<cvrf:cvrfdoc
  xmlns:vuln="http://www.icasi.org/CVRF/schema/vuln/1.1"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:cvrf-common="http://www.icasi.org/CVRF/schema/common/1.1"
  xmlns:prod="http://www.icasi.org/CVRF/schema/prod/1.1"
  xmlns:scap-core="https://scap.nist.gov/schema/scap-core/1.0"
  xmlns:cvssv2="https://scap.nist.gov/schema/cvss-v2/1.0"
  xmlns:cpe-lang="http://cpe.mitre.org/language/2.0"
  xmlns:sch="http://purl.oclc.org/dsdl/schematron"
  xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <cvrf:DocumentTitle>August 2021 Security Updates</cvrf:DocumentTitle>
  <cvrf:DocumentType>Security Update</cvrf:DocumentType>
  <cvrf:DocumentPublisher
    Type="Vendor">
    <cvrf:ContactDetails>secure@microsoft.com</cvrf:ContactDetails>
    <cvrf:IssuingAuthority>The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to security incidents and Microsoft software security vulnerabilities. For more information, see http://www.microsoft.com/security/msrc.</cvrf:IssuingAuthority>
  </cvrf:DocumentPublisher>
  <cvrf:DocumentTracking>
    <cvrf:Identification>
      <cvrf:ID>2021-Aug</cvrf:ID>
      <cvrf:Alias>2021-Aug</cvrf:Alias>
    </cvrf:Identification>
    <cvrf:Status>Final</cvrf:Status>
    <cvrf:Version>1.0</cvrf:Version>
    <cvrf:RevisionHistory>
      <cvrf:Revision>
        <cvrf:Number>57</cvrf:Number>
        <cvrf:Date>2026-02-19T01:36:29</cvrf:Date>
        <cvrf:Description>August 2021 Security Updates</cvrf:Description>
      </cvrf:Revision>
    </cvrf:RevisionHistory>
    <cvrf:InitialReleaseDate>2021-08-10T07:00:00</cvrf:InitialReleaseDate>
    <cvrf:CurrentReleaseDate>2026-02-19T01:36:29</cvrf:CurrentReleaseDate>
  </cvrf:DocumentTracking>
  <cvrf:DocumentNotes>
    <cvrf:Note
      Title="Release Notes"
      Audience="Public"
      Type="Details"
      Ordinal="0">&lt;h2&gt;Updates this Month&lt;/h2&gt;
&lt;p&gt;This release consists of security updates for the following products, features and roles.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;.NET Core &amp;amp; Visual Studio&lt;/li&gt;
&lt;li&gt;ASP .NET&lt;/li&gt;
&lt;li&gt;Azure&lt;/li&gt;
&lt;li&gt;Azure Sphere&lt;/li&gt;
&lt;li&gt;Microsoft Azure Active Directory Connect&lt;/li&gt;
&lt;li&gt;Microsoft Dynamics&lt;/li&gt;
&lt;li&gt;Microsoft Graphics Component&lt;/li&gt;
&lt;li&gt;Microsoft Office&lt;/li&gt;
&lt;li&gt;Microsoft Office SharePoint&lt;/li&gt;
&lt;li&gt;Microsoft Office Word&lt;/li&gt;
&lt;li&gt;Microsoft Scripting Engine&lt;/li&gt;
&lt;li&gt;Microsoft Windows Codecs Library&lt;/li&gt;
&lt;li&gt;Remote Desktop Client&lt;/li&gt;
&lt;li&gt;Windows Bluetooth Service&lt;/li&gt;
&lt;li&gt;Windows Cryptographic Services&lt;/li&gt;
&lt;li&gt;Windows Defender&lt;/li&gt;
&lt;li&gt;Windows Event Tracing&lt;/li&gt;
&lt;li&gt;Windows Media&lt;/li&gt;
&lt;li&gt;Windows MSHTML Platform&lt;/li&gt;
&lt;li&gt;Windows NTLM&lt;/li&gt;
&lt;li&gt;Windows Print Spooler Components&lt;/li&gt;
&lt;li&gt;Windows Services for NFS ONCRPC XDR Driver&lt;/li&gt;
&lt;li&gt;Windows Storage Spaces Controller&lt;/li&gt;
&lt;li&gt;Windows TCP/IP&lt;/li&gt;
&lt;li&gt;Windows Update&lt;/li&gt;
&lt;li&gt;Windows Update Assistant&lt;/li&gt;
&lt;li&gt;Windows User Profile Service&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Please note the following information regarding the security updates:&lt;/p&gt;
&lt;h2&gt;Security Update Guide Blog Posts&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;
&lt;th&gt;Blog Post&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;February 9, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/02/09/continuing-to-listen-good-news-about-the-security-update-guide-api/"&gt;Continuing to Listen: Good News about the Security Update Guide API&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 13, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;December 8, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/12/08/security-update-guide-lets-keep-the-conversation-going/"&gt;Security Update Guide: Let’s keep the conversation going&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;November 9, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/11/09/vulnerability-descriptions-in-the-new-version-of-the-security-update-guide/"&gt;Vulnerability Descriptions in the New Version of the Security Update Guide&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Relevant Information&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the &lt;a href="https://www.catalog.update.microsoft.com/Home.aspx"&gt;Microsoft Update Catalog&lt;/a&gt;. For information on lifecycle and support dates for Windows 10 operating systems, please see &lt;a href="https://docs.microsoft.com/en-us/lifecycle/faq/windows"&gt;Windows Lifecycle Facts Sheet&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Microsoft is improving Windows Release Notes. For more information, please see &lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-next-for-windows-release-notes/ba-p/1754399"&gt;What's next for Windows release notes&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A list of the latest servicing stack updates for each operating system can be found in &lt;a href="https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001"&gt;ADV990001&lt;/a&gt;. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.&lt;/li&gt;
&lt;li&gt;In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.&lt;/li&gt;
&lt;li&gt;Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See &lt;a href="https://support.microsoft.com/en-us/topic/procedure-to-continue-receiving-security-updates-after-extended-support-ends-on-january-14-2020-48c59204-fe67-3f42-84fc-c3c3145ff28e"&gt;4522133&lt;/a&gt; for more information.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;FAQs, Mitigations, and Workarounds&lt;/h2&gt;
&lt;p&gt;The following CVEs have FAQs, Mitigations, or Workarounds. You can see these in more detail from the Vulnerabilities tab by selecting &lt;strong&gt;FAQs&lt;/strong&gt;, &lt;strong&gt;Mitigations&lt;/strong&gt; and &lt;strong&gt;Workarounds&lt;/strong&gt; columns in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26428"&gt;CVE-2021-26428&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26429"&gt;CVE-2021-26429&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26430"&gt;CVE-2021-26430&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26433"&gt;CVE-2021-26433&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34478"&gt;CVE-2021-34478&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34485"&gt;CVE-2021-34485&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34532"&gt;CVE-2021-34532&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36926"&gt;CVE-2021-36926&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36932"&gt;CVE-2021-36932&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36933"&gt;CVE-2021-36933&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36938"&gt;CVE-2021-36938&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36941"&gt;CVE-2021-36941&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36949"&gt;CVE-2021-36949&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Known Issues&lt;/h2&gt;
&lt;p&gt;You can see these in more detail from the Deployments tab by selecting &lt;strong&gt;Known Issues&lt;/strong&gt; column in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;p&gt;For more information about Windows Known Issues, please see &lt;a href="https://docs.microsoft.com/en-us/windows/release-information/windows-message-center"&gt;Windows message center&lt;/a&gt; (links to currently-supported versions of Windows are in the left pane).&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;KB Article&lt;/th&gt;
&lt;th&gt;Applies To&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005030"&gt;5005030&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, Version 1809, Windows Server 2019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005031"&gt;5005031&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, Version 1909&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005033"&gt;5005033&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, Version 2004, Windows Server, Version 2004, Windows 10, Version 20H2, Windows Server, Version 20H2, Windows 10, Version 21H1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005040"&gt;5005040&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005076"&gt;5005076&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 8.1, Windows RT 8.1, Windows Server 2012 R2 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005088"&gt;5005088&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 7 SP1, Windows Server 2008 R2 SP1 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005089"&gt;5005089&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 7 SP1, Windows Server 2008 R2 SP1 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005090"&gt;5005090&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 SP2 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005094"&gt;5005094&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2012 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005095"&gt;5005095&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 SP2 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005099"&gt;5005099&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2012 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5005106"&gt;5005106&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 8.1, Windows RT 8.1, Windows Server 2012 R2 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</cvrf:Note>
    <cvrf:Note
      Title="Legal Disclaimer"
      Audience="Public"
      Type="Legal Disclaimer"
      Ordinal="1">The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.</cvrf:Note>
  </cvrf:DocumentNotes>
  <prod:ProductTree>
    <prod:Branch
      Type="Vendor"
      Name="Microsoft">
      <prod:Branch
        Type="Vendor"
        Name="Microsoft">
        <prod:Branch
          Type="Product Family"
          Name="Azure">
          <prod:FullProductName
            ProductID="11904">Azure CycleCloud 7.9.10</prod:FullProductName>
          <prod:FullProductName
            ProductID="11905">Azure CycleCloud 8.2.0</prod:FullProductName>
          <prod:FullProductName
            ProductID="11796">Azure Sphere</prod:FullProductName>
          <prod:FullProductName
            ProductID="11920">Microsoft Azure Active Directory Connect 1.X.Y.Z</prod:FullProductName>
          <prod:FullProductName
            ProductID="11922">Azure Active Directory Connect Provisioning Agent</prod:FullProductName>
          <prod:FullProductName
            ProductID="11919">Microsoft Azure Active Directory Connect 2.0.X.Y</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="Microsoft Dynamics">
          <prod:FullProductName
            ProductID="11921">Microsoft Dynamics 365 (on-premises) version 9.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11664">Microsoft Dynamics 365 (on-premises) version 9.0</prod:FullProductName>
          <prod:FullProductName
            ProductID="11603">Microsoft Dynamics NAV 2017</prod:FullProductName>
          <prod:FullProductName
            ProductID="11746">Microsoft Dynamics NAV 2018</prod:FullProductName>
          <prod:FullProductName
            ProductID="11750">Dynamics 365 Business Central 2019 Spring Update</prod:FullProductName>
          <prod:FullProductName
            ProductID="11916">Microsoft Dynamics 365 Business Central 2020 Release Wave 2 - Update 17.9</prod:FullProductName>
          <prod:FullProductName
            ProductID="11917">Microsoft Dynamics 365 Business Central 2020 Release Wave 1 - Update 16.15</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="Microsoft Office">
          <prod:FullProductName
            ProductID="11573">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
          <prod:FullProductName
            ProductID="11574">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
          <prod:FullProductName
            ProductID="11762">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11763">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10950">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
          <prod:FullProductName
            ProductID="11099">Microsoft SharePoint Enterprise Server 2013 Service Pack 1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11585">Microsoft SharePoint Server 2019</prod:FullProductName>
          <prod:FullProductName
            ProductID="11575">Microsoft Office 2019 for Mac</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="Windows">
          <prod:FullProductName
            ProductID="11568">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11569">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11570">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11571">Windows Server 2019</prod:FullProductName>
          <prod:FullProductName
            ProductID="11712">Windows 10 Version 1909 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11713">Windows 10 Version 1909 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11714">Windows 10 Version 1909 for ARM64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11896">Windows 10 Version 21H1 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11897">Windows 10 Version 21H1 for ARM64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11898">Windows 10 Version 21H1 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11766">Windows 10 Version 2004 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11767">Windows 10 Version 2004 for ARM64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11768">Windows 10 Version 2004 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11800">Windows 10 Version 20H2 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11801">Windows 10 Version 20H2 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="11802">Windows 10 Version 20H2 for ARM64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10729">Windows 10 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10735">Windows 10 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10852">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10853">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10816">Windows Server 2016</prod:FullProductName>
          <prod:FullProductName
            ProductID="10481">Windows 8.1 for 32-bit systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10482">Windows 8.1 for x64-based systems</prod:FullProductName>
          <prod:FullProductName
            ProductID="10484">Windows RT 8.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="10378">Windows Server 2012</prod:FullProductName>
          <prod:FullProductName
            ProductID="10483">Windows Server 2012 R2</prod:FullProductName>
          <prod:FullProductName
            ProductID="11572">Windows Server 2019  (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11769">Windows Server, version 2004 (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11803">Windows Server, version 20H2 (Server Core Installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="10855">Windows Server 2016  (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="10543">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="10379">Windows Server 2012 (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11707">Windows Update Assistant</prod:FullProductName>
          <prod:FullProductName
            ProductID="11849">Remote Desktop client for Windows Desktop</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="ESU">
          <prod:FullProductName
            ProductID="10047">Windows 7 for 32-bit Systems Service Pack 1</prod:FullProductName>
          <prod:FullProductName
            ProductID="10048">Windows 7 for x64-based Systems Service Pack 1</prod:FullProductName>
          <prod:FullProductName
            ProductID="10051">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
          <prod:FullProductName
            ProductID="10049">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="9312">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
          <prod:FullProductName
            ProductID="10287">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
          <prod:FullProductName
            ProductID="9318">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
          <prod:FullProductName
            ProductID="9344">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="Developer Tools">
          <prod:FullProductName
            ProductID="11600">Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11720">Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11785">Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11872">Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11900">Microsoft Visual Studio 2019 version 16.10 (includes 16.0 - 16.9)</prod:FullProductName>
          <prod:FullProductName
            ProductID="11901">Visual Studio 2019 for Mac version 8.10</prod:FullProductName>
          <prod:FullProductName
            ProductID="11565">.NET Core 2.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11730">.NET Core 3.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11761">.NET 5.0</prod:FullProductName>
          <prod:FullProductName
            ProductID="11864">PowerShell Core 7.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11865">PowerShell Core 7.0</prod:FullProductName>
          <prod:FullProductName
            ProductID="11564">ASP.NET Core 2.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11728">ASP.NET Core 3.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11846">ASP.NET Core 5.0</prod:FullProductName>
          <prod:FullProductName
            ProductID="11925">PowerShell 7.1</prod:FullProductName>
          <prod:FullProductName
            ProductID="11745">PowerShell 7.0</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="System Center">
          <prod:FullProductName
            ProductID="11902">Microsoft Malware Protection Engine</prod:FullProductName>
        </prod:Branch>
        <prod:Branch
          Type="Product Family"
          Name="Browser">
          <prod:FullProductName
            ProductID="11655">Microsoft Edge (Chromium-based)</prod:FullProductName>
        </prod:Branch>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Other">
        <prod:FullProductName
          ProductID="12137">CBL Mariner 1.0 x64</prod:FullProductName>
        <prod:FullProductName
          ProductID="12138">CBL Mariner 1.0 ARM</prod:FullProductName>
      </prod:Branch>
    </prod:Branch>
    <prod:FullProductName
      ProductID="10047">Windows 7 for 32-bit Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10048">Windows 7 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10049">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10051">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10287">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10378">Windows Server 2012</prod:FullProductName>
    <prod:FullProductName
      ProductID="10379">Windows Server 2012 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10481">Windows 8.1 for 32-bit systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10482">Windows 8.1 for x64-based systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10483">Windows Server 2012 R2</prod:FullProductName>
    <prod:FullProductName
      ProductID="10484">Windows RT 8.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10543">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10729">Windows 10 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10735">Windows 10 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10816">Windows Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="10852">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10853">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10855">Windows Server 2016  (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10950">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="11099">Microsoft SharePoint Enterprise Server 2013 Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11564">ASP.NET Core 2.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11565">.NET Core 2.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11568">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11569">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11570">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11571">Windows Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11572">Windows Server 2019  (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11573">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11574">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11575">Microsoft Office 2019 for Mac</prod:FullProductName>
    <prod:FullProductName
      ProductID="11585">Microsoft SharePoint Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11600">Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11603">Microsoft Dynamics NAV 2017</prod:FullProductName>
    <prod:FullProductName
      ProductID="11655">Microsoft Edge (Chromium-based)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11664">Microsoft Dynamics 365 (on-premises) version 9.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11707">Windows Update Assistant</prod:FullProductName>
    <prod:FullProductName
      ProductID="11712">Windows 10 Version 1909 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11713">Windows 10 Version 1909 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11714">Windows 10 Version 1909 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11720">Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11728">ASP.NET Core 3.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11730">.NET Core 3.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11745">PowerShell 7.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11746">Microsoft Dynamics NAV 2018</prod:FullProductName>
    <prod:FullProductName
      ProductID="11750">Dynamics 365 Business Central 2019 Spring Update</prod:FullProductName>
    <prod:FullProductName
      ProductID="11761">.NET 5.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11762">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11763">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11766">Windows 10 Version 2004 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11767">Windows 10 Version 2004 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11768">Windows 10 Version 2004 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11769">Windows Server, version 2004 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11785">Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11796">Azure Sphere</prod:FullProductName>
    <prod:FullProductName
      ProductID="11800">Windows 10 Version 20H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11801">Windows 10 Version 20H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11802">Windows 10 Version 20H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11803">Windows Server, version 20H2 (Server Core Installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11846">ASP.NET Core 5.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11849">Remote Desktop client for Windows Desktop</prod:FullProductName>
    <prod:FullProductName
      ProductID="11864">PowerShell Core 7.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11865">PowerShell Core 7.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11872">Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11896">Windows 10 Version 21H1 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11897">Windows 10 Version 21H1 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11898">Windows 10 Version 21H1 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11900">Microsoft Visual Studio 2019 version 16.10 (includes 16.0 - 16.9)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11901">Visual Studio 2019 for Mac version 8.10</prod:FullProductName>
    <prod:FullProductName
      ProductID="11902">Microsoft Malware Protection Engine</prod:FullProductName>
    <prod:FullProductName
      ProductID="11904">Azure CycleCloud 7.9.10</prod:FullProductName>
    <prod:FullProductName
      ProductID="11905">Azure CycleCloud 8.2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11916">Microsoft Dynamics 365 Business Central 2020 Release Wave 2 - Update 17.9</prod:FullProductName>
    <prod:FullProductName
      ProductID="11917">Microsoft Dynamics 365 Business Central 2020 Release Wave 1 - Update 16.15</prod:FullProductName>
    <prod:FullProductName
      ProductID="11919">Microsoft Azure Active Directory Connect 2.0.X.Y</prod:FullProductName>
    <prod:FullProductName
      ProductID="11920">Microsoft Azure Active Directory Connect 1.X.Y.Z</prod:FullProductName>
    <prod:FullProductName
      ProductID="11921">Microsoft Dynamics 365 (on-premises) version 9.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11922">Azure Active Directory Connect Provisioning Agent</prod:FullProductName>
    <prod:FullProductName
      ProductID="11925">PowerShell 7.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="12137">CBL Mariner 1.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12138">CBL Mariner 1.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="16857-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtsvg_5.12.11-3:*:*:*:*:*:*:*:*">cbl2 qt5-qtsvg 5.12.11-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="16919-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.60.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.60.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="16920-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.10.78.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.10.78.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="16965-16820"
      CPE="cpe:2.3:a:microsoft:cm1_qt5-qtsvg_5.12.11-2:*:*:*:*:*:*:*:*">cm1 qt5-qtsvg 5.12.11-2 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17009-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_exiv2_0.27.5-1:*:*:*:*:*:*:*:*">cbl2 exiv2 0.27.5-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17013-17084"
      CPE="cpe:2.3:a:microsoft:azl3_shim-unsigned-aarch64_15.8-5:*:*:*:*:*:*:*:*">azl3 shim-unsigned-aarch64 15.8-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17015-16820"
      CPE="cpe:2.3:a:microsoft:cm1_krb5_1.18.4-1:*:*:*:*:*:*:*:*">cm1 krb5 1.18.4-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17021-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.16.2-2:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.16.2-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17030-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_httpd_2.4.52-1:*:*:*:*:*:*:*:*">cbl2 httpd 2.4.52-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17093-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-24:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-24 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17384-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17433-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_python-gevent_21.1.2-3:*:*:*:*:*:*:*:*">cbl2 python-gevent 21.1.2-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17459-17084"
      CPE="cpe:2.3:a:microsoft:azl3_qemu_8.2.0-16:*:*:*:*:*:*:*:*">azl3 qemu 8.2.0-16 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17485-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.23.7-1:*:*:*:*:*:*:*:*">azl3 golang 1.23.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17667-17084"
      CPE="cpe:2.3:a:microsoft:azl3_tensorflow_2.16.1-9:*:*:*:*:*:*:*:*">azl3 tensorflow 2.16.1-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17859-17084"
      CPE="cpe:2.3:a:microsoft:azl3_edk2_20230301gitf80f052277c8-37:*:*:*:*:*:*:*:*">azl3 edk2 20230301gitf80f052277c8-37 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18131-17084"
      CPE="cpe:2.3:a:microsoft:azl3_edk2_20240223gitedc6681206c1-1:*:*:*:*:*:*:*:*">azl3 edk2 20240223gitedc6681206c1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18469-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mozjs_102.15.1-1:*:*:*:*:*:*:*:*">azl3 mozjs 102.15.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18757-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-2:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18775-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs_16.14.0-1:*:*:*:*:*:*:*:*">cbl2 nodejs 16.14.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18810-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_glibc_2.35-1:*:*:*:*:*:*:*:*">cbl2 glibc 2.35-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18817-17084"
      CPE="cpe:2.3:a:microsoft:azl3_librsvg2_2.58.1-1:*:*:*:*:*:*:*:*">azl3 librsvg2 2.58.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18903-16820"
      CPE="cpe:2.3:a:microsoft:cm1_openssl_1.1.1k-8:*:*:*:*:*:*:*:*">cm1 openssl 1.1.1k-8 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18958-16820"
      CPE="cpe:2.3:a:microsoft:cm1_gd_2.3.3-1:*:*:*:*:*:*:*:*">cm1 gd 2.3.3-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18959-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_gd_2.3.3-1:*:*:*:*:*:*:*:*">cbl2 gd 2.3.3-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18960-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_gd_2.3.0-5:*:*:*:*:*:*:*:*">cbl2 gd 2.3.0-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18982-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_openssl_1.1.1k-11:*:*:*:*:*:*:*:*">cbl2 openssl 1.1.1k-11 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18983-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_krb5_1.19.3-1:*:*:*:*:*:*:*:*">cbl2 krb5 1.19.3-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18989-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_curl_7.82.0-1:*:*:*:*:*:*:*:*">cbl2 curl 7.82.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18992-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-11:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-11 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18999-16820"
      CPE="cpe:2.3:a:microsoft:cm1_git_2.23.4-2:*:*:*:*:*:*:*:*">cm1 git 2.23.4-2 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19000-16820"
      CPE="cpe:2.3:a:microsoft:cm1_mc_4.8.27-1:*:*:*:*:*:*:*:*">cm1 mc 4.8.27-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19001-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_mc_4.8.27-1:*:*:*:*:*:*:*:*">cbl2 mc 4.8.27-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19003-16820"
      CPE="cpe:2.3:a:microsoft:cm1_qemu-kvm_4.2.0-36:*:*:*:*:*:*:*:*">cm1 qemu-kvm 4.2.0-36 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19004-16820"
      CPE="cpe:2.3:a:microsoft:cm1_nodejs_14.17.5-1:*:*:*:*:*:*:*:*">cm1 nodejs 14.17.5-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19005-16820"
      CPE="cpe:2.3:a:microsoft:cm1_httpd_2.4.46-6:*:*:*:*:*:*:*:*">cm1 httpd 2.4.46-6 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19006-16820"
      CPE="cpe:2.3:a:microsoft:cm1_glibc_2.28-20:*:*:*:*:*:*:*:*">cm1 glibc 2.28-20 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19007-16820"
      CPE="cpe:2.3:a:microsoft:cm1_golang_1.16.7-1:*:*:*:*:*:*:*:*">cm1 golang 1.16.7-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19008-16820"
      CPE="cpe:2.3:a:microsoft:cm1_curl_7.76.0-5:*:*:*:*:*:*:*:*">cm1 curl 7.76.0-5 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19009-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_curl_7.76.0-5:*:*:*:*:*:*:*:*">cbl2 curl 7.76.0-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19010-16820"
      CPE="cpe:2.3:a:microsoft:cm1_curl_7.76.0-7:*:*:*:*:*:*:*:*">cm1 curl 7.76.0-7 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19011-16820"
      CPE="cpe:2.3:a:microsoft:cm1_cpio_2.13-3:*:*:*:*:*:*:*:*">cm1 cpio 2.13-3 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19012-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cpio_2.13-4:*:*:*:*:*:*:*:*">cbl2 cpio 2.13-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19013-16820"
      CPE="cpe:2.3:a:microsoft:cm1_qemu-kvm_4.2.0-35:*:*:*:*:*:*:*:*">cm1 qemu-kvm 4.2.0-35 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19014-16820"
      CPE="cpe:2.3:a:microsoft:cm1_nettle_3.7.3-1:*:*:*:*:*:*:*:*">cm1 nettle 3.7.3-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19015-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_nettle_3.7.3-1:*:*:*:*:*:*:*:*">cbl2 nettle 3.7.3-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19016-16820"
      CPE="cpe:2.3:a:microsoft:cm1_ruby_2.6.7-2:*:*:*:*:*:*:*:*">cm1 ruby 2.6.7-2 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19017-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_ruby_2.7.4-1:*:*:*:*:*:*:*:*">cbl2 ruby 2.7.4-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19473-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_sqlite_3.36.0-3:*:*:*:*:*:*:*:*">cbl2 sqlite 3.36.0-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19474-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_squashfs-tools_4.5.1-1:*:*:*:*:*:*:*:*">cbl2 squashfs-tools 4.5.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19480-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_fetchmail_6.4.22-1:*:*:*:*:*:*:*:*">cbl2 fetchmail 6.4.22-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19645-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libssh_:*:*:*:*:*:*:*:*">cbl2 libssh  on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19648-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_jsoup_:*:*:*:*:*:*:*:*">cbl2 jsoup  on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19662-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-24:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-24 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19666-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ceph_18.2.2-8:*:*:*:*:*:*:*:*">azl3 ceph 18.2.2-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19679-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.23.9-1:*:*:*:*:*:*:*:*">azl3 golang 1.23.9-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19696-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.11.0-3:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.11.0-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19697-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.24.3-1:*:*:*:*:*:*:*:*">azl3 golang 1.24.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19737-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19743-17084"
      CPE="cpe:2.3:a:microsoft:azl3_librsvg2_2.50.3-4:*:*:*:*:*:*:*:*">azl3 librsvg2 2.50.3-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="9312">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9318">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9344">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
  </prod:ProductTree>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup.Due to errors in the logic the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*which could lead to libcurl reusing wrong connections.File paths are or can be case sensitive on many systems but not all and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22924</vuln:CVE>
    <vuln:CWE
      ID="CWE-706">Use of Incorrectly-Resolved Name or Reference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.76.0-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>curl supports the `-t` command line option known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22925</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.76.0-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>Node.js before 16.6.0 14.17.4 and 12.22.4 is vulnerable to Remote Code Execution XSS Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22931</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.17.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.1.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.2.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T14:59:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added nodejs to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter no error was returned and connections to servers with an expired certificate would have been accepted.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22939</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.17.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added nodejs to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet which (in some situations) allows attackers to bypass access control that is based on IP addresses because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-29923</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19007-16820</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19007-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.16.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19007-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2026-02-18T14:02:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers and thus a return value may contain an unsafe injection (e.g. XSS) that does not conform to the RFC1035 format.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-33195</vuln:CVE>
    <vuln:CWE
      ID="CWE-74">Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>17485-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:53:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5 a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-33196</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>17485-17084</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19679-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:39:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>In Go before 1.15.13 and 1.16.x before 1.16.5 there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-33198</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:17:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>Denial of service due to integer overflow in loop counter</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34334</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition (&amp;#39;Infinite Loop&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>Denial of service due to FPE in Exiv2::Internal::resolveLens0xffff</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34335</vuln:CVE>
    <vuln:CWE
      ID="CWE-369">Divide By Zero</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add() hci_sock_blacklist_del() hci_get_conn_info() hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3573</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3580</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19014-16820</vuln:ProductID>
        <vuln:ProductID>19015-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19014-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19015-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19014-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19015-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19014-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19015-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19014-16820</vuln:ProductID>
        <vuln:ProductID>19015-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.7.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19014-16820</vuln:ProductID>
        <vuln:ProductID>19015-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added nettle to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36221</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19007-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19007-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.16.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19007-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g. is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36690</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19473-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19473-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19473-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19473-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19473-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.36.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19473-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-02-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3679</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition ('Infinite Loop')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked which can lead to out-of-bounds access to the UASDevice-&gt;data3 and UASDevice-&gt;status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3713</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19003-16820</vuln:ProductID>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19003-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19003-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19003-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19003-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.2.0-36</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19003-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.2.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>Null pointer dereference in Exiv2::Internal::resolveLens0x319</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37615</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>Out-of-bounds read in Exiv2::Jp2Image::printStructure</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37618</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>Out-of-bounds read in Exiv2::Jp2Image::encodeJp2Header</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37619</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>Out-of-bounds read in XmpTextValue::read()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37620</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Denial of service due to infinite loop in JpegBase::printStructure (#1)</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37622</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition (&amp;#39;Infinite Loop&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Denial of service due to infinite loop in JpegBase::printStructure (#2)</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37623</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition (&amp;#39;Infinite Loop&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37750</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17015-16820</vuln:ProductID>
        <vuln:ProductID>18983-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17015-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18983-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17015-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18983-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17015-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18983-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17015-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.18.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17015-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18983-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.19.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18983-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-10-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added krb5 to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8 there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38166</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file associated with the -E option is untrusted data.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38185</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19011-16820</vuln:ProductID>
        <vuln:ProductID>19012-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19011-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19012-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19011-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19012-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19011-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19012-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19011-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.13-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19011-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19012-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.13-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19012-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added cpio to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page leading to a missing guest protection page fault.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38198</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38199</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38201</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38202</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="60">
    <vuln:Title>drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e. the real IOMEM pointer).</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38205</vuln:CVE>
    <vuln:CWE
      ID="CWE-824">Access of Uninitialized Pointer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="61">
    <vuln:Title>The mac80211 subsystem in the Linux kernel before 5.12.13 when a device supporting only 5 GHz is used allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38206</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="63">
    <vuln:Title>net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38208</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="64">
    <vuln:Title>net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX NF_SYSCTL_CT_EXPECT_MAX and NF_SYSCTL_CT_BUCKETS sysctls.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38209</vuln:CVE>
    <vuln:CWE
      ID="CWE-203">Observable Discrepancy</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="67">
    <vuln:Title>Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-39272</vuln:CVE>
    <vuln:CWE
      ID="CWE-319">Cleartext Transmission of Sensitive Information</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19480-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19480-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19480-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19480-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19480-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.4.22-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19480-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="68">
    <vuln:Title>gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete and should only be used for development and testing purposes.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-40145</vuln:CVE>
    <vuln:CWE
      ID="CWE-415">Double Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18958-16820</vuln:ProductID>
        <vuln:ProductID>18960-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18958-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18960-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18958-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18960-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18958-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18960-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18958-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.3.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18958-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18960-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.3.0-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18960-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-12-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added gd to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="69">
    <vuln:Title>squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory and thus allows writing to locations outside of the destination.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-40153</vuln:CVE>
    <vuln:CWE
      ID="CWE-22">Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19474-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19474-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19474-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>8.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19474-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19474-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.5.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19474-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3634</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19645-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19645-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19645-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19645-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19645-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19645-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>An issue was discovered in Mbed TLS before 2.24.0. The verification of X.509 certificates when matching the expected common name (the cn argument of mbedtls_x509_crt_verify) with the actual certificate name is mishandled: when the subjecAltName extension is present, the expected name is compared to any name in that extension regardless of its type. This means that an attacker could impersonate a 4-byte or 16-byte domain by getting a certificate for the corresponding IPv4 or IPv6 address (this would require the attacker to control that IP address, though).</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-36477</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>17459-17084</vuln:ProductID>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T03:04:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:03:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-36475</vuln:CVE>
    <vuln:CWE
      ID="CWE-131">Incorrect Calculation of Buffer Size</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>17459-17084</vuln:ProductID>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T03:05:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:06:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>An issue was discovered in Mbed TLS before 2.24.0 (and before 2.16.8 LTS and before 2.7.17 LTS). There is missing zeroization of plaintext buffers in mbedtls_ssl_read to erase unused application data from memory.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-36476</vuln:CVE>
    <vuln:CWE
      ID="CWE-212">Improper Removal of Sensitive Information Before Storage or Transfer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>17459-17084</vuln:ProductID>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T02:31:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:38:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>When curl is instructed to download content using the metalink feature thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22922</vuln:CVE>
    <vuln:CWE
      ID="CWE-755">Improper Handling of Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.76.0-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>When curl is instructed to get content using the metalink feature and a user name and password are used to download the metalink XML file those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22923</vuln:CVE>
    <vuln:CWE
      ID="CWE-319">Cleartext Transmission of Sensitive Information</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19008-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.76.0-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19008-16820</vuln:ProductID>
        <vuln:ProductID>19009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`) a malicious user can create a file name with the same name as the app wants to use by name and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22926</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19010-16820</vuln:ProductID>
        <vuln:ProductID>18989-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19010-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18989-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19010-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18989-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19010-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18989-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19010-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.76.0-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19010-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18989-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.82.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18989-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>Node.js before 16.6.1 14.17.5 and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption to change process behavior.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-22940</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19004-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18775-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.17.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19004-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18775-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added nodejs to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>An issue was discovered in Ruby through 2.6.7 2.7.x through 2.7.3 and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command aka a "StartTLS stripping attack."</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-32066</vuln:CVE>
    <vuln:CWE
      ID="CWE-755">Improper Handling of Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19016-16820</vuln:ProductID>
        <vuln:ProductID>19017-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19016-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19017-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19016-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19017-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19016-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19017-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19016-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.6.7-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19016-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19017-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.7.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19017-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added ruby to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>Denial of service due to assertion failure in crwimage_int.cpp</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-32815</vuln:CVE>
    <vuln:CWE
      ID="CWE-617">Reachable Assertion</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>Request splitting via HTTP/2 method injection and mod_proxy</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="apache"
        Type="CNA"
        Ordinal="30">apache</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-33193</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19005-16820</vuln:ProductID>
        <vuln:ProductID>17030-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19005-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17030-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19005-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17030-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19005-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17030-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19005-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.46-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19005-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17030-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.52-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17030-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added httpd to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>In Go before 1.15.13 and 1.16.x before 1.16.5 some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-33197</vuln:CVE>
    <vuln:CWE
      ID="CWE-862">Missing Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19679-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17021-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19696-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17021-17084</vuln:ProductID>
        <vuln:ProductID>19696-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-19T01:36:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>In the Linux kernel through 5.13.7 an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34556</vuln:CVE>
    <vuln:CWE
      ID="CWE-203">Observable Discrepancy</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>In the Linux kernel through 5.13.7 an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-35477</vuln:CVE>
    <vuln:CWE
      ID="CWE-203">Observable Discrepancy</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection the fingerprint of the server is neither checked nor displayed. As a result a user connects to the server without the ability to verify its authenticity.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36370</vuln:CVE>
    <vuln:CWE
      ID="CWE-287">Improper Authentication</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19000-16820</vuln:ProductID>
        <vuln:ProductID>19001-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19000-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19001-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19000-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19001-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19000-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19001-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19000-16820</vuln:ProductID>
        <vuln:ProductID>19001-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.8.27-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19000-16820</vuln:ProductID>
        <vuln:ProductID>19001-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-09-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mc to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3655</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3682</vuln:CVE>
    <vuln:CWE
      ID="CWE-763">Release of Invalid Pointer or Reference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19013-16820</vuln:ProductID>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19013-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19013-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.5</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19013-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.5</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18757-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19013-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.2.0-35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19013-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.2.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18757-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Read buffer overruns processing ASN.1 strings</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="openssl"
        Type="CNA"
        Ordinal="30">openssl</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3712</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18903-16820</vuln:ProductID>
        <vuln:ProductID>18982-16823</vuln:ProductID>
        <vuln:ProductID>18131-17084</vuln:ProductID>
        <vuln:ProductID>17859-17084</vuln:ProductID>
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18903-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18982-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18131-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17859-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18903-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18982-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18131-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17859-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18903-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18982-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18131-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17859-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>7.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18903-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18903-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18982-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.1k-11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18982-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18131-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20240223gitedc6681206c1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18131-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17859-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20240223gitedc6681206c1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17859-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.3</cvrf:Number>
        <cvrf:Date>2026-02-18T14:40:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-10-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added openssl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>Null pointer dereference in Exiv2::Internal::resolveLens0x8ff</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37616</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>Denial of service due to infinite loop in Image::printIFDStructure</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37621</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition (&amp;#39;Infinite Loop&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17009-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17009-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38115</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18958-16820</vuln:ProductID>
        <vuln:ProductID>18959-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18958-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18959-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18958-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18959-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18958-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18959-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18958-16820</vuln:ProductID>
        <vuln:ProductID>18959-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.3.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18958-16820</vuln:ProductID>
        <vuln:ProductID>18959-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-12-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added gd to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>In drivers/char/virtio_console.c in the Linux kernel before 5.13.4 data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38160</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>An issue was discovered in the nalgebra crate before 0.27.1 for Rust. It allows out-of-bounds memory access because it does not ensure that the number of elements is equal to the product of the row count and column count.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38190</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19743-17084</vuln:ProductID>
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19743-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19743-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19743-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18817-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19743-17084</vuln:ProductID>
        <vuln:ProductID>18817-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.58.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19743-17084</vuln:ProductID>
        <vuln:ProductID>18817-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:54:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>arch/powerpc/perf/core-book3s.c in the Linux kernel before 5.12.13 on systems with perf_event_paranoid=-1 and no specific PMU driver support registered allows local users to cause a denial of service (perf_instruction_pointer NULL pointer dereference and OOPS) via a "perf record" command.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38200</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="58">
    <vuln:Title>btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38203</vuln:CVE>
    <vuln:CWE
      ID="CWE-667">Improper Locking</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="59">
    <vuln:Title>drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38204</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="62">
    <vuln:Title>drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38207</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16919-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16920-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16919-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.78.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16920-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="65">
    <vuln:Title>Qt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke).</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38593</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16965-16820</vuln:ProductID>
        <vuln:ProductID>18992-16823</vuln:ProductID>
        <vuln:ProductID>16857-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16965-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18992-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16965-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18992-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16965-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18992-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16965-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16965-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18992-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:ProductID>17384-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18992-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:ProductID>17384-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16857-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16857-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-10-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added qt5-qtsvg to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-02-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added qt5-qtbase to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T14:24:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="66">
    <vuln:Title>In librt in the GNU C Library (aka glibc) through 2.34 sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38604</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19006-16820</vuln:ProductID>
        <vuln:ProductID>18810-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19006-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18810-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19006-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18810-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19006-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18810-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19006-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.28-20</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19006-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18810-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.35-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18810-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added glibc to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="70">
    <vuln:Title>git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character which may result in unexpected cross-protocol requests as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-40330</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18999-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18999-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18999-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18999-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18999-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.23.4-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18999-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-09-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>An issue has been fixed in Qt versions 5.14.0 where QPluginLoader attempts to load plugins relative to the working directory allowing attackers to execute arbitrary code via crafted files.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-24742</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>16857-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16857-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16857-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Crafted input may cause the jsoup HTML and XML parser to get stuck, timeout, or throw unchecked exceptions</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37714</vuln:CVE>
    <vuln:CWE
      ID="CWE-835">Loop with Unreachable Exit Condition (&amp;#39;Infinite Loop&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19648-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19648-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19648-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19648-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19648-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19648-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="TianoCore"
        Type="CNA"
        Ordinal="30">TianoCore</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-28216</vuln:CVE>
    <vuln:CWE
      ID="CWE-587">Assignment of a Fixed Address to a Pointer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:50:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T04:00:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-36478</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>17459-17084</vuln:ProductID>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17459-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:58:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T05:05:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-38191</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization (&amp;#39;Race Condition&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T05:12:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:11:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-35942</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-35942</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>9.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>glibc</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.28-19</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>glibc</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-devel-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-lang-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-i18n-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-iconv-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-tools-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-nscd-2.28-19.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.28-19</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>glibc</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-devel-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-lang-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-i18n-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-iconv-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-tools-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>glibc-nscd-2.28-19.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.28-19</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-37600</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-37600</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>util-linux</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.32.1-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>util-linux</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-2.32.1-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-lang-2.32.1-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-devel-2.32.1-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-libs-2.32.1-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-debuginfo-2.32.1-5.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.32.1-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>util-linux</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-2.32.1-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-lang-2.32.1-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-devel-2.32.1-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-libs-2.32.1-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>util-linux-debuginfo-2.32.1-5.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.32.1-5</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>Azure CycleCloud Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Azure"
        Type="Tag"
        Ordinal="20">Azure</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-33762</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11904</vuln:ProductID>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11904</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11904</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11904</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/azure/cyclecloud/packages?view=cyclecloud-8</vuln:URL>
        <vuln:ProductID>11904</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.9.19</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/azure/cyclecloud/packages?view=cyclecloud-8</vuln:URL>
        <vuln:ProductID>11905</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Terry Zhang @pnig0s</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the update for Microsoft Dynamics 365 (on-premises) version 9.1 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update for Microsoft Dynamics 365 (on-premises) version 9.1 is not immediately available.  The update will be released as soon as possible, and when it is available, customers will be notified via a revision to this CVE information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dynamics"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34524</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11921</vuln:ProductID>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>4618809</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103378</vuln:URL>
        <vuln:ProductID>11921</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.1.3.11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>4618795</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103377</vuln:URL>
        <vuln:ProductID>11664</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.31.7</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.linkedin.com/in/fabian-schmidt-42-"&gt;Fabian Schmidt&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;The following revisions have been made: 1) In the Security Updates table, updated the Download and Release Note links for Dynamics 365 (on-premises) version 9.0. This is an informational change only. 2) Added an FAQ regarding the availability of the security update for Microsoft Dynamics 365 (on-premises) version 9.1.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2021-08-11T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Dynamics 365 (on-premises) version 9.1. Customers running affected Dynamics software should install the update for their product to be protected from this vulnerability. Customers running other versions of Microsoft Dynamics 365 (on-premises) do not need to take any action. See the &lt;a href="https://support.microsoft.com/en-us/topic/service-update-1-3-for-microsoft-dynamics-crm-on-premises-9-1-4f9cb846-6c00-4fc1-9c13-bc0bbe733009"&gt;KB4618809&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>Microsoft Office Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS score, user interaction is required to exploit this vulnerability. What kind of user interaction is required?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A user needs to be tricked into running malicious files.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34478</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Thomas Bouzerar (@MajorTomSec) from Synacktiv (@Synacktiv) working with Trend Micro Zero Day Initiative</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;To comprehensively address CVE-2021-24478, Microsoft has released an updated Build for Microsoft 365 Apps installed on Windows 7 and for the Semi-Annual Enterprise Channel: Version 2002. The new Build number is 12527.22021. See &lt;a href="https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates"&gt;Release notes for Microsoft Office security updates&lt;/a&gt; for more information.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2021-08-25T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added acknowledgements. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>Scripting Engine Memory Corruption Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS, User Interaction is Required. What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted file.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&lt;/li&gt;
&lt;li&gt;In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Scripting Engine"
        Type="Tag"
        Ordinal="20">Microsoft Scripting Engine</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34480</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005036</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005036</vuln:URL>
        <vuln:Supercedence>5004233</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>IE Cumulative</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Ivan Fratric of &lt;a href="https://www.google.com/"&gt;Google Project Zero&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>Windows MSHTML Platform Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS, User Interaction is Required. What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted file.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&lt;/li&gt;
&lt;li&gt;In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows MSHTML Platform"
        Type="Tag"
        Ordinal="20">Windows MSHTML Platform</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34534</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/guhe120"&gt;Yuki Chen&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>Windows Event Tracing Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Event Tracing"
        Type="Tag"
        Ordinal="20">Windows Event Tracing</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34486</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Yong Chuan Koh (&lt;a href="https://twitter.com/yongchuank"&gt;@yongchuank&lt;/a&gt;)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-12T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated information to include CVSS scores. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>Storage Spaces Controller Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Storage Spaces Controller"
        Type="Tag"
        Ordinal="20">Windows Storage Spaces Controller</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34536</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>nghiadt12 (@nghiadt1098) from Viettel Cyber Security</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Le Huu Quang Linh &lt;a href="https://twitter.com/linhlhq"&gt;(@linhlhq)&lt;/a&gt; from Vietnam National Cyber ​​Security Center (NCSC Vietnam)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>kpc working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>Windows Event Tracing Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Event Tracing"
        Type="Tag"
        Ordinal="20">Windows Event Tracing</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34487</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Jacob Lewellen of Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>Windows Bluetooth Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authorized attacker could exploit the Windows Bluetooth driver vulnerability by programatically running certain functions that could lead to elevation of privilege on the Bluetooth component.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Bluetooth Service"
        Type="Tag"
        Ordinal="20">Windows Bluetooth Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34537</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>ziming zhang of Ant Security Light-Year Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>.NET Core and Visual Studio Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title=".NET Core &amp; Visual Studio"
        Type="Tag"
        Ordinal="20">.NET Core &amp; Visual Studio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26423</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:ProductID>11720</vuln:ProductID>
        <vuln:ProductID>11785</vuln:ProductID>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:ProductID>11900</vuln:ProductID>
        <vuln:ProductID>11901</vuln:ProductID>
        <vuln:ProductID>11565</vuln:ProductID>
        <vuln:ProductID>11730</vuln:ProductID>
        <vuln:ProductID>11761</vuln:ProductID>
        <vuln:ProductID>11864</vuln:ProductID>
        <vuln:ProductID>11865</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11565</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11730</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11864</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11865</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11565</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11730</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11864</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11865</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11565</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11730</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11864</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11865</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>http://aka.ms/vs/15/release/latest</vuln:URL>
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.9.38</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.4</vuln:URL>
        <vuln:ProductID>11720</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.4.25</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.7</vuln:URL>
        <vuln:ProductID>11785</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.7.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.9</vuln:URL>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.9.10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>http://aka.ms/vs/16/release/latest</vuln:URL>
        <vuln:ProductID>11900</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.10.5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://visualstudio.microsoft.com/vs/mac/</vuln:URL>
        <vuln:ProductID>11901</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.10.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet-core/2.1</vuln:URL>
        <vuln:ProductID>11565</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.30</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet-core/3.1</vuln:URL>
        <vuln:ProductID>11730</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.1.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet/5.0</vuln:URL>
        <vuln:ProductID>11761</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.0.9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://github.com/PowerShell/PowerShell#get-powershell</vuln:URL>
        <vuln:ProductID>11864</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.1.4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://github.com/PowerShell/PowerShell#get-powershell</vuln:URL>
        <vuln:ProductID>11865</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.0.7</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/ulldma"&gt;Peter Stöckli&lt;/a&gt; with &lt;a href="https://www.ergon.ch"&gt;Ergon Informatik&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/ulldma"&gt;Peter Stöckli&lt;/a&gt; with &lt;a href="https://www.ergon.ch"&gt;Ergon Informatik&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates table, added links to the Release Notes. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2021-08-12T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Revised the Security Updates table to include PowerShell 7.0 and PowerShell 7.1 because these versions of PowerShell 7 incorporate the versions of .NET Core that are affected by this vulnerability. See &lt;a href="https://github.com/PowerShell/Announcements/issues/25"&gt;https://github.com/PowerShell/Announcements/issues/25&lt;/a&gt; for more information.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;To comprehensively address this vulnerability, Microsoft has released .NET Core 2.1 Build Number 2.1.30. Customers who have downloaded Build 2.1.29 should download and install Build 2.1.30 to be fully protected from this vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>Windows TCP/IP Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability is remotely triggerable by a malicious Hyper-V guest that sends an ipv6 ping to the Hyper-V host. An attacker could send a specially crafted TCPIP packet to its host utilizing the TCPIP Protocol Stack (tcpip.sys) to process packets.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is this attack specific to Hyper-V or applicable to all hypervisor technologies?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack is specific to Hyper-V. Systems that do not have Hyper-V installed are not at risk.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Will disabling IPV6 mitigate this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. Disabling IPV6 will block the threat vector. See &lt;a href="https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-ipv6-in-windows"&gt;Guidance for configuring IPv6 in Windows for advanced users&lt;/a&gt; for instructions for disabling IPV6.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows TCP/IP"
        Type="Tag"
        Ordinal="20">Windows TCP/IP</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26424</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Quan Luo from Codesafe Team of Legendsec at Qi'anxin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-17T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated FAQ information. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>Windows Event Tracing Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Event Tracing"
        Type="Tag"
        Ordinal="20">Windows Event Tracing</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26425</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri (halov)  working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;
</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>Windows User Account Profile Picture Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows User Profile Service"
        Type="Tag"
        Ordinal="20">Windows User Profile Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26426</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri (halov) working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>Azure Sphere Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What version of Azure Sphere has the update that protects from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All versions of Azure Sphere that are 21.07 and higher are protected from this vulnerability.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I ensure my Azure Sphere device has the update?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If your device is new or has not been connected to the internet for a while, connect the device to a secure, private local network with internet access and allow the device to automatically update itself. If the device is already online, verify that the operating system version 21.07 has been installed using the Azure Sphere CLI command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;azsphere device show-os-version &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;If the device is connected to the internet and does not yet have the latest update, check the update status with the following Azure Sphere CLI command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;azsphere device show-deployment-status &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Azure Sphere is running on IoT devices in my environment. How do I know if any of those devices are affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An IoT device that is running Azure Sphere and is connected to a network is automatically updated every day. This vulnerability has already been addressed so the devices are protected from this vulnerability. More information on Azure Sphere’s CVE principles can be found on https://docs.microsoft.com/en-us/azure-sphere/deployment/azure-sphere-cves&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Sphere"
        Type="Tag"
        Ordinal="20">Azure Sphere</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26428</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11796</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.07</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Claudio Bozzato with &lt;a href="https://talosintelligence.com/"&gt;Cisco Talos&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>Azure Sphere Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What version of Azure Sphere has the update that protects from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All versions of Azure Sphere that are 21.07 and higher are protected from this vulnerability.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I ensure my Azure Sphere device has the update?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If your device is new or has not been connected to the internet for a while, connect the device to a secure, private local network with internet access and allow the device to automatically update itself. If the device is already online, verify that the operating system version 21.07 has been installed using the Azure Sphere CLI command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;azsphere device show-os-version &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;If the device is connected to the internet and does not yet have the latest update, check the update status with the following Azure Sphere CLI command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;azsphere device show-deployment-status &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Azure Sphere is running on IoT devices in my environment. How do I know if any of those devices are affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An IoT device that is running Azure Sphere and is connected to a network is automatically updated every day. This vulnerability has already been addressed so the devices are protected from this vulnerability. More information on Azure Sphere’s CVE principles can be found on https://docs.microsoft.com/en-us/azure-sphere/deployment/azure-sphere-cves&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Sphere"
        Type="Tag"
        Ordinal="20">Azure Sphere</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26429</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11796</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.07</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Bryce Bearchell, Daniel Reyes of Cromulence, LLC</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-11T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an acknowledgement. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2021-08-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>Azure Sphere Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What version of Azure Sphere has the update that protects from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;All versions of Azure Sphere that are 21.07 and higher are protected from this vulnerability.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I ensure my Azure Sphere device has the update?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If your device is new or has not been connected to the internet for a while, connect the device to a secure, private local network with internet access and allow the device to automatically update itself. If the device is already online, verify that the operating system version 21.07 has been installed using the Azure Sphere CLI command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;azsphere device show-os-version &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;If the device is connected to the internet and does not yet have the latest update, check the update status with the following Azure Sphere CLI command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;azsphere device show-deployment-status &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Azure Sphere is running on IoT devices in my environment. How do I know if any of those devices are affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An IoT device that is running Azure Sphere and is connected to a network is automatically updated every day. This vulnerability has already been addressed so the devices are protected from this vulnerability. More information on Azure Sphere’s CVE principles can be found on https://docs.microsoft.com/en-us/azure-sphere/deployment/azure-sphere-cves&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Sphere"
        Type="Tag"
        Ordinal="20">Azure Sphere</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26430</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.0</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11796</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11796</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.07</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Claudio Bozzato with &lt;a href="https://talosintelligence.com/"&gt;Cisco Talos&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Windows Print Spooler Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36936</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36937</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>HAO LI of VenusTech ADLab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>crashman of codemize security research lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Windows Cryptographic Primitives Library Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Cryptographic Services"
        Type="Tag"
        Ordinal="20">Windows Cryptographic Services</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36938</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely;Older Software Release:Exploitation Unlikely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Windows LSA Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate against another server using NTLM. This security update blocks the affected API calls &lt;a href="https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-openencryptedfilerawa"&gt;OpenEncryptedFileRawA&lt;/a&gt; and &lt;a href="https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-openencryptedfileraww"&gt;OpenEncryptedFileRawW&lt;/a&gt; through LSARPC interface.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is there more information available on how to protect my system?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. Please see &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV210003"&gt;ADV210003 Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Are there further actions I need to take to protect my system after I have applied the security update?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. Please see &lt;a href="https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429"&gt;KB5005413&lt;/a&gt; for more information on the steps that you need to take to protect your system. Please note that the combined CVSS score would be 9.8 when this vulnerability is chained with the noted NTLM Relay Attacks on Active Directory Certificate Services (AD CS).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Should I prioritize updating domain controllers when I apply the security updates released on August 10, 2021?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. This vulnerability affects all servers but domain controllers should be prioritized in terms of applying security updates.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How will installing the updates that address this CVE impact my environment?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The EFS API &lt;a href="https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-openencryptedfilerawa"&gt;OpenEncryptedFileRaw(A/W)&lt;/a&gt;, often used in backup software, continues to work in all versions of Windows (local and remote), except when backing up to or from a system running Windows Server 2008 SP2. OpenEncryptedFileRaw will no longer work on Windows Server 2008 SP2.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: If you are unable to use backup software on Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1 and later, after installing the updates that address this CVE, contact the manufacturer of your backup software for updates and support.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows NTLM"
        Type="Tag"
        Ordinal="20">Windows NTLM</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36942</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>Microsoft SharePoint Server Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36940</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002002</vuln:Description>
        <vuln:URL>https://www.microsoft.com/downloads/details.aspx?familyid=68e05993-b360-416b-bcb7-5999bd6e054c</vuln:URL>
        <vuln:Supercedence>5001976</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5200.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>4011600</vuln:Description>
        <vuln:URL>https://www.microsoft.com/downloads/details.aspx?familyid=ffe86fcd-cc12-4bee-9d97-a48153597552</vuln:URL>
        <vuln:Supercedence>3178638</vuln:Supercedence>
        <vuln:ProductID>11099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5371.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002000</vuln:Description>
        <vuln:URL>https://www.microsoft.com/downloads/details.aspx?familyid=08c64f69-8b76-4c7e-a512-71513f46f7b4</vuln:URL>
        <vuln:Supercedence>5001975</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10377.20000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.aswsec.com"&gt;Adam Willard&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Microsoft Word Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS score, user interaction is required to exploit this vulnerability. What kind of user interaction is required?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A user needs to be tricked into running malicious files.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Word"
        Type="Tag"
        Ordinal="20">Microsoft Office Word</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36941</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.52.21080801</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Lev Aronsky with &lt;a href="https://alephsecurity.com"&gt;Aleph Research by HCL AppScan&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Vera Mens with &lt;a href="https://alephsecurity.com"&gt;Aleph Security by HCL AppScan&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>Windows 10 Update Assistant Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Update Assistant"
        Type="Tag"
        Ordinal="20">Windows Update Assistant</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36945</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11707</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11707</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11707</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11707</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>4023814</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/software-download/windows10</vuln:URL>
        <vuln:ProductID>11707</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri (halov) working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Microsoft Dynamics Business Central Cross-site Scripting Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Dynamics"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36946</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11603</vuln:ProductID>
        <vuln:ProductID>11746</vuln:ProductID>
        <vuln:ProductID>11750</vuln:ProductID>
        <vuln:ProductID>11916</vuln:ProductID>
        <vuln:ProductID>11917</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11603</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11746</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11750</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11916</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11917</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11603</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11746</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11750</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11916</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11917</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11603</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11746</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11750</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11916</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11917</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005368</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103354</vuln:URL>
        <vuln:ProductID>11603</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>30601</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005369</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103357</vuln:URL>
        <vuln:ProductID>11746</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>47562</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005370</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103358</vuln:URL>
        <vuln:ProductID>11750</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>Application Build 14.27.47563, Platform Build 14.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005374</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103356</vuln:URL>
        <vuln:Supercedence>5004716</vuln:Supercedence>
        <vuln:ProductID>11916</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>Application Build 17.9.28504, Platform Build 17.0.</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005373</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103355</vuln:URL>
        <vuln:Supercedence>5004716</vuln:Supercedence>
        <vuln:ProductID>11917</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>Application Build 16.15.28500, Platform Build 16.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/rskvp93"&gt;rskvp93&lt;/a&gt; with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>Windows Print Spooler Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36947</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>Windows Update Medic Service Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Update"
        Type="Tag"
        Ordinal="20">Windows Update</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36948</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected;Older Software Release:Exploitation Detected;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Threat Intelligence Center (MSTIC)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Security Response Center (MSRC)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What should I do to be protected against this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In addition to applying the updates in this CVE, you will need to disable NTLM as per the guidance as follows:&lt;/p&gt;
&lt;p&gt;For Azure Active Directory Connect, see &lt;a href="https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-prerequisites#harden-your-azure-ad-connect-server"&gt;Prerequisites for Azure AD Connect&lt;/a&gt;
For Azure Active Directory Connect Provisioning Agent, see &lt;a href="https://docs.microsoft.com/en-us/azure/active-directory/cloud-sync/how-to-prerequisites"&gt;Prerequisites for Azure AD Connect cloud sync&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What must an attacker do to exploit this vulnerability&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker must be able to establish Man-in-the-middle between your Azure AD Connect server and a domain controller. The attacker also needs to possess domain user credentials to be able to exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Azure Active Directory Connect"
        Type="Tag"
        Ordinal="20">Microsoft Azure Active Directory Connect</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36949</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11920</vuln:ProductID>
        <vuln:ProductID>11922</vuln:ProductID>
        <vuln:ProductID>11919</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11920</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11922</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11919</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11920</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11922</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11919</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11920</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11922</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11919</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103336</vuln:URL>
        <vuln:ProductID>11920</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.6.11.3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://download.msappproxy.net/Subscription/d3c8b69d-6bf7-42be-a529-3fe9c2e70c90/Connector/provisioningAgentInstaller</vuln:URL>
        <vuln:ProductID>11922</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.582.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=47594</vuln:URL>
        <vuln:ProductID>11919</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.0.8.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Sagi Sheinfeld with &lt;a href="https://www.crowdstrike.com/"&gt;Crowdstrike&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Eyal Karni with &lt;a href="https://www.crowdstrike.com/"&gt;Crowdstrike&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/yaronzi"&gt;Yaron Zinar&lt;/a&gt; with &lt;a href="https://www.crowdstrike.com/"&gt;CrowdStrike&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;The following revisions have been made: 1) In the Security Updates table, added Azure Active Directory Connect Provisioning Agent as it is also affected by this vulnerability 2) Updated FAQs.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Dynamics"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36950</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005239</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=103313</vuln:URL>
        <vuln:ProductID>11664</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.30.2</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>Windows Print Spooler Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;When will Microsoft release a security update for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Update: September 14, 2021 - We have completed the investigation and have released the September 2021 security updates to address this vulnerability. Please see the Security Updates table.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What versions of Windows are affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Update: September 14, 2021 - The September 2021 security updates are now available to address this vulnerability. Please see the Security Updates table for the versions of Windows that are affected.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36958</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005568</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568</vuln:URL>
        <vuln:Supercedence>5005030</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2183</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005568</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005568</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005566</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566</vuln:URL>
        <vuln:Supercedence>5005031</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1801</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005565</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565</vuln:URL>
        <vuln:Supercedence>5005033</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1237</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005565</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005565</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005565</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565</vuln:URL>
        <vuln:Supercedence>5005033</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1237</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005565</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005565</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005565</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565</vuln:URL>
        <vuln:Supercedence>5005033</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1237</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005565</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005565</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005569</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569</vuln:URL>
        <vuln:Supercedence>5005040</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19060</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005573</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573</vuln:URL>
        <vuln:Supercedence>5005043</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4651</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005633</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633</vuln:URL>
        <vuln:Supercedence>5005088</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25712</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005633</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005633</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005615</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25712</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005615</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005615</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005613</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613</vuln:URL>
        <vuln:Supercedence>5005076</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20120</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005613</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005613</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005627</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20120</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005627</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005627</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005613</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5005076</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20120</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005613</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005613</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005606</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606</vuln:URL>
        <vuln:Supercedence>5005090</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21218</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005606</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005606</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005618</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21218</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005618</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005618</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005623</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623</vuln:URL>
        <vuln:Supercedence>5005094</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23462</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005623</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005623</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005607</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23462</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005607</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005607</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/offenseindepth"&gt;Victor Mata&lt;/a&gt; of FusionX, Accenture Security</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-11T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2021-09-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;CVE updated to announce that Microsoft is releasing the September 2021 security updates for all affected versions of Windows to address this vulnerability. Additionally, other information has been updated, including the following: 1) Executive Summary has been updated. 2) Workarounds have been removed as they are no longer applicable. 3) FAQs have been updated to reflect the release of the September 2021 security updates. 4) CVSS Vector String has been updated.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Microsoft Windows Defender Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;References&lt;/th&gt;
&lt;th&gt;Identification&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;First version of the Microsoft Malware Protection Engine with this vulnerability addressed&lt;/td&gt;
&lt;td&gt;Version  1.1.18400.4&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;See &lt;a href="https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus"&gt;Manage Updates Baselines Microsoft Defender Antivirus&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Microsoft Defender is disabled in my environment, why are vulnerability scanners showing that I am vulnerable to this issue?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Vulnerability scanners are looking for specific binaries and version numbers on devices. Microsoft Defender files are still on disk even when disabled. Systems that have disabled Microsoft Defender are not in an exploitable state.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why is no action required to install this update?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Engine. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner.&lt;/p&gt;
&lt;p&gt;For enterprise deployments as well as end users, the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Microsoft Malware Protection Engine are kept up to date automatically. Product documentation also recommends that products are configured for automatic updating.&lt;/p&gt;
&lt;p&gt;Best practices recommend that customers regularly verify whether software distribution, such as the automatic deployment of Microsoft Malware Protection Engine updates and malware definitions, is working as expected in their environment.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How often are the Microsoft Malware Protection Engine and malware definitions updated?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Microsoft typically releases an update for the Microsoft Malware Protection Engine once a month or as needed to protect against new threats. Microsoft also typically updates the malware definitions three times daily and can increase the frequency when needed.&lt;/p&gt;
&lt;p&gt;Depending on which Microsoft antimalware software is used and how it is configured, the software may search for engine and definition updates every day when connected to the Internet, up to multiple times daily. Customers can also choose to manually check for updates at any time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the Microsoft Malware Protection Engine?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Malware Protection Engine, mpengine.dll, provides the scanning, detection, and cleaning capabilities for Microsoft antivirus and antispyware software.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Windows Defender uses the Microsoft Malware Protection Engine. On which products is Defender installed and active by default?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Defender runs on all supported version of Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Are there other products that use the Microsoft Malware Protection Engine?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, Microsoft System Center Endpoint Protection, Microsoft System Center 2012 R2 Endpoint Protection, Microsoft System Center 2012 Endpoint Protection and Microsoft Security Essentials.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Does this update contain any additional security-related changes to functionality?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes.  In addition to the changes that are listed for this vulnerability, this update includes defense-in-depth updates to help improve security-related features.&lt;/p&gt;
&lt;h2&gt;Suggested Actions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Verify that the update is installed&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Customers should verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded and installed for their Microsoft antimalware products.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Open the Windows Security program. For example, type Security in the Search bar, and select the Windows Security program.&lt;/li&gt;
&lt;li&gt;In the navigation pane, select Virus &amp;amp; threat protection.&lt;/li&gt;
&lt;li&gt;Under Virus &amp;amp; threat protection updates in the main window, select Check for updates&lt;/li&gt;
&lt;li&gt;Select Check for updates again.&lt;/li&gt;
&lt;li&gt;In the navigation pane, select Settings, and then select About.&lt;/li&gt;
&lt;li&gt;Examine the Engine Version number. The update was successfully installed if the Malware Protection Engine version number or the signature package version number matches or exceeds the version number that you are trying to verify as installed.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;For affected software, verify that the Microsoft Malware Protection Engine version is 1.1.18400.4 or later.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;If necessary, install the update&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Administrators of enterprise antimalware deployments should ensure that their update management software is configured to automatically approve and distribute engine updates and new malware definitions. Enterprise administrators should also verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded, approved and deployed in their environment.&lt;/p&gt;
&lt;p&gt;For end-users, the affected software provides built-in mechanisms for the automatic detection and deployment of this update. For these customers, the update will be applied within 48 hours of its availability. The exact time frame depends on the software used, Internet connection, and infrastructure configuration.&lt;/p&gt;
&lt;p&gt;End users that do not wish to wait can manually update their antimalware software.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Defender"
        Type="Tag"
        Ordinal="20">Windows Defender</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34471</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11902</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11902</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11902</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11902</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri (halov) working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>Windows Graphics Component Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Graphics Component"
        Type="Tag"
        Ordinal="20">Microsoft Graphics Component</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34530</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Zhihua Yao of KunLun Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>ASP.NET Core and Visual Studio Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is data inside the targeted website like IDs, tokens, nonces, and other sensitive information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="ASP.NET Core &amp; Visual Studio"
        Type="Tag"
        Ordinal="20">ASP.NET Core &amp; Visual Studio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34532</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11564</vuln:ProductID>
        <vuln:ProductID>11728</vuln:ProductID>
        <vuln:ProductID>11846</vuln:ProductID>
        <vuln:ProductID>11720</vuln:ProductID>
        <vuln:ProductID>11785</vuln:ProductID>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:ProductID>11900</vuln:ProductID>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11564</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11728</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11846</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11564</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11728</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11846</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11564</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11728</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11846</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11901</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet-core/2.1</vuln:URL>
        <vuln:ProductID>11564</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.29</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet-core/3.1</vuln:URL>
        <vuln:ProductID>11728</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.1.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet/5.0</vuln:URL>
        <vuln:ProductID>11846</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.0.9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.4</vuln:URL>
        <vuln:ProductID>11720</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.4.25</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.7</vuln:URL>
        <vuln:ProductID>11785</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.7.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.9</vuln:URL>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.9.10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>http://aka.ms/vs/16/release/latest</vuln:URL>
        <vuln:ProductID>11900</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.10.5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://visualstudio.microsoft.com/vs/mac/</vuln:URL>
        <vuln:ProductID>11901</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.10.7</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates table, added links to the Release Notes. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Windows Graphics Component Font Parsing Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Graphics Component"
        Type="Tag"
        Ordinal="20">Microsoft Graphics Component</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34533</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>HAO LI of VenusTech ADLab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>Windows Print Spooler Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Print Spooler Components"
        Type="Tag"
        Ordinal="20">Windows Print Spooler Components</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34483</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Thibault van Geluwe</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>[Victor Mata](https://twitter.com/offenseindepth) of FusionX, Accenture Security</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>Windows User Profile Service Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows User Profile Service"
        Type="Tag"
        Ordinal="20">Windows User Profile Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34484</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090</vuln:URL>
        <vuln:Supercedence>5004305</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005090</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005090</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21192</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005095</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005095</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri (halov) working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>.NET Core and Visual Studio Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of a specific dump file.  The attacker needs to have local access to the target system and the dump file needs to be created in a specific way by a target on that same system.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title=".NET Core &amp; Visual Studio"
        Type="Tag"
        Ordinal="20">.NET Core &amp; Visual Studio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34485</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:ProductID>11720</vuln:ProductID>
        <vuln:ProductID>11785</vuln:ProductID>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:ProductID>11900</vuln:ProductID>
        <vuln:ProductID>11925</vuln:ProductID>
        <vuln:ProductID>11745</vuln:ProductID>
        <vuln:ProductID>11565</vuln:ProductID>
        <vuln:ProductID>11730</vuln:ProductID>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11925</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11745</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11565</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11730</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11925</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11745</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11565</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11730</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11720</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11785</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11872</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11900</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11925</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11745</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11565</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11730</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.0</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11761</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>http://aka.ms/vs/15/release/latest</vuln:URL>
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.9.38</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.4</vuln:URL>
        <vuln:ProductID>11720</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.4.25</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.7</vuln:URL>
        <vuln:ProductID>11785</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.7.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.9</vuln:URL>
        <vuln:ProductID>11872</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.9.10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>http://aka.ms/vs/16/release/latest</vuln:URL>
        <vuln:ProductID>11900</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.10.5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://github.com/PowerShell/PowerShell#get-powershell</vuln:URL>
        <vuln:ProductID>11925</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.1.4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://github.com/PowerShell/PowerShell#get-powershell</vuln:URL>
        <vuln:ProductID>11745</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.0.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet-core/2.1</vuln:URL>
        <vuln:ProductID>11565</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.30</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet-core/3.1</vuln:URL>
        <vuln:ProductID>11730</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.1.18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/download/dotnet/5.0</vuln:URL>
        <vuln:ProductID>11761</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.0.9</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates table, added links to the Release Notes. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2021-08-12T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Revised the Security Updates table to include PowerShell 7.0 and PowerShell 7.1 because these versions of PowerShell 7 incorporate the versions of .NET Core that are affected by this vulnerability. See &lt;a href="https://github.com/PowerShell/Announcements/issues/24"&gt;https://github.com/PowerShell/Announcements/issues/24&lt;/a&gt; for more information.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;To comprehensively address this vulnerability, Microsoft has released .NET Core 2.1 Build Number 2.1.30. Customers who have downloaded Build 2.1.29 should download and install Build 2.1.30 to be fully protected from this vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>Remote Desktop Client Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.&lt;/p&gt;
&lt;p&gt;In the case of Hyper-V, a malicious program running in a guest VM could trigger guest-to-host RCE by exploiting this vulnerability in the Hyper-V Viewer when a victim running on the host connects to the attacking Hyper-V guest.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Remote Desktop Client"
        Type="Tag"
        Ordinal="20">Remote Desktop Client</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-34535</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/clients/windowsdesktop-whatsnew</vuln:URL>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088</vuln:URL>
        <vuln:Supercedence>5004289</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005088</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005088</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25685</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005089</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005089</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Malcolm Stagg</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated links to security updates.  This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>Windows Recovery Environment Agent Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Update Assistant"
        Type="Tag"
        Ordinal="20">Windows Update Assistant</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26431</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Abdelhamid Naceri (halov) working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What system configurations would expose this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Servers that have &lt;a href="https://docs.microsoft.com/en-us/windows-server/storage/nfs/deploy-nfs#install-network-file-system-on-the-server-with-windows-powershell"&gt;installed the Network File System&lt;/a&gt; are exposed to this vulnerability in &lt;code&gt;rpcxdr.sys&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;An attacker would require read or write permission to any file on an NFS share on the victim system. If NFS is configured to allow anonymous access, then the victim system would be vulnerable to unauthenticated attackers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Does this security update apply to non-server systems?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. While servers are much more likely to be exposed to this vulnerability, the security update to &lt;code&gt;rpcxdr.sys&lt;/code&gt; applies to all Windows editions in the Security Updates table.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Services for NFS ONCRPC XDR Driver"
        Type="Tag"
        Ordinal="20">Windows Services for NFS ONCRPC XDR Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26432</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Liubenjin from Codesafe Team of Legendsec at Qi'anxin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-08-12T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added FAQ to provide further vulnerability details. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Services for NFS ONCRPC XDR Driver"
        Type="Tag"
        Ordinal="20">Windows Services for NFS ONCRPC XDR Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-26433</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Liubenjin from Codesafe Team of Legendsec at Qi'anxin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Services for NFS ONCRPC XDR Driver"
        Type="Tag"
        Ordinal="20">Windows Services for NFS ONCRPC XDR Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36926</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Liubenjin from Codesafe Team of Legendsec at Qi'anxin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>Windows Digital TV Tuner device registration application Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Media"
        Type="Tag"
        Ordinal="20">Windows Media</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36927</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10047</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10048</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011552</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011552</vuln:URL>
        <vuln:Supercedence>5010404</vuln:Supercedence>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25898</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011552</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011552</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011529</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011529</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.25898</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011529</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011529</vuln:URL>
        <vuln:ProductID>10047</vuln:ProductID>
        <vuln:ProductID>10048</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011564</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011564</vuln:URL>
        <vuln:Supercedence>5010419</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20303</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011564</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011564</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011560</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011560</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20303</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011560</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011560</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011564</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5010419</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20296</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011564</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011564</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011534</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011534</vuln:URL>
        <vuln:Supercedence>5010384</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21416</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011534</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011534</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011525</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011525</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.21416</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011525</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011525</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011535</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011535</vuln:URL>
        <vuln:Supercedence>5010392</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23645</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011535</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011535</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5011527</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011527</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23639</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5011527</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5011527</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>JIWO Technology Co., Ltd</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.ncsc.gov.uk"&gt;The UK's National Cyber Security Centre (NCSC)&lt;/a&gt;
</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2022-03-08T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;To comprehensively address CVE-2021-36927, Microsoft has released March 2022 security updates for all affected versions of Microsoft Windows. Microsoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2022-03-25T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Affected software updated with new package information.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Services for NFS ONCRPC XDR Driver"
        Type="Tag"
        Ordinal="20">Windows Services for NFS ONCRPC XDR Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36932</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Liubenjin  with Codesafe Team of Legendsec at Qi'anxin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Services for NFS ONCRPC XDR Driver"
        Type="Tag"
        Ordinal="20">Windows Services for NFS ONCRPC XDR Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36933</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11712</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11713</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11714</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11896</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11897</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11898</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11766</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11767</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11768</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11769</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11800</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11803</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10481</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10482</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10484</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030</vuln:URL>
        <vuln:Supercedence>5004244</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.2114</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005030</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005030</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031</vuln:URL>
        <vuln:Supercedence>5004245</vuln:Supercedence>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.18363.1734</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005031</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005031</vuln:URL>
        <vuln:ProductID>11712</vuln:ProductID>
        <vuln:ProductID>11713</vuln:ProductID>
        <vuln:ProductID>11714</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19043.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005033</vuln:URL>
        <vuln:ProductID>11896</vuln:ProductID>
        <vuln:ProductID>11897</vuln:ProductID>
        <vuln:ProductID>11898</vuln:ProductID>
        <vuln:ProductID>11766</vuln:ProductID>
        <vuln:ProductID>11767</vuln:ProductID>
        <vuln:ProductID>11768</vuln:ProductID>
        <vuln:ProductID>11769</vuln:ProductID>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005033</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033</vuln:URL>
        <vuln:Supercedence>5004237</vuln:Supercedence>
        <vuln:ProductID>11800</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11803</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.1165</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040</vuln:URL>
        <vuln:Supercedence>5004249</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19022</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005040</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005040</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005043</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043</vuln:URL>
        <vuln:Supercedence>5004238</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.4583</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076</vuln:URL>
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005106</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005106</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5004298</vuln:Supercedence>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20094</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005076</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005076</vuln:URL>
        <vuln:ProductID>10481</vuln:ProductID>
        <vuln:ProductID>10482</vuln:ProductID>
        <vuln:ProductID>10484</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099</vuln:URL>
        <vuln:Supercedence>5004294</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005099</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005099</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.23435</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5005094</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5005094</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Liubenjin  with Codesafe Team of Legendsec at Qi'anxin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>Azure CycleCloud Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Azure"
        Type="Tag"
        Ordinal="20">Azure</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-36943</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11905</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/azure/cyclecloud/packages?view=cyclecloud-8</vuln:URL>
        <vuln:ProductID>11905</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Michael Taggart of &lt;a href="https://www.uclahealth.org/"&gt;UCLA Health Sciences&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>Chromium: CVE-2021-30590 Heap buffer overflow in Bookmarks</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30590</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>Chromium: CVE-2021-30591 Use after free in File System API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30591</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>Chromium: CVE-2021-30592 Out of bounds write in Tab Groups</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30592</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>Chromium: CVE-2021-30593 Out of bounds read in Tab Strip</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30593</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>Chromium: CVE-2021-30594 Use after free in Page Info UI</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30594</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>Chromium: CVE-2021-30596 Incorrect security UI in Navigation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30596</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>Chromium: CVE-2021-30597 Use after free in Browser UI</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.67&lt;/td&gt;
&lt;td&gt;8/5/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.131&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30597</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.67</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>Chromium: CVE-2021-30598 Type Confusion in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.78&lt;/td&gt;
&lt;td&gt;8/19/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.159&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30598</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.78</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>Chromium: CVE-2021-30599 Type Confusion in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.78&lt;/td&gt;
&lt;td&gt;8/19/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.159&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30599</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.78</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>Chromium: CVE-2021-30601 Use after free in Extensions API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.78&lt;/td&gt;
&lt;td&gt;8/19/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.159&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30601</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.78</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>Chromium: CVE-2021-30602 Use after free in WebRTC</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.78&lt;/td&gt;
&lt;td&gt;8/19/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.159&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30602</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.78</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>Chromium: CVE-2021-30603 Race in WebAudio</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.78&lt;/td&gt;
&lt;td&gt;8/19/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.159&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30603</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.78</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>Chromium: CVE-2021-30604 Use after free in ANGLE</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2021"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based).  It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.  Please see &lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;92.0.902.78&lt;/td&gt;
&lt;td&gt;8/19/2021&lt;/td&gt;
&lt;td&gt;92.0.4515.159&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-30604</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>92.0.902.78</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-08-19T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
</cvrf:cvrfdoc>