:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Chromium: CVE-2022-0463 Use after free in Accessibility</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0463</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Chromium: CVE-2022-0464 Use after free in Accessibility</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0464</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>Chromium: CVE-2022-0465 Use after free in Extensions</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0465</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Chromium: CVE-2022-0466 Inappropriate implementation in Extensions Platform</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0466</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Chromium: CVE-2022-0467 Inappropriate implementation in Pointer Lock</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0467</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>Chromium: CVE-2022-0468 Use after free in Payments</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0468</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>Chromium: CVE-2022-0469 Use after free in Cast</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0469</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:04:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Chromium: CVE-2022-0470 Out of bounds memory access in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2022"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;98.0.1108.43&lt;/td&gt;
&lt;td&gt;2/3/2022&lt;/td&gt;
&lt;td&gt;98.0.4758.80&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0470</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>98.0.1108.43</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-02T02:05:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-22600</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-22600</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@google.com"
        Type="CNA"
        Ordinal="30">security@google.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22600</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.18.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.18.1-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-36690</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-36690</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36690</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>sqlite</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-3.36.0-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-devel-3.36.0-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-libs-3.36.0-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-debuginfo-3.36.0-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>3.36.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>sqlite</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-3.36.0-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-devel-3.36.0-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-libs-3.36.0-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>sqlite-debuginfo-3.36.0-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>3.36.0-3</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2018-16301</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2018-16301</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2018-16301</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2018-16301</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2018-16301</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>tcpdump</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-4.99.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-debuginfo-4.99.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.99.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>tcpdump</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-4.99.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-debuginfo-4.99.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.99.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>tcpdump</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-4.99.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-debuginfo-4.99.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.99.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>tcpdump</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-4.99.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>tcpdump-debuginfo-4.99.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.99.1-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-45079</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-45079</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-45079</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-45079</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-45079</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>strongswan</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-5.7.2-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-debuginfo-5.7.2-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.7.2-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>strongswan</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-5.7.2-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-debuginfo-5.7.2-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.7.2-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>strongswan</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-5.9.5-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-debuginfo-5.9.5-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.9.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>strongswan</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-5.9.5-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-debuginfo-5.9.5-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.9.5-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46657</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46657</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46657</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46657</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46657</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.3.32-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.3.32-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46658</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46658</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46658</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46658</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46658</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.3.32-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.3.32-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.3.32-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.3.32-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46659</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46659</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46659</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46659</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46659</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.3.34-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.3.34-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.3.34-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.3.34-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.3.34-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.3.34-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.3.34-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.3.34-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.3.34-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.3.34-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.3.34-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.3.34-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.3.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.6.7-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mariadb</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-server-galera-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-devel-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-errmsg-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mariadb-debuginfo-10.6.7-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>10.6.7-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0393</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0393</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0393</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0393</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0393</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0368</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0368</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0392</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0392</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0359</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0359</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0361</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0361</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0413</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0413</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0408</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0408</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4743-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0407</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0407</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0407</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-0407</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-0407</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4281-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4281-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-8.2.4743-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.2.4233-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="110">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-22844</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-22844</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-22844</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>libtiff</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>libtiff-4.3.0-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libtiff-devel-4.3.0-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libtiff-debuginfo-4.3.0-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.3.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>libtiff</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>libtiff-4.3.0-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libtiff-devel-4.3.0-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libtiff-debuginfo-4.3.0-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.3.0-2</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="126">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-24122</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-24122</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24122</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.32.1-3.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.32.1-3.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.26.1-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="127">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-24130</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-24130</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-24130</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>xterm</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>xterm-372-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>xterm-resize-372-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>xterm-debuginfo-372-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>372-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>xterm</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>xterm-372-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>xterm-resize-372-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>xterm-debuginfo-372-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>372-1</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
</cvrf:cvrfdoc>